Upload
sundae-cruz
View
222
Download
0
Embed Size (px)
Citation preview
7/30/2019 3. Configure Computer
1/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
COMPETENCY BASED LEARNING MATERIAL
Sector: Information and Communication Technology
Qualification Title: Computer Hardware Servicing NC II
Unit of Competency Configure Computer Systems & Networks
Module Title: Configuring Computer Systems & Networks
Technical Education & Skills Development Authority
BISHOP HADEN INSTITUTET. Curato St., Cabadbaran City
POWERED BY: NETWORK SYSTEM
7/30/2019 3. Configure Computer
2/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
COMPETENCY-BASED LEARNING
MATERIAL
Configuring Computer
Systems
&Networks
7/30/2019 3. Configure Computer
3/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
ACKNOWLEDGEMENT
This Competency-Based Learning Materials on Configuring ComputerSystems &Networkswould not have been possible without the guidance and the
help of several individuals who in one way or another contributed and extendedtheir valuable assistance in the preparation and completion of this CBLM.
First and foremost, my utmost gratitude to RT. REV. Denny D. Dapitan,School President of Bishop Haden Institute whose sincerity and encouragement Iwill never forget.
Mrs. Lilian G. Bertumen, for her unselfish and unfailing support as mytrainer and the insights she has shared;
Mrs. Marife A. Pea, for her patience and steadfast encouragement to
complete this CBLM;
Last but not the least, my family and the one above all of us, the AlmightyGod, for answering my prayers for giving me the strength to plod on despite myconstitution wanting to give up and throw in the towel, thank you so much DearLord.
Hans B. de la Cruz
7/30/2019 3. Configure Computer
4/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
TABLE OF CONTENTS
7/30/2019 3. Configure Computer
5/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
HOW TO USE THIS COMPETENCY- BASED LEARNINGMATERIALS
Welcome!
This module contains training materials and activities for you to complete.
The unit of competency Configure Computer Systems and Networks containsthe knowledge, skills and attitudes required for Computer Hardware Servicing
course required to obtain the National Certificate (NC level II). You are required to
go through a series of learning activity. If you have questions, do not hesitate to
ask your trainer for assistance.
Recognition of Prior Learning (RPL)
You have already some basic knowledge and skills covered in this module.
If you can demonstrate competence to your trainer in a particular skill talk to
him/her so you did not have to undergo the same training again. If you have a
qualification or Certificate of Competence from previous trainings show it to
him/her. If the skills you required are consistent with and relevant to this
module, they become part of the evidence. You can present these RPL. If you are
not sure about your competence skills, discuss this with your teacher.
After completing this module ask your trainer to assess your competent.
Result of your assessment will be recorded in your competency profile. All the
learning activities are designed for you to complete at your own pace.
In this module, you will find activities for you to accomplish and relevant
information sheets for each learning outcome. Each learning outcome may have
more than one learning activity.
This module is prepared to help you achieve the required competency in
receiving and relaying information. This will be the source of information that will
enable you to acquire the knowledge and skills in Computer Hardware Servicing
NCII independently at your own pace with minimum supervision from your
trainer.
7/30/2019 3. Configure Computer
6/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
COMPUTER HARDWARE SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
1 Install computer systems andnetworks
Installing computer
systems andnetworks
ELC724318
2 Diagnose and troubleshoot
computer systems
Diagnosing andtroubleshoot
computer systems
ELC724319
3 Configure computer systemsand networks
Configuringcomputer systemsand networks
ELC724320
4 Maintain computer systemsand networks
Maintainingcomputer systems
and networks
ELC724321
7/30/2019 3. Configure Computer
7/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
MODULE CONTENT
UNIT OF COMPETENCY Configure Computer Systems & Networks
MODULE TITLE Configuring Computer Systems & Networks
MODULE DESCRIPTOR:
This unit covers the knowledge, skills and attitudes needed to configurecomputer systems and networks.
NOMINAL DURATION: 100HRS.
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able to:
1. Plan and prepare for configuration
2. Configure computer systems and networks
3. Inspect and test configured computer systems and networks
ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the
Job/Service Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials
7/30/2019 3. Configure Computer
8/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
6. Appropriate personal protective equipment are used and OHS policies &
procedures followed
7. Normal function of systems & network checked in accordance with
manufacturers instruction
8. Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures
9. Computer systems and networks configured in line with the standard
operating procedures
10.Final inspections are undertaken to ensure that the configuration done on
the systems and networks conforms with the manufactures
instruction/manual
11.Computer systems and networks are checked to ensure safe operation.
12.Report is prepared and completed according to company requirements.
7/30/2019 3. Configure Computer
9/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
LEARNING OUTCOME # 1 PLAN AND PREPARE FOR CONFIGURATION
CONTENTS:
1. Inspecting work instructions according to job requirements.
2. Planning and preparing of standard operating procedures
3. Occupational health and safety
4. Configuring system and networks
5. Procedures in using the tools and equipments
ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the
Job/Service Order or instructions.
2. Planned and prepared job requirements.
3. Followed OHS policies and procedures of job requirements.
4. Checked computer systems and networks configuration with specified
requirements.
5. Checked necessary tools, equipment materials
CONDITION:
Trainees must be provided with the following:
OH & S policies and procedures
- OH & S policies
- manuals
Computer systems and networks
- 1 Server
- Peripherals
- 1 Desktop Computers
Materials
- Wires and Cables
- Appropriate Software- Computer Storage Media
7/30/2019 3. Configure Computer
10/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Tools
- Pliers- Philips screw driver
Equipment/testing devices- Computer
Personal protective equipment- Anti-static wrist wrap
ASSESSMENT METHOD:
Hands-on application
Direct observation
Practical demonstration
7/30/2019 3. Configure Computer
11/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
LEARNING EXPERIENCES
Learning Outcome 1
PLAN AND PREPARE FOR CONFIGURATION
Learning Activities Special Instructions
1. Read Information Sheet 3.1-1 onsafety measures, policies &procedures in Computerconfiguration
2. Answer Self-Check 3.1-1
Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
3. Check answers by comparingwith the answer key
4. Read Information Sheet 3.1-2 onplanning & preparing of standardoperating procedures
5. Answer Self-Check 3.1-2 Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
6. Check answers by comparingwith the answer key
7. Read Information Sheet 3.1-3 onconfiguring system and networks
8. Answer Self-Check 3.1-3 Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
9. Check answers by comparingwith the answer key
10. Perform Task Sheet 3.1-3
7/30/2019 3. Configure Computer
12/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
11. Use the performance criteriachecklist to evaluate your
performance
12. Read Information Sheet3.1-4 on procedures in usingtools & equipments
13. Answer Self-Check 3.1-4 Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
14. Check answers bycomparing with the answer key
15. Perform Task Sheet 3.1-4
16. Use the performance criteria
checklist to evaluate yourperformance
7/30/2019 3. Configure Computer
13/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.1-1Safety Measures Policies & Procedures in Computer
Configuration
Learning objectives
After reading this information sheet, you must be able to:
1. Define Computer Health & Safety
2. Explain the correct procedures in computer configuration
Occupational health and safety (OHS) refers to the legislation, policies,procedures and activities that aim to protect the health, safety and welfare of all
people at the workplace.
Occupational health and safety (OHS)is a cross disciplinary area concerned
with protecting the safety, health and welfare of people engaged in work oremployment. The goal of all occupational health and safety programs is to foster
a safe work environment. As a secondary effect, it may also protect co-workers,family members, employers, customers, suppliers nearby communities and othermembers of the public who are impacted by the workplace environment.
Safetyis the state of being safe (from French sauf), the condition of being
protected against physical, social, spiritual, financial, political, emotional,
occupational, psychological, educational or other types or consequences offailure, damage, error, accident, harm or any other event which could beconsidered non-desirable.
Health is the level of functional and/or metabolic efficiency of a livingbeing. In humans it is the general condition of a person in mind, body and spirit
usually meaning to Being free from illness, injury or pain (as in good health or healthy).
Quality of Lifeis used to evaluate the general well-being of individuals andsocieties. The term is used in a wide range of contexts.
7/30/2019 3. Configure Computer
14/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Every worker has a right to healthy and safe work and to a workenvironment that enables them to live a socially and economically productive life.Safety practices should be learned early and always adhered to when workingwith any electrical device including personal computers and peripherals.
Personal safety while working with PCs
Here are some safety precautions to take before working with any computerdevices:
Before doing anything, listen to your teachers instruction to preventaccidents or any unwanted events that may occur on your workplace.
Do not work on computer when you are wet because you might getelectrocuted.
Do not remove internal devices of the computer when it is turned on.
Be sure not to mix electronic components and water.
Avoid playing or running while inside the room.
Always wear personal protective equipments (PPE) like coverall, shoes with
rubber sole, anti-static wrist strap, etc. Ask for assistance from your teacher when it comes on dealing with
computer devices.
Applying safety measure when handling tools and equipment are necessary
to avoid certain damages.
The student is further expected to maintain good health, to be neat inpersonal appearance and to practice safe working procedures at all time withappropriate equipment.
SOP for Computers
Standard Operating Procedure for Computers
When you get a computer, there is no list of exactly what to do or how touse it. Your manual will describe some basics about the computer but for day-today use you are left on your own to figure out the procedures for use to keepthings going smoothly.
7/30/2019 3. Configure Computer
15/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Shutdown
1. Close all your programs before shutting down the computer.
2. Click on the shutdown option in the Start menu and wait for it to shutdown.
3. Shutting down with just the power button can cause problems in theMicrosoft Windows operating system.
Software
1. Close all other programs when installing a new program. This preventsproblems with the new program.
2. Restart after each install. This ensures everything is installed correctly.
Safety
1. Keep your computer clean to keep it running well.
2. Dont eat over the keyboard and avoid spilling drinks near the computer.
3. Keep the computer in a place where it does not get too hot (above 95o or so)
4. Plug your computer into a surge protector.
Security
1. Install antivirus, antispyware and firewall software to protect your data andkeep others from intruding your computer files.
2. Shut your computer down when not in use.
3. Dont share your passwords or write them down where they can be found.
7/30/2019 3. Configure Computer
16/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Self-Check 3.1-1
Direction: Read the question carefully and choose the best answer.
Write only the letter on the space provided.
_____ 1. OH & S stands for?
a. Occupation Houses and Street
b. Occupation Health and Safety
c. Office Health and Safety
______2. It is used to evaluate the general well-being of individuals and societies.The term is used in a wide range of contexts?
a.Safety
b.Health
c.Quality of Life
_____3. It is the level of functional and/or metabolic efficiency of a living being. Inhumans it is the general condition of a person in mind, body and spirit usuallymeaning to Being free from illness, injury or pain?
a. Safety
b.Health
c.Quality of Life
_____ 4. It is the condition of being protected against physical, social, spiritual,financial, political, emotional, occupational, psychological, educational or othertypes or consequences or failure, damage error, accidents harm or any otherevent which could be considered non-desirable?
a.Safety
7/30/2019 3. Configure Computer
17/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
b.Health
c.Quality of Life
_____5. The area concerned with protecting the safety health and welfare ofpeople engaged in work or employment?
a.Cross-disciplinaryb.X-disciplinary
c.OH&S disciplinary
Write the Correct Procedure of the following:
6. Shutdown
7. Software
8. Safety
9. Security
7/30/2019 3. Configure Computer
18/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Answer Key 3.1-1
1. B
2. C
3. B
4. A
5. A
6. a. Close all your programs before shutting down the computer.
b. Click on the shutdown option in the Start menu and wait for it to
shut down.
c. Shutting down with just the power button can cause problems in theMicrosoft Windows operating system.
7. a. Close all other programs when installing a new program. This preventsproblems with the new program.
b. Restart after each install. This ensures everything is installed correctly.
8. a. Keep your computer clean to keep it running well.
b. Dont eat over the keyboard and avoid spilling drinks near thecomputer.
c. Keep the computer in a place where it does not get too hot (above 95o orso)
d. Plug your computer into a surge protector.
9. a. Install antivirus, antispyware and firewall software to protect your dataand keep others from intruding your computer files.
b. Shut your computer down when not in use.
c. Dont share your passwords or write them down where they can befound.
7/30/2019 3. Configure Computer
19/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.1-2Planning & Preparing for Configuration in Systems & Networks
Learning objectivesAfter reading this information sheet, you must be able to:
1. Plan & Prepare standard operating procedures
2. Explain computer networks
What is a Computer Network?
A computer network is an interconnected group ofcomputers.
Computer Network
In general, the term network can refer to any interconnected group orsystem. More specifically, a network is any method of sharing informationbetween two systems (human or mechanical).
BENEFITS OF SHARING INFORMATION VIA NETWORK
http://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computers7/30/2019 3. Configure Computer
20/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
In addition to reducing hardware costs by sharing expensive printers andother peripherals among multiple users, networks provide additional benefits tothe users.
Software and data files can be shared for access by multiple users
Electronic mail (email) can be sent and received Collaboration features allow contributions by multiple users to a single
document Remote-control programs can be used to troubleshoot problems or shownew users how to perform a task
SHARED HARDWARE COMPONENTS
Virtually any storage or output device can be shared over a network, butthe most common devices to be used over a network include:
Printers
Disk drives CD-ROM and optical drives
Modems
Fax
Tape backup units
Network topology
Network Topology signifies the way in which intelligent devices in thenetwork see their logical relations to one another. The use of the term "logical"
here is significant. That is, network topology is independent of the "physical"layout of the network. Even if networked computers are physically placed in alinear arrangement, if they are connected via a hub, the network has a Star
topology, rather than a Bus Topology. In this regard the visual and operationalcharacteristics of a network are distinct; the logical network topology is notnecessarily the same as the physical layout.
Bus Topology
It is often used when network installation is small, simple or temporary. On
a typical bus network the cable is just 1 or more wires with no active electronicsto amplify the signal or pass it along from computer to computer. This makes thebus a passive topology. When 1 computer send a signal up the wire all the
7/30/2019 3. Configure Computer
21/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
computers receive the information but only one with the address that matchesaccepts the information, the rest disregard the message.
Bus Topology
Advantages:1) Easy to use and to understand.2) Requires least amount of cable to connect the computers together. It is
therefore less expensive than other cabling arrangements.3) It is easy to extend a bus; two cables can be joined into 1 longer cable with aBNC, Barrel connector making a longer cable and allowing more computers tojoin the network.
Disadvantages:1) Heavy network traffic can slow a bus considerably as only 1 computer cansend a message at a time.2) It is difficult to troubleshoot the bus. A cable break or loose connector causesreflection and stops all the activity.
STAR TOPOLOGY
In this kind of topology all the cables run from the computers to the central
location where they are all connected by a device called hub or switch. Eachcomputer on a star network communicates with a central device that resends themessage either to each computer or only to the destination computer, example ifit is a hub then it will send to all and if it is a switch then it will send to onlydestination computer. When network expansion is expected and when the greater
reliability is needed, star topology is the best.
7/30/2019 3. Configure Computer
22/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Star Topology
Advantages:1) It is easy to modify and add new computers without disturbing the rest of thenetwork.2) The center of the star network is a good place to diagnose the faults.3) Single computer failure does not necessarily bring down the whole starnetwork.
Disadvantages:1) If the central device fails the whole network fails to operate.2) Star networking is expensive because all network cables must be pulled to onecentral point, requires more cable than other network topologies.
RING TOPOLOGY
In this type each computer is connected to the next computer with the lastone connected to the first. Each retransmits what it receives from the previouscomputer. The message flows around the ring in one direction. The ring networkdoes not subject to signal loss problem as a bus network experiences. There is no
termination because there is no end to the ring.
Ring Topology
7/30/2019 3. Configure Computer
23/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Advantages:1) Each node has equal access.2) Capable of high speed data transfer.
Disadvantages:
1) Failure of one computer on the ring can affect the whole network.
2) Difficult to troubleshoot the network.
Types of networks
Below is a list of the most common types of computer networks in order of scale.
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used forcommunication among computer devices close to one person. Some examples ofdevices that may be used in a PAN are printers, fax machines, telephones, PDAsor scanners. The reach of a PAN is typically within about 20-30 feet(approximately 6-9 meters).
Personal area networks may be wired with computer buses such as USB]and FireWire. A wireless personal area network (WPAN) can also be madepossible with network technologies such asBluetooth.
Personal Area Network
Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building.Current LANs are most likely to be based on Ethernet technology. For example, alibrary will have a wired or wireless LAN for users to interconnect local devices
(e.g., printers and servers) and to connect to the internet. All of the PCs in thelibrary are connected bycategory 5 (Cat5) cable, running the IEEE 802.3 protocolthrough a system of interconnection devices and eventually connect to the
http://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Universal_Serial_Bus7/30/2019 3. Configure Computer
24/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
internet. The cables to the servers are on Cat 5e enhanced cable, which willsupport IEEE 802.3 at 1 GB/s.
The staff computers (bright green) can get to the color printer, checkoutrecords, and the academic network and the Internet. All user computers can getto the Internet and the card catalog. Each workgroup can get to its local printer.Note that the printers are not accessible from outside their workgroup.
Local Area Network
Client/Server Vs Peer-to-Peer Networks
Although every computer on a LAN is connected to every other, they do notnecessarily mean all communicate with each other. There are two basic types ofLAN, based on communication patterns between the machines, calledclient/server networks and peer-to-peer networks.
Client/Server Networks
Every computer has a distinct role, that of either a client or a server. A
serveris designed to share its resources among client computers on the network.The Client/Server is composed of:
Hub
Server
Workgroup ofComputers
7/30/2019 3. Configure Computer
25/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Servers
These are located in secured areas, such as locked closets and datacenters, because they hold the organization's most valuable data and do nothave the accessed by operators on a continuous basis.
The server runs a special network operating system such as: Windows NTServer, Windows 2000 or Novell Netware.
Clients
-The rest of the computers on the network function as client. A clientstandard PC that is running an operating system such as DOS or Windows.
Example of Client/Server
Peer-to-Peer Network
In a peer-to-peer network, every computer is equal and can communicatewith other computer on a network to which it has been granted access rights.Essentially, every computer in this network functions as both server and client.Peer-to-peer network can be as small as two computers as many as hundreds ofunits.
There is no theoretical limit to the size of a peer-to-peer network,performance drops significantly and security becomes a major headache on peer -based network with more than 10 computers. Also, Microsoft imposes a 10-
Hub
Server
ClientWorkstations
7/30/2019 3. Configure Computer
26/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
station limit on computers running Windows 2000 Professional who are sharingresources with other system. For this reason, it is better you switch to aclient/server network when your network climbs to 10 stations.
Example of Peer-to-Peer Network
CAMPUS AREA NETWORK (CAN)
A network that connects two or more LANs but that is limited to a specificand contiguous geographical area such as a college campus, industrial complex,or a military base. A CAN may be considered a type of MAN (metropolitan areanetwork), but is generally limited to an area that is smaller than a typical MAN.This term is most often used to discuss the implementation of networks for a
contiguous area. This should not be confused with aController Area Network.
Campus Area Network
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more LocalArea Networks or Campus Area Networks together but does not extend beyond
http://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Network7/30/2019 3. Configure Computer
27/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
the boundaries of the immediate town, city, or metropolitan area. Multiplerouters, switches & hubs are connected to create a MAN.
Metropolitan Network
Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad
geographic area (i.e. one city to another and one country to another country) andthat often uses transmission facilities provided by common carriers, such as
telephone companies. WAN technologies generally function at the lower threelayers of the OSI reference model: thephysical layer, thedata link layer, and thenetwork layer.
Wide Area Network
Global Area Network (GAN)
Global area networks (GAN) specifications are in development by severalgroups, and there is no common definition. In general, however, a GAN is a modelfor supporting mobile communications across an arbitrary number of wireless
http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_model7/30/2019 3. Configure Computer
28/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
LANs, satellite coverage areas, etc. The key challenge in mobile communicationsis "handing off" the user communications from one local coverage area to thenext. In IEEE Project 802, this involves a succession of terrestrialWireless localarea networks (WLAN).
Global Area Network
Internetwork
Two or more networks or network segments connected using devices thatoperate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such asa router. Any interconnection among or between public, private, commercial,industrial, or governmental networks may also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol.There are at least three variants of internetwork, depending on who administers
and who participates in them:
Intranet
Extranet
Internet
Intranets and extranets may or may not have connections to the Internet. Ifconnected to the Internet, the intranet or extranet is normally protected frombeing accessed from the Internet without proper authorization. The Internet is
not considered to be a part of the intranet or extranet, although it may serve as aportal for access to portions of an extranet.
Intranet
An intranet is a set of interconnected networks,using the Internet Protocol and uses IP-based toolssuch as web browsers and ftp tools, that is under the
http://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LAN7/30/2019 3. Configure Computer
29/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
control of a single administrative entity. That administrative entity closes theintranet to the rest of the world, and allows only specific users. Most commonly,an intranet is the internal network of a company or other enterprise.
Extranet
An extranet is a network or internetwork that is
limited in scope to a single organization or entity butwhich also has limited connections to the networks of one ormore other usually, but not necessarily, trustedorganizations or entities (e.g. a company's customersmay be given access to some part of its intranet creating inthis way an extranet, while at the same time the customersmay not be considered 'trusted' from a security
standpoint). Technically, an extranet may also becategorized as a CAN, MAN, WAN, or other type of network,although, by definition, an extranet cannot consist of a singleLAN; it must have at least one connection with anexternal network.
Internet
A specific internetwork, consisting of a worldwide interconnection ofgovernmental, academic, public, and private networks based upon theAdvancedResearch Projects Agency Network (ARPANET) developed by ARPA of the U.S.Department of Defensealso home to the World Wide Web(WWW) and referredto as the 'Internet' with a capital 'I' to distinguish it from other genericinternetworks.
Participants in the Internet, or their service providers, use IP Addresses
obtained from address registries that control assignments. Service providers andlarge enterprises also exchange information on the reach ability of their addressranges through theBorder Gateway Protocol(BGP).
http://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANET7/30/2019 3. Configure Computer
30/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
SELF-CHECK 3.1-2
I. Identify the following. Choose your answer from the grid below. Use a separate sheetof paper in answering.
______________ 1. The World Wide Web.
______________ 2. The internal network of a company or other enterprise.
______________ 3. A model for supporting mobile communications across anarbitrary number of wireless LANs.
______________ 4. A data communications network that covers a relativelybroad geographic area.
______________ 5. A network that connects two or more Local Area Networksor Campus Area Networks together.
______________ 6. It signifies the way in which intelligent devices in thenetwork see their logical relations to one another
______________ 7. It is the interconnected group of computers.
______________ 8. A network covering a small geographic area, like a home.
______________ 9. All the cables run from the computers to the centrallocation where they are all connected by hub.
______________10. Each computer is connected to the next computer with thelast one connected to the first.
http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Web7/30/2019 3. Configure Computer
31/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Answer Key 3.1-2
1. Internet
2. Intranet
3. GAN
4. WAN
5. MAN
6.Topology
7. Network
8. LAN
9. Star topology
10. Ring topology
7/30/2019 3. Configure Computer
32/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.1-3
Procedures in Using the Tools & Equipments
Learning objectives
After reading this information sheet, you must be able to:
1. Demonstrates the materials needed in configuration
2. Explain the use of the tools and equipments
These are the following materials needed in the Configuration task:
1. Connectors- It is used to connect external devices to the computer system.
2. Adapter- A piece of hardware that plugs into an expansion slot in your computer.
3. Wires and Cables- It is used to connect computers for network.
7/30/2019 3. Configure Computer
33/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
4. Appropriate software- This software packages are used to install new drivers needed in setting
up your computer.
5. Computer storage media- These help you in saving data and providing backup for your files such as
diskette, compact disc, flash drives and memory cards.
6. Reference book- These are books that will provide you topics about networking or related
books on computer.
7/30/2019 3. Configure Computer
34/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
7. Manuals- These provide you instructions for certain operation or task.
8. Cable tie-It is used to organized wires and cables used in connecting computers to
avoid tangling.
These are the following tools/ testing devices needed in the configuration task:
1. Screw drivers
Flat screw driveris use to fasten negative slotted screws.
7/30/2019 3. Configure Computer
35/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Philips Screw driveris used to fasten positive slotted screws.
2. Pliers Side Cutter pliers is used for cutting and trimming of
connecting wires or terminal leads in the circuit board. Long nose pliers is used for holding, bending andstretching the lead of electronics component andconnecting wire.
3. Soldering iron/gun
It is used to join two or more metal conductors with the support ofsoldering lead melted around it.
4. Multi-tester It is used by technician for measuring current, voltage and resistance.
5. Magnifying glass
It is a device made in glass with handle, to exaggerate or to increase theapparent size of an object.
7/30/2019 3. Configure Computer
36/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
6. Safety apparel suit (coverall)- It is used by the person for protect to his body.
7. Anti-static wrist strap- It absorbs the static electricity of the material when being hold by the
hands.
8. Tweezers- It is used to hold the small sensitive part of the computer.
7/30/2019 3. Configure Computer
37/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
9. Mini-vacuum cleaner- It is used for cleaning sensitive parts of the computer.
Note: Apply safety precautions when handling the materials, tools andtesting devices for safe keeping purposes and long lasting use.
7/30/2019 3. Configure Computer
38/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Self-Check 3.1-3
I. Identify the following. Use a separate sheet of paper in answering.
______________ 1. It is a tool used to hold the small sensitive parts of computer.
______________ 2. A device made in glass with handle, to exaggerate or to increasethe apparent size of an object.
______________ 3. It is an instrument used by technician for measuring current,voltage and resistance.
______________ 4. It is a tool used for cutting and trimming of connecting wires orterminal leads in the circuit board.
______________ 5. It is a tool used to join two or more metal conductors with thesupport of soldering lead melted around it.
______________ 6. It is a material used to organize wires and cables used inconnecting computers to avoid tangling.
______________ 7. These are the materials that are used in saving data andproviding backup for your files such as diskette, compact disc,
flash drives and memory cards.
______________ 8. It is a piece of hardware that plugs into an expansion slot inyour computer.
______________ 9. It is a reference material that provides you instructions for
certain operation or task.
______________ 10. It is a tool used for holding, bending and stretching the lead ofelectronics component and connecting wire.
7/30/2019 3. Configure Computer
39/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Answer Key 3.1-3
1.Tweezers
2. Magnifying Glass
3. Multi-tester
4. Side Cutter Pliers
5. Soldering iron/gun
6. Cable tie
7. Computer storage media
8. Adapter
9. Manuals
10.Long nose pliers
7/30/2019 3. Configure Computer
40/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
`
Task Sheet 3.1-3
Title: Demonstrate uses of tools and materials
Performance Objectives:
Choose five materials, tools and testing devices discussed in the lesson.Demonstrate the use of the following tools and materials.
Supplies : Materials
Equipment : LCD Projector
Steps/Procedure:
1. Pick out five materials, tools and testing devices
2. Demonstrate the use of the following tools and materials
Assessment Method:
Demonstration using the Performance Criteria Checklist
7/30/2019 3. Configure Computer
41/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Performance Criteria Checklist 3.1-3
CRITERIADoes your output have the following?
YES NO
Has demonstrated and discussed five materials
Has demonstrated and discussed five tools
Proper handling of tools and materials
Safety Precautions are observed.
7/30/2019 3. Configure Computer
42/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
LEARNING OUTCOME # 2 CONFIGURE COMPUTER SYSTEMS & NETWORKS
CONTENTS:
1. Occupational Health & safety
2. Testing normal function of system & network
3. Procedures in checking the faults or problems
4. Procedures in configure systems & networks
ASSESSMENT CRITERIA:
1.Appropriate personal protective equipment are used and OHS policies &
procedures followed
2.Normal function of systems & network checked in accordance with
manufacturers instruction
3.Fault or problem in the systems and networks diagnosed in line with the
standard operating procedures4.Computer systems and networks configured in line with the standard
operating procedures
CONDITION:
Trainees must be provided with the following:
OH & S policies and procedures
- OH & S policies
- manuals
Computer systems and networks
- 1 Server- Peripherals
7/30/2019 3. Configure Computer
43/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
- 1 Desktop Computers
Materials
- Wires and Cables- Appropriate Software
- Computer Storage Media
Tools- Pliers
- Philips screw driver
Equipment/testing devices
- Computer
Personal protective equipment
- Anti-static wrist wrap
ASSESSMENT METHOD:
Hands-on application Direct observation
Practical demonstration
7/30/2019 3. Configure Computer
44/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
LEARNING EXPERIENCES
Learning Outcome 2
CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Learning Activities Special Instructions
1.Read Information Sheet 3.2-1 ontesting normal function ofsystems & networks
2.Answer Self-Check 3.2-1
Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
3.Check Answers by comparing
with the answer key4.Read Information Sheet 3.2-2 on
testing normal function of
systems & networks
5.Answer Self-Check 3.2-2
Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
6.Check Answers by comparingwith the answer key
7/30/2019 3. Configure Computer
45/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
7.Perform job sheet 3.2-2
8.Evaluate your own work usingthe performance criteria checklist
9.Read Information Sheet 3.2-3 ontesting normal function of
systems & networks
10. Answer Self-Check 3.2-3
Do not write anything on the module
Prepare a separate sheet of paper onthe Self-Check and Activity.
11. Check Answers bycomparing with the answer key
12. Perform job sheet 3.2-13
13. Evaluate your own workusing the performance criteriachecklist
7/30/2019 3. Configure Computer
46/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.2-1Testing Normal Function of Systems & Networks
Learning objectives
After reading this information sheet, you must be able to:1. Identify protective equipment
2. Describe normal functions of systems & networks
Personal Protective Equipment
You must wear/use something in order to protect yourself againstunexpected harm that may arise while performing certain tasks. Different jobsused different gadgets or suits to prevent unexpected harmful events that mayhurt us. The equipments below may be used as PPE:
Gogglesis used to prevent tiny particles from entering our eyes.
Coverall/apron- is worn by a person to prevent his body or clothesfrom any types of dirt.
Glovesare used in handling object without hurting your hands.
Dust maskis used to cover the mouth and nose from tiny particleswhen cleaning computer peripherals.
Shoes with rubber sole and rubber matare used to avoid us formslippery.
Anti-static wrist strap -It absorbs the static electricity of the material
when being hold by the hands.
gloves coverall with rubber matdust mask
7/30/2019 3. Configure Computer
47/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Manufacturers Instruction Guide
Manufacturers Instruction Guide or simply manual may be a big help foryou especially when you bought new materials or appliances at home. You donthave to be professional to operate the material but by just following theprocedure/steps listed on the manual, it may lightens your work. Manual usuallycovers all the functions and steps in configuring the material and/or on how tooperate it. Manuals also provide steps in troubleshooting.
This is an example of what you may see on a Manufacturers InstructionGuide.
How to install a wired network adapter
To connect to a network, your computer needs a network adapter.Fortunately, most computer manufacturers know that connecting to the Internetor other computers is important to computer users, and they include a networkadapter with your computer.
If you need to add a network adapter, first choose which method you wantto use to install it. Most people prefer to use a USB (Universal Serial Bus)network adapter, because it's easy to install. If you have a portable computer,you might find a CardBus (also known as PCMCIA or PC Card) or CF networkadapter better meets your needs. If you have a desktop computer with the properamount of available space, you may also have the option of adding an internalnetwork adapter.
The instructions you follow to install a network adapter depend on how youconnect it.
goggles apron shoes with anti-staticrubber soles wrist strap
7/30/2019 3. Configure Computer
48/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
How to determine if you have a network adapter
Many newer computers have a network adapter built in thatyou can use to connect to a wired network. If you want to install awired network adapter and aren't sure whether your computer
already has one, look for a network port on the back of the computer. Networkports resemble phone jacks, but they are slightly larger and have eight pinsinside.
To see what kind of network adapters may already be installed in yourcomputer.
1. Click the Start, and then click Control Panel
2. Under or pick a Control Panel icon, click Network Connections
3. Microsoft Windows XP displays your network adapters. If an adapterhas a red X over it, it is disconnected. If the Network Connectionswindow is blank, your computer doesn't have a network adapter.
4. If you already have a network adapter, you are ready to configure yournetwork.
How to install a wired USB network adapter
Once you have the adapter
If your USB network adapter came with software, insert the CD or
floppy disk into your computer, and follow the manufacturer'sinstructions to install the software.
Find an available USB port on your computer.
Note: If you need to move your computer to reach the USBports, you should shut down Windows to avoid damaging your
computer. If you can easily reach a USB port, you need notshut down your computer.
http://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspx7/30/2019 3. Configure Computer
49/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
If you do not have an unused USB port, connect a USB hub to addadditional ports. Then connect your USB network adapter to the unused
USB port.
Connect the network cable to the network adapter.
5. Connect the other end of the network cable to your networkingequipment.
6.If you had to shut down your computer to get to the USB port, you cannow turn on your computer. Windows detects and installs the newhardware, and then displays a notification informing you that the
hardware has been successfully installed.
5.
http://www.windowsmarketplace.com/results.aspx?text=usb+hubhttp://www.windowsmarketplace.com/results.aspx?text=usb+hubhttp://www.windowsmarketplace.com/results.aspx?text=usb+hub7/30/2019 3. Configure Computer
50/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
SELF-CHECK 3.2-1
I. Give the functions of the following PPE Use a separate sheet of paper inanswering.
Goggles
__________________________________________________________________________________________________________
__________________________________________________________________________________________________________
Coverall
____________________________________________________________________________________________________________________________________________________________________________________________________________________
Apron____________________________________________________________________________________________________________________________________________________________________________________________________________________
Gloves
_____________________________________________________
__________________________________________________________________________________________________________
_____________________________________________________
7/30/2019 3. Configure Computer
51/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Answer Key 3.2-1
1. Goggles-used to prevent tiny particles from entering our eyes.
2. Coverall-worn to prevent the body or clothes from any types of dirt3. Apron-also worn to protect the body from dirt
4. Gloves-used in handling objects without hurting the hands
7/30/2019 3. Configure Computer
52/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.2-2Procedure in Checking the Faults or Problems
Learning objectives
After reading this information sheet, you must be able to demonstrate theprocedures in checking the faults or problems of computer.
Today's computers have faster microprocessors, more memory and biggerhard drives. When you think about the differences between a Pentium 4 and 386,
you have to conclude the improvement is astounding! But when error attacks ourcomputer we have to do something for the computers to survive. Here are some ofthe common faults and problems that we may encounter:
1. Why computer becomes slow?
You need more memory.
Don't overlook the obvious. Up until recently not having enough memorywasn't a problem. With the price of RAM becoming very affordable, most peoplewere filling their computers with more than enough memory to do the job. If yourcomputer is slow and it has lower capacity of RAM, you need to add morememory to speed it up.
7/30/2019 3. Configure Computer
53/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Spyware and viruses
Spyware. It is a software program that intentionallyinstalled on the computer by the user to monitor or spy onwhat the other users of the same computer is doing.
you do realize for them to be effective, you have to keep up todate. By up to date, it means up to the minute.
Virus. A software program, macro or script that has beendesigned to infect, destroy, modify or cause other problemswith computer or software program.
Background programs
When you install new software on your computer, often times you install it torun in the background every time you start up. Most times you do this withoutknowing it. Look at the bottom right hand side of your screen.
If you see several icons there, you have extra programs running and stealingresources. Right click on these and see if you have the option of closing them.Many times, you can open the program and choose an option to keep theseprograms from starting automatically.
Corrupted registry
Any changes you make to your computer effects and actually, it corrupts yourregistry even when you do something positive like remove spyware and you endup with a corrupted registry.
After months of corrupting your registry, it will becomegood. This will, in its early stages, cause your computer to slow
down. In its advanced stages, it will freeze and crash and domore mysterious and troublesome things.
5. After I pressed the Power button...
7/30/2019 3. Configure Computer
54/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Nothing happened
Check mains plug switched on at wall
PSU may have its own power switch - check this is on
Check PSU-to-Motherboard cable(s) are correctly connected
Check front panel power switch is correctly connected
Check Reset button is not stuck 'in'
Check mains cable fuse
There was a loud bang (possibly with smoke) at the back of the PC Case
PSU was faulty or set to incorrect voltage for mains supply system. ReplacePSU
PC is on but monitor shows no display and a sequence of beeps emits fromthe PC
Check fitting of CPU, RAM, Video card, sound card etc. If necessary,
remove and refit these components Check the motherboard manual and perform a BIOS reset procedure
This may indicate a faulty motherboard
PC is on but monitor shows no display and one beep emits from the PC
Check monitor is switched on at the wall socket
Check monitor power cable is connected correctly
Check that the monitor's signal cable is connected correctly to both the PCand Monitor
Check that the monitor is switched on at its front panel
This may indicate a faulty video card
PC is on but there are no power and/or HDD lights on the PC case frontpanel
Check correct connection of front panel connectors to the motherboard (seemotherboard manual)
This 'may' indicate a faulty Motherboard
PC is on but HDD does not spin up
Check power connector to HDD is properly connected
7/30/2019 3. Configure Computer
55/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Check IDE ribbon cable is correctly connected to both Motherboard andHDD
This may indicate a faulty Hard Drive
PC is on but CD-ROM shows no lights/will not eject tray
Check power connector to CD-ROM is properly connected
Check IDE ribbon cable is correctly connected to both Motherboard andCD-ROM
This may indicate a faulty CD-ROM Drive
PC is on but the CPU fan/fans do not spin
Disconnect the power immediately to prevent damage to the CPU fromoverheating
Check fan power cables are correctly connected to the relevant powerconnector (in most cases, a motherboard FAN connector or one of the PSUpower connectors)
Disconnect the power and carefully spin the fan blades with a finger. Ifthere is any resistance to this movement, this may indicate a faulty fanunit
On boot up, the monitor shows corrupted display
Check seating of CPU, RAM, Video card, soundcard etc. If necessary, remove and refit thesecomponents
Check the motherboard manual and perform aBIOS reset procedure
This may indicate a faulty Motherboard or Videocard
On boot up, display shows incorrect CPU type/speed
Check the motherboard manual for the appropriate CPU jumper settings(where applicable)
Check BIOS settings for CPU type (see Motherboard Manual)
Perform a BIOS reset procedure
Perform a BIOS update (with an updated BIOS, the Motherboard may
support your CPU) This may indicate a faulty/old motherboard
7/30/2019 3. Configure Computer
56/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
On boot up, display shows incorrect RAM total
Check correct seating of Memory Modules in slots
In cases of two or more modules, this may indicate a faulty module
This may indicate a faulty/old motherboard
On boot up, display shows - FDD/Keyboard/Mouse not found (or similar)
Check correct connection of device described, In the case of the FDD, checkits ribbon and power connections
Check that the BIOS is configured correctly for the device described
This may indicate a fault with the described device or Motherboard
The monitor shows no picture
Is the power light on?
Are the cables plugged in?
Check brightness and contrast settings.
Swap the monitor with another one, reboot the machine and see if it works.If the computer works the monitor has probably gone bad. If it still fails towork, something in the CPU perhaps a video card has gone bad.
Computer displays limited colors.
Check display options for the monitor usually under control panel underthe display icon. Select at least 256 colors for standard display. If you had16 color selected, this may be why your screen displays limited colors.Some programs such as FastCat require you to set display settings to 256colors.
Signs ofVideo Display Troubles
If your screen is completely white or gray and you hear buzzing noises, thiscould indicate video card troubles. Before you panic, make sure all cables aresecured from monitor to CPU. Try using another power cord for the monitor to
see if this may be the problem.
http://webopedia.internet.com/TERM/v/video_adapter.htmlhttp://webopedia.internet.com/TERM/v/video_adapter.html7/30/2019 3. Configure Computer
57/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
If screen appears distorted around the edges and the color does not lookright, you may have incorrect display adapters. Select Start, Settings, andControl Panel. Double click on System Icon and select Device Manager. You willsee a listing of devices. Double click on Display adapters to view the type. Ifthere is a yellow exclamation point next to device, there is a conflict. To view
conflicts for a certain device, click on the device, select properties, and select thegeneral tab. There should be a description of the device and why it is not
working properly.
Printer Does Not Print.
Are all cables connected and is the printer turned on?
Is the printer online? Is there paper in the tray?
Is the printer an Inkjet/Deskjet or a Laserjet?
If it's an inkjet, is the ink cartridge out of ink. Remove cartridge, hold up tolight or gently shake it to see if it is empty.
Things to Try
Do you have correct print drivers installed? Find print drivers under DeviceManager.
Check to be sure you have correct print drivers installed. Double click onSystem Icon and select Device Manager. You will see a listing of devices.Double click on the Ports button to view the type. If there is a yellowexclamation point next to device, there is a conflict.
http://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Manager7/30/2019 3. Configure Computer
58/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Task Sheet 3.2-1
Title: Identifying Common Faults and Errors of Computer
Performance Objectives:
Given the necessary tools, materials and equipment identify the common
faults and errors of computer when you detached the following materials:
Devices Port
- Keyboard - PS/2
- Mouse - PS/2
- Hard disk - IDE cable
- Floppy disk drive - IDE cable
- CD-Rom drive - IDE cable
- RAM chip - Memory slot
Supplies : Materials
Equipment : System Unit, Monitor, Keyboard, Mouse, PrinterSteps/Procedure:
1. Check correct connection of device described, In the case of the FDD, check
its ribbon and power connections2. Check that the BIOS is configured correctly for the device described3. Check seating of CPU, RAM, Video card, sound card etc. If necessary,
remove and refit these components4. Check the motherboard manual and perform a BIOS reset procedure
Assessment Method:
Demonstration Assessment using the Performance Criteria Checklist
7/30/2019 3. Configure Computer
59/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Performance Criteria Checklist 3.2-1
CRITERIA
Does your output have the following?
YES NO
Safety Precautions are observed.
All the peripherals are properly inspected.
Standard checking of different peripherals is strictly note.
Proper boot-up and shutdown of the computer is observed.
7/30/2019 3. Configure Computer
60/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
INFORMATION SHEET 3.2-3Procedure in Configure Systems & Networks
Learning objectives
After reading this information sheet, you must be able to configurecomputer systems and networks.
How to Configure a Peer Network in Windows 98
To create a peer network, you must have the following components:
A network interface or Local Area Network (LAN) adapter for each computer. The
same manufacturer and model of network card is preferred. Cabling that is supported by the network cards.
Windows 98 drivers for the network cards.
A common network protocol.
A unique computer name for each computer.
To create a peer network, follow these steps for each computer connected to thenetwork:
1. Shut down the computer and install the network card and appropriatecabling for each computer.
NOTE: For information about how to configure your network adaptersand physically connect your computers, consult the documentation includedwith your network adapters or contact the manufacturer(s) of your networkadapters.
2. Start Windows and install the network drivers. Windows may detect yournetwork card and install the drivers when you start the computer. If the
7/30/2019 3. Configure Computer
61/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
network card drivers are not included with Windows, follow the manufacturer'sinstructions about how to install the network drivers.
.
3. Choose a client and a common protocol for each computer. To do this, followthese steps:
a. Click Start, point to Settings, click Control Panel, and then double-clickNetwork.
b. Click Add, click Client, and then click Add.
c.In the Manufacturers box, click the appropriate manufacturer, click theappropriate client in the Network Clients box, and then click OK.
d. Click Add, click Protocol, and then click Add.
e.In the Manufacturers box, click the appropriate manufacturer, click theappropriate protocol in the Network Protocol box, and then click OK.
Follow the instructions to finish installing the network client and protocol.
.
4. Configure a peer server. Each computer that is configured for File andPrinter Sharing can act as a server. To configure a computer for File andPrinter Sharing, use the following steps:
a.Click Start, point to Settings, click Control Panel, and then double-click Network.
b.Click File and Print Sharing, click one or both options to share filesand printers, click OK, and then click OK again.
c.Click Yes when you are prompted to restart your computer.
.
5. Give each computer a unique computer name. To do this, use thefollowing steps:
a.Click Start, point to Settings, click Control Panel, and then double-click Network.
b.On the Identification tab, type a unique name in the Computer namebox.
c.
Click OK, and then click Yes when you are prompted to restart yourcomputer.
7/30/2019 3. Configure Computer
62/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
NOTE: The computer name must be unique for eachcomputer on the network and should be no more than 15 characters inlength. In small networks, the workgroup name should be the same foreach computer so that all computers are visible in the same workgroupwhen browsing. You should not use spaces or the following charactersin computer and workgroup names:/ \ * , . " @
Windows XP Networking
As in previous versions of Windows, Windows XP provides a wizard fornetwork connection setup. Wizards break down a task into individual stepsand guide the user through the steps one at a time.
The Windows XP New Connection Wizard supports two basic types ofInternet connections,dialupandbroadband.
To access the network connection setup wizard in Windows XP,navigate through the Start menu to the Connect To and Show allconnections options as shown below.
The same feature is also accessible via the Network Connections iconin Control Panel.
http://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htm7/30/2019 3. Configure Computer
63/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Choosing either of the above options causes a new window to appearon the desktop as shown below. On the right, this window displays icons forany pre-existing connections. The Create a new connection option on theleft allows new connections to be set up.
Types of Windows XPNetwork Connection Setup
Clicking the Create a new connection option from theNetworkConnections dialogactivates the wizard as shown below.
http://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htm7/30/2019 3. Configure Computer
64/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
Clicking Next presents the user with three main choices for Internetand private network setup as shown below.
The Connect to the Internet option supports several types of Internet
connection setup. This option allows the user to choose from a list of ISPs,use a setup CD-ROM provided by their ISP, or set up a connection manually.
Connect to the network at my workplace supports client-side set upof both dialup remote access and VPN services.
The Set up an advanced connection option supports serial, paralleland infrared port networking setups. This option also allows the user toenable certain types of incoming network connections.
Setting up an Internet Connection
The Getting Ready page presents three choices as shown below:
The Choose from a list of Internet Service Providers option givesinstructions for setting up an account with anISP, then making the Internetconnection through that new account.
The Set up my connection manually option sets up connections foraccounts that have already been opened with an ISP (username andpassword are ready for use).
The Use the CD I got from an ISP option should be used whenpossessing an installation CD-ROM from one of the service providers.
http://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htm7/30/2019 3. Configure Computer
65/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans B. de la Cruz
Revision # : 00
By default the first option Get online with MSN (Microsoft Network) isselected. To set up a new connection to MSN, click Finish. To set up a newconnection to various other ISPs, change the radio button selection to thesecond option and then click Finish.
MSN Internet Connection Setup
After choosing MSN and clicking Finish, the Windows XP networkconnection wizard closes and a new window opens as shown below.
7/30/2019 3. Configure Computer
66/95
B H ICBLMs on Computer
Hardware Servicing NC II
Configuring Computer
Systems & Networks
Date Developed:
April 2, 2013
Date Revised:
Document No.
Issued by:
Bishop Haden InstitutePage
Developed by:
Hans