0% found this document useful (0 votes)
340 views120 pages

CBLM - Coc1 (Install and Configure Computer Systems)

Uploaded by

jonathan labajo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
340 views120 pages

CBLM - Coc1 (Install and Configure Computer Systems)

Uploaded by

jonathan labajo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

COMPETENCY BASED LEARNING MATERIALS

Sector : ELECTRONICS

Qualification Title : COMPUTER SYSTEMS SERVICING NC II

Unit of Competency : INSTALL AND CONFIGURE COMPUTER


SYSTEMS

Module Title : INSTALLING AND CONFIGURING COMPUTER


SYSTEMS

METRO DUMAGUETE COLLEGE, INC.


E.J. Blanco Drive Ext., Daro, Dumaguete City
Negros Oriental, 6200

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 1 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
HOW TO USE THIS MODULE

Welcome to the Module “Installing and Configuring Computer


Systems”. This module contains training materials and activities for you
to complete.

The unit of competency “Install and Configure Computer


Systems” contains knowledge, skills and attitudes required for a
Computer System Servicing NC II course.

You are required to go through a series of learning activities in order


to complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets, Job Sheets, Operation Sheets,
and Activity Sheets. Follow these activities on your own and answer the
Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your facilitator for


assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in
this module

 because you have been working for some time


 Already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a


particular skill or skills, talk to him/her about having them formally
recognized so you don’t have to do the same training again. If you have a
qualification or Certificate of Competency from previous trainings show it
to your teacher. If the skills you acquired are still current and relevant to
this module, they may become part of the evidence you can present for
RPL. If you are not sure about the currency of your skills, discuss it with
your teacher.

After completing this module ask your teacher to assess your


competency. Result of your assessment will be recorded in your
competency profile. All the learning activities are designed for you to
complete at your own pace.

Inside this module you will find the activities for you to complete
followed by relevant information sheets for each learning outcome. Each
learning outcome may have more than one learning activity.

COMPUTER SYSTEMS SERVICING NC II


Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 2 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code


Installing &
Install & configure
1. configuring ELC724331
computer networks
computer networks

Set-up computer Setting-up computer


2. ELC724332
networks networks

Set-up computer Setting-up computer


3. ELC724333
servers servers

Maintain & repair Maintaining & repairing


4. computer systems computer systemsELC724334
and
and networks networks

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 3 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
MODULE CONTENT

UNIT OF COMPETENCY: Install and Configure Computer Systems

MODULE TITLE: Installing and Configuring Computer


Systems

MODULE DESCRIPTOR: This module covers the outcomes required


in installing and configuring desktop and
workstation computers systems. It consists
of competencies to assemble computer
hardware, install operating system and
drivers for peripherals/devices, and install
application software as well as to conduct
testing and documentation.

NOMINAL DURATION: 80 hours

LEARNING OUTCOMES:
At the end of this module you MUST be able to:
1. Assemble computer hardware
2. Prepare installer
3. Install operating system and drivers for peripherals/ devices
4. Install application software
5. Conduct testing and documentation

ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and
procedures are followed in accordance with systems requirements.
2. Materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements.
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety.
4. Computer hardware is assembled in accordance with established
procedures and systems requirements.
5. Basic-input-output-system (BIOS) configuration is performed in
accordance with hardware requirements.
6. Portable bootable devices are created in accordance with software
manufacturer instruction.
7. Customized installers are prepared in accordance with software
utilization guide and end user agreement.
8. Installations of portable applications are carried out in accordance
with software user guide and software license.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 4 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
9. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
10. Peripherals/devices drivers are installed and configured in
accordance with manufacturer’s instructions and/or OS
installation procedures.
11. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer’s recommendations and
requirements.
12. On-going checks of the quality of the work are undertaken in
accordance with established procedures.
13. Application software are installed based on software installation
guides, end-user requirements and software license agreement.
14. Variation to application software installation is carried out in
accordance to customer/client requirements.
15. Software updates are accessed and installed in accordance with
manufacturer’s recommendations and requirements.
16. Devices / systems and/or installation is tested to determine
whether it conforms to requirements.
17. Stress test is conducted to ensure reliability of equipment in
accordance with manufacturer’s instructions and system
requirements.
18. 5S and 3Rs are followed according to environmental policies.
19. Documentation in relation to the test is forwarded to appropriate
personnel and/or authority in accordance with requirements.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 5 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
LEARNING OUTCOME NO. 1: ASSEMBLE COMPUTER
HARDWARE

CONTENTS:
1. OH&S Policies and Procedures
2. Hardware Components
3. Tools, Equipment and Testing devices
4. Assembling Computer Hardware
5. Basic Input Output Systems (BIOS) Configuration

ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies and
procedures are followed in accordance with systems requirements
2. Materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Computer hardware is assembled in accordance with established
procedures and systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in
accordance with hardware requirements.

CONDITIONS:
The students/trainees must be provided with the following:
 PC or workstations
 Instructional Manuals such as: Occupational Health and Safety
policies and procedure manual, device manual and hardware
diagrams and charts.
 Tools, equipment’s and test instruments such as: protective
eyewear, digital multi-meter, crimping tools, pliers, screw drivers.
 Supplies and materials such as: appropriate operating system
,driver software, software applications and programs.

ASSESSMENT METHOD:
1. Hands-on
2. Direct observation
3. Practical demonstration
4. Oral Questioning

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 6 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
Learning Experiences

Learning Outcome 1

ASSEMBLE COMPUTER HARDWARE


Learning Activities Special Instructions
Read Information Sheet No. 1.1-1
on Occupational Health and
Safety Procedures

Answer Self-Check No. 1.1-1


Checking answers with Answer
Key 1.1-1
Read Information Sheet 1.1-2
Hardware Components

Answer Self-check No. 1.1-2


Checking answers with Answer
Key 1.1-2
Read Information Sheet 1.1-3
Tools, Equipment and Testing
Devices

Answer Self-checks No. 1.1-3


Checking answers with Answer
Key 1.1-3
Read Information Sheet 1.1-4
Assembling Computer Hardware

Perform Task Sheet No. 1.1-4


Self-Check using Performance
Criteria Checklist 1.1-4
Perform Task Sheet 1.1-5

Perform Task Sheet No. 1.1-5


Self-check using Performance
Criteria Checklist 1.1-5

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 7 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
INFORMATION SHEET 1.1-1
Occupational Health and Safety Procedures

Learning Objectives:
After reading this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning,
preparing, installing and testing of computer hardware.
2. Identify the Occupational health and safety Policies

During installation and initial test, careful planning and preparation


are to be done. To avoid personal injury and damages to wiring due to
sharp pins on connectors and printed circuit assemblies, rough chassis
edges and corners, and hot components.

Safety Procedure is a common task. It is a general knowledge in


our workplace. In most cases, one must be trained to apply safety
procedures in particular place or in an environment of a certain work, such
as factory where there is heavy machineries, electronics and high voltage
facilities.

Safety Procedures may be able to promote a great stability of a


company, to ensure safety of their own products, their facilities and most
especially their personnel during and after work responsibility. Therefore,
it is our goal and responsibility as a worker, in any field of our skills and
even in our great profession, to have these skill and knowledge for future
application in our workplace.

5s of Good House Keeping

5S of good housekeeping involves the principle of waste elimination


through workplace organization.

5S JAPANESE ENGLISH ACTION EFFECTS


WORD TERM
Identify and eliminate all
1S Seiri Sort
unnecessary items.
Systematiz
Arrange necessary items
e/
2S Seiton in good order and easy ACTIONS
Stabilize/
access.
Straighten
Sweep/ Clean your workplace
3S Seiso
Shine thoroughly.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 8 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
5S JAPANESE ENGLISH ACTION EFFECTS
WORD TERM
Maintain high standards of
Sanitize/ housekeeping and
4S Seiketsu CULTURE
Standardize workplace organization at
all times.
Sustain/ Create a culture wherein
5S Shitsuke Self- all members practice the HABIT
Discipline above 4S as a way of life.

3R’s of Waste Management

The three R’s – reduce, reuse and recycle – all help to cut down on
the amount of waste we throw away. They conserve natural resources,
landfill space and energy. Sitting a new landfill has become difficult and
more expensive due to environmental regulations and public opposition.

NAME BRIEF EXPLANATION


REDUCE The concept of reducing what is produced and what is
consumed is essential to the waste hierarchy. The logic
behind it is simple to understand – if there is less waste, then
there is less to recycle or reuse. The process of reducing
begins with an examination of what you are using, and what
it is used for.
REUSE Learning to reuse items, or re-purpose them for a use
different then what they are intended for is essential in
waste hierarchy.
RECYCLE To recycle something means that it will be transformed again
into a raw material that can be shaped into a new item.

General Safety Precautions

1. Remove power from the circuit or equipment before working on it.

2. Remove and replace fuses only after the power to the circuit has
been de-energized.

3. Make sure all equipment is properly grounded.

4. Use extreme caution when removing or installing batteries


containing acid.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 9 of
Developed by:
Install and Configure 120
Computer Systems Revision # 00
5. Use cleaning fluids only in well- ventilated spaces.

6. Dispose of cleaning rags and other flammable materials in tightly


closed metal containers.

7. In case of an electrical fire, de-energize the circuit and report it


immediately to the appropriate authority.

High Voltage Safety Precautions

1. Consider the result of each act.

2. Keep away from live circuits.

3. Do not work alone.

4. Do not tamper with interlocks.

5. Do not ground yourself.

6. Never energize equipment in the presence of water leakage.

Personal Safety Precautions

1. Work only in clean dry areas.

2. Do not wear loose or flapping clothing.

3. Wear only nonconductive shoes.

4. Remove all rings, wristwatches, bracelets, ID chains and tags, and


similar metal items.

5. Do not use bare hands to remove hot parts.

6. Use a shorting stick to remove high voltage charges on capacitors.

7. Make certain that the equipment being used is properly grounded.

8. Remove power to a circuit prior to connecting alligator clips.

9. When measuring voltages over 300 volts, do not hold the test
probes.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 10
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
First Aid Procedures:

1. Don’t panic! Determine if there is any immediate danger to the


injured person.

2. Never move an unconscious person without cause, lay the person


flat.

3. Keep the person warm to prevent shock.

4. Never try to force liquids on an unconscious person.

5. If the person is breathing normally, keep him or her still comfortable


until medical aid arrives.

6. Severe electrical shock or other types of accidents may interrupt


breathing. A procedure such as artificial respiration (mouth- to –
mouth resuscitation) or CPR (Cardiopulmonary Resuscitation) can be
used to stimulate the breathing process.

7. Check for a swallowed tongue before applying artificial respiration.


This procedure should be administered by a trained person if
possible and continued until medical help arrives.

8. Report all injuries to the instructor immediately. Even minor cuts can
become infected and the best first aid supplies, nurses, and doctors
cannot help an unreported injury.

Occupational Health and Safety Policies in Assembling and


Disassembling PCs

1. Turn OFF the computer.

2. Unplug power cords.

3. Wear anti- static wrist band.

4. Use rubber mat.

5. Discharge static electricity (ground yourself).

6. Work in well-lighted and well-ventilated environment.

7. Avoid liquid spills.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 11
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
8. Remove all metal accessories from your body.

9. Work in a clean and dry area.

10. Always use the manufacturer’s manual.

11. Use proper tools.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 12
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
SELF-CHECK NO. 1.1-1

I. Complete the table below.

5S JAPANESE ENGLISH ACTION EFFECTS


WORD TERM
1S Seiri Identify and eliminate all
unnecessary items.
2S Seiton Systematiz
e/
Stabilize/ ACTIONS
Straighten
3S Seiso Clean your workplace
thoroughly.
4S Sanitize/ Maintain high standards of
Standardize housekeeping and
CULTURE
workplace organization at
all times.
5S Shitsuke Create a culture wherein
all members practice the HABIT
above 4S as a way of life.

II. Enumeration:

Give at least 10 Occupational Health and Safety Policies in


Assembling and Disassembling PCs.

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 13
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
ANSWER KEY 1.1-1

I. Complete the table below.

5S JAPANESE ENGLISH ACTION EFFECTS


WORD TERM
1S Seiri Sort Identify and eliminate all
unnecessary items.
2S Seiton Systematiz Arrange necessary items
e/ in good order and easy
Stabilize/ access. ACTIONS
Straighten
3S Seiso Sweep/ Clean your workplace
Shine thoroughly.
4S Seiketsu Sanitize/ Maintain high standards of
Standardize housekeeping and
CULTURE
workplace organization at
all times.
5S Shitsuke Sustain/ Create a culture wherein
Self- all members practice the HABIT
Discipline above 4S as a way of life.

II. Enumeration:

Give at least 10 Occupational Health and Safety Policies in


Assembling and Disassembling PCs.

1. Turn OFF the computer.


2. Unplug power cords.
3. Wear anti- static wrist band.
4. Use rubber mat.
5. Discharge static electricity (ground yourself).
6. Work in well-lighted and well-ventilated environment.
7. Avoid liquid spills.
8. Remove all metal accessories from your body.
9. Work in a clean and dry area.
10. Always use the manufacturer’s manual.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 14
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 1.1-2
Hardware Components

Learning Objectives:
After reading this Information Sheet, you should be able to:
1. Name the components of a computer hardware
2. Identify the functions and characteristics of a computer hardware
components

If you use a desktop computer, you might already know that there
isn't any single part called the "computer." A computer is really a system
of many parts working together. The physical parts, which you can see
and touch, are collectively called hardware.

The illustration below shows the most common hardware in a


desktop computer system. Your system may look a little different, but it
probably has most of these parts. A laptop computer has similar parts but
combines them into a single notebook-sized package.

DESKTOP COMPUTER SYSTEM

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 15
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
System unit

The system unit is the core of a computer system. Usually it's a


rectangular box placed on or underneath your desk. Inside this box are
many electronic components that process information. The most
important of these components is the central processing unit (CPU), or
microprocessor, which acts as the "brain" of your computer. Another
component is random access memory (RAM), which temporarily stores
information that the CPU uses while the computer is on. The information
stored in RAM is erased when the computer is turned off.

Almost every other part of your computer connects to the system


unit using cables. The cables plug into specific ports (openings), typically
on the back of the system unit. Hardware that is not part of the system
unit is sometimes called a peripheral device.

Storage

Your computer has one or more disk drives - devices that store
information on a metal or plastic disk. The disk preserves the information
even when your computer is turned off.

There are two different types of storage devices:

 Primary Storage Devices: Generally smaller in size, these are


designed to hold data temporarily and are internal to the computer.
They have the fastest data access speed, and include RAM and
cache memory.

 RAM (random access memory)- referred to as main


memory, primary memory, or system memory, is a hardware

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 16
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
device that allows information to be stored and retrieved on a
computer. RAM is usually associated with DRAM, which is a
type of memory module. However, unlike ROM or the hard
drive, RAM is a volatile memory and requires power to keep
the data accessible. If the computer is turned off, all data
contained in RAM is lost.

FRIENDLY INDUSTRY PEAK DATA


NAME NAME TRANSFER TRANSFERS/SECOND
RATE (IN MILLIONS)
DDR3
DDR3-800 PC3-6400 6400 MB/s 800
DDR3-1066 PC3-8500 8533 MB/s 1066
DDR3-1333 PC3-10600 10667 MB/s 1333
DDR3-1600 PC3-12800 12800 MB/s 1600
DDR2
DDR2-400 PC2-3200 3200 MB/s 400
DDR2-533 PC2-4200 4266 MB/s 533
DDR2-667 PC2-5300 5333 MB/s 667
DDR2-800 PC2-6400 6400 MB/s 800
DDR2-1066 PC2-8500 8533 MB/s 1066
DDR
DDR-200 PC-1600 1600 MB/s 200
DDR-266 PC-2100 2100 MB/s 266
DDR-300 PC-2400 2400 MB/s 300
DDR-333 PC-2700 2700 MB/s 333
DDR-400 PC-3200 3200 MB/s 400

 ROM (read-only memory) or cache memory - is memory


that cannot be changed by a program or user. ROM retains its
memory even after the computer is turned off. For example,
ROM stores the instructions for the computer to start up when
it is turned on again.
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 17
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
"Cache" is a specialized form of computer memory. In
the case of Internet, "cache" is commonly used in the context
of "browser cache". Cache is designed to speed up the
computer by prioritizing its contents for quick access.

How it works: cache holds copies of recently accessed data


such as a web page and pictures on web pages. It keeps this
data ready to "swap" onto your screen within fractions of a
second. So, instead of requiring your computer to go to the
original web page and photos in Denmark, the cache simply
offers you the latest copy from your own hard drive.

 Secondary Storage Devices: These usually have large storage


capacity, and they store data permanently. They can be either
internal or external to the computer, and they include the hard disk,
optical disk drive and USB storage device.

 Hard Disk Drive

Your computer's hard disk drive stores information on a


hard disk, a rigid platter or stack of platters with a magnetic
surface. Because hard disks can hold massive amounts of
information, they usually serve as your computer's primary
means of storage, holding almost all of your programs and
files. The hard disk drive is normally located inside the system
unit.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 18
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
 CD/DVD Drives

Nearly all computers today come equipped with a CD or


DVD drive, located on the front of the system unit. CD drives
use lasers to read (retrieve) data from a CD, and many CD
drives can also write (record) data onto CDs. If you have a
recordable disk drive, you can store copies of your files on
blank CDs.

DVD drives can do


everything that CD drives can,
plus read DVDs. If you have a
DVD drive, you can watch
movies on your computer.
Many DVD drives can record
data onto blank DVDs.

 Flash Drive

A USB flash drive, also known as a thumb drive, pen


drive, gig stick, flash stick, jump drive, disk key, disk on key,
flash drive, memory stick USB key, USB stick or USB memory,
is a data storage device that includes flash memory with an
integrated USB interface. It is typically removable, rewritable
and much smaller than an optical disc.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 19
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Computer Peripherals

Computer peripherals are devices that are attached to a


computer. These devices are not part of the system unit, but are
important since they provide the input and output functions in order for
the users to perform their tasks.

The basic peripherals that you will need to start-up the computer
are:

 Monitor

A monitor is an output device which displays information in


visual form, using text and graphics. The portion of the monitor that
displays the information is called the screen. Like a television
screen, a computer screen can show still or moving pictures.

 Mouse

A mouse is an input device that controls the movement of the


cursor or pointer and enables the user to move and select items
that are displayed on the monitor.

Although mice come in many shapes, the typical mouse does


look a bit like an actual mouse. It's small, oblong, and connected to
the system unit by a long wire that resembles a tail. Some newer
mice are wireless.

A mouse usually has


two buttons: a primary
button (usually the left
button) and a secondary
button. Many mice also
have a wheel between the
two buttons, which allows
you to scroll smoothly
through screens of
information.
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 20
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
When you move the mouse with your hand, a pointer on your
screen moves in the same direction. Pointing and clicking with your
mouse is the main way to interact with your computer.

 Keyboard

A keyboard is an input device that allows the user to enter


instructions and information into a computer.

It is used mainly for typing text into your computer. Like the
keyboard on a typewriter, it has keys for letters and numbers, but it also
has special keys:

 The function keys, found on the top row, perform different functions
depending on where they are used.
 The numeric keypad, located on the right side of most keyboards,
allows you to enter numbers quickly.
 The navigation keys, such as the arrow keys, allow you to move your
position within a document or webpage.

You can also use your keyboard to perform many of the same tasks you
can perform with a mouse.

Other Peripherals:

 Modem
To connect your computer to the Internet, you need a modem.
A modem is a device that sends and receives computer information
over a telephone line or high-speed cable. Modems are sometimes
built into the system unit, but higher-speed modems are usually
separate components.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 21
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
 Speakers

Speakers are used to play sound. They may be built into the
system unit or connected with cables. Speakers allow you to listen
to music and hear sound effects from your computer.

 Printer

A printer transfers data from a computer onto paper. You


don't need a printer to use your computer, but having one allows
you to print e-mail, cards, invitations,
announcements, and other materials.
Many people also like being able to
print their own photos at home.

The two main types of printers


are inkjet printers and laser printers.
Inkjet printers are the most popular
printers for the home. They can print
in black and white or in full color and
can produce high-quality
photographs when used with special
paper. Laser printers are faster and
generally better able to handle heavy use.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 22
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Inside The System Unit

Understanding how the parts of a computer connect to each other


inside your PC begins with the case, which physically houses most of the
components.

 Power Supply

The power supply connects to nearly every device in the PC


to provide power. It is located at the rear of the case.

Power supplies are quoted as having a certain power output


specified in Watts, a standard power supply would typically be able
to deliver around 350 Watts.

Always replace a power supply with an equivalent or superior


power output (Wattage).

There are 3 types of power supply in common use:

 AT Power Supply - still in use in older PCs.


 ATX Power Supply - commonly in use today.
 ATX-2 Power Supply - recently new standard.

The voltages produced by AT/ATX/ATX-2 power supplies are:

 +3.3 Volts DC (ATX/ATX-2)


 +5 Volts DC (AT/ATX/ATX-2)
 -5 Volts DC (AT/ATX/ATX-2)
 +5 Volts DC Standby (ATX/ATX-2)
 +12 Volts DC (AT/ATX/ATX-2)
 -12 Volts DC (AT/ATX/ATX-2)

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 23
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
The Power Supply Connectors
Connector Description
20-pin P1 connect is the main motherboard power
connector used in the early ATX systems

24-pin P1 connector, also called the 20+4 pin


connector, is the main motherboard power
connector used today
20+4 pin P1 connector with four pins removed so
the connector can fi t into a 20-pin P1 motherboard
connector
4-pin auxiliary motherboard connector used for
extra 12 V power to the processor

8-pin auxiliary motherboard connector used for


extra 12 V power to the processor, providing more
power than the older 4-pin auxiliary connector

4-pin Molex connector is used for IDE (PATA) drives

15-pin SATA connector used for SATA drives

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 24
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Connector Description
4-pin Berg connector used by a fl oppy disk drive
(FDD)

6-pin PCIe connector provides an extra +12 V for


high-end video cards using PCI Express, Version 1
standard

8-pin PCIe connector provides an extra +12 V for


high-end video cards using PCI Express, Version 2

6-pin plus 2-pin +12 V PCIe connector is used by


high-end video cards using PCIe ×16 slots to
provide extra voltage to the card. To get the 8-pin
connector, combine both the 6-pin and 2-pin
connectors.

 Motherboard (MOBO)

Motherboard is the main circuit board of a computer. It is the


piece of hardware which contains the computer's micro-processing
chip and everything attached to it is vital to making the computer
run.
So, let’s talk about the Motherboard parts and function to
enable you to familiarize the parts and function. This is the most
practical approach of the technician.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 25
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
1. I/O ports - This is located in the rear panel of the CPU, this use to
connect the outside hardware or peripherals of the computer.

 PS/2 ports - These are used to connect the mouse (green color)
and the keyboard (purple color)

 DB 25 female connector (parallel port) - This is use to connect


the impact printer, one of that the DOT MATRIX printer, ex. the
Epson LX 300 +

 DB 9 male connector (Serial or com1 port) - This use to connect a


serial device of the computer, such as the serial mouse and
external modem.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 26
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
 VGA port (built-in) - This is use to interface the DB cord of the
monitor screen or to connect the monitor screen of the computer.
The fastest video card versions are based on the standard of the
VGA slots, ex: the AGP and PCI’e card.

 USB 2.0 × 2 ports - These are the ports of the USB devices of the
computer. Attached externally of the system unit, one of that are
the USB flash drives. As of now the versions or speed of the USB
are the 1.0 and 2.0 compatible.

 LAN port - This called as Local Area Network of the computer.


This is use to connect the numbers of node or workstations (PC)
to form a local area network of the computer with in their area.
Using type of communication media such as the network switch
and router.
 Audio port - This is use to connect the speaker, mike, and MIDI
(Musical Instrument Digital Interface) device of the computer.

2. ATX Power connector (4 pin) - This is use to connect the 4 pin of


the power supply unit(PSU) .This is separate of the 20 or 24 pin of
ATX power supply to provide DC voltage of computer processor.

3. Processor’s ZIF Socket - Part of MOBO use to hold the processor


or CPU chip (Zero Insertion Force).The compatibility of the socket
depends of the computer processor type. Such as the AM2 socket of
the AMD and the socket 775 of the Intel company.

4. Memory slot (DIMM) - This is called as Dual Inline Memory


Module, this is the slot of computer memory or what we called RAM.
The memory slot depends of the type of the memory. Such as the PC
133 SDRAM and PC 400 SDRAM-DDR 1.

5. ATX Power connector (20/24 pin) - A group of connector of the


MOBO. This is separate of the 4 pin power assignments. It provides a
DC power output to the system board (SB) from the output of the
Power Supply Unit.

6. CMOS/ BIOS Battery - In this part, the CMOS/BIOS battery is hold,


so that it can provide 3 volts direct current/voltage to the CMOS IC.
To preserve the BIOS settings of the computer. Such as the time
module, hardware information and settings/parameter, etc.

 CMOS - Complementary Metal Oxide Semiconductor


 BIOS - Basic Input/output system. Is a set of a program stored in
CMOS IC, use to preserve the BIOS configuration of the computer

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 27
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
7. IDE Connector (Integrated Drive Electronics) - This connector
is use to connect the IDE cable of the HDD (Hard Disk Drive) or
CD/DVD ROM to the Mother Board IDE.

8. Front panel connectors (F-Panel) - This is use to connect the


Power LED,HDD LED, Power Switch, and Reset switch of the
computer system unit(CPU).

9. SATA connector - This is Serial Advance Technology Attachment.


The new standard of the IDE connection array of the computer HDD
(SATA HDD) to the motherboard system.

10. USB Connector (header) - This is use to connect the USB port of
the front panel USB 2.0 x 2 port.
11. FDD connector - The connector of the FDD cable through the
system board. Normally there are 34 pins out of it to connect the
3.5” 1.44mb Floppy Disk Drive.

12. PCI slots - a part of the computer motherboard use to connect the
I/O cards of the computer. Such as LAN card, WIFI card, USB
expansion card, and sound card.

13. CMOS/BIOS IC - This is the type of BIOS IC being use by the


computer MOBO.A set of a program being installed in this IC to
preserved the BIOS configuration settings of the computer. Such as
the speed of the CPU chip and RAM, etc.

14. AMR slot - This is the AUDIO Modem Riser. Being use to
demodulate and modulate the analog audio of the computer.

15. PCI express slot - A part of the computer that hold the computer
video card (VGA), the PCIe card. The latest and the fastest card
being installed and most compatible with 3d and 4g gaming of the
computer. The old video card type is the AGP or Accelerated Graphic
Ports and the standard of the PCIe.

16. North Bridge IC - Is a passion name as being north of the PCI


buses or the PCI slots of the MOBO. The true name of the north
bridge is MCI or Memory Controller Hub. Assigned to manage and
control the computer memory before the processing of the CPU chip.

17. South Bridge IC - Is a passion name as being south of the PCI


buses or PCI slots. The true name of the south bridge is I/O
Controller HUB (ICH). It is a type of microchip task to control all the
Input and output devices of the computer. Such as the keyboard and

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 28
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
mouse. And the monitor screen of the computer that commonly
found at the rear back of the CPU or system unit.

Motherboard Form Factors

When selecting a motherboard, generally, you’d need to pay


attention to the form factor, processor socket, chipset, buses and
number of bus slots, and other connectors, slots, and ports.

FORM MOTHERBOARD DESCRIPTION


FACTOR SIZE
ATX, full size Up to 12" x 9.6" This popular form factor has
(305mm × 244mm) had many revisions and
variations.
MicroATX Up to 9.6" x 9.6" Smaller version of ATX.
(244mm × 244mm)
Mini-ITX Up to 6.7" x 6.7" Small form factor used in
(a.k.a. ITX) (170mm x 170mm) low-end computers and
home theater systems. The
boards are often used with
an Intel Atom processor and
are sometimes purchased as
a motherboard-processor
combo unit.
FlexATX Up to 9" x 7.5" Smaller version of MicroATX.
BTX Up to 12.8" wide The BTX boards can have up
to seven expansion slots,
are designed for improved
airflow, and can use an ATX
power supply.
MicroBTX Up to 10.4" wide Smaller version of BTX and
can have up to four
expansion slots.
PicoBTX Up to 8" wide Smaller than MicroBTX and
can have up to two
expansion slots.
NLX Up to 9" x 13.6" Used in low-end systems
with a riser card.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 29
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
 Processor or CPU

The CPU attaches directly to a


CPU socket on the motherboard located
inside the computer. The CPU is inserted
into the socket pin-side-down and a
small lever helps to secure it. In the
pictured example, a large fan sits on top
of the CPU to help disperse heat.

The Central Processing Unit (CPU)


is responsible for interpreting and executing most of the commands
from the computer's hardware and software. It is often called the
"brains" of the computer.
Processor Sockets for Intel

INTEL USED BY DESCRIPTION


SOCKET PROCESSOR
NAMES FAMILY
LGA2011 Second Generation  2011 pins in the socket touch
(Sandy Bridge) Core 2011 lands on the processor,
i7 Extreme, Core i7, which uses a flip-chip land grid
Core i5, Core i3, array (FCLGA).
Pentium, and  Used in high-end gaming and
Celeron server computers and might
require a liquid cooling system.
LGA1155 Third Generation (Ivy  1155 pins in the socket touch
and Bridge) Core i7, Core 1155 lands on the processor.
FCLGA1155 i5 Second  The LGA1155 is currently the
Generation (Sandy most popular Intel socket and is
Bridge) Core i7 shown in Figure 4-5.
Extreme, Core i7,  Works with DDR3 memory and
Core i5, Core i3, was designed to replace the
Pentium, and LGA1156 socket.
Celeron
LGA1156 Core i7, Core i5,  1156 pins in the socket touch
or Socket Core i3, Pentium, 1156 lands on the processor,
H or H1 and Celeron which uses a flip-chip land grid
array (FCLGA).
 Works with DDR3 memory.
LGA1366 Core i7, Core i7  1366 pins in the socket touch
or Socket B Extreme 1366 lands on the processor.
 Works with DDR3 memory.
LGA771 or Core 2 Extreme  771 pins in the socket touch
Socket J 771 lands on the processor.
 Used on high-end workstations
and low-end servers.
LGA775 or Core 2 Extreme,  775 pins in the socket touch
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 30
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Socket T Core 2 Quad, Core 2 775 lands on the processor.
Duo, Pentium Dual-  Works with DDR3 and DDR2
Core, Pentium memory.
Extreme Edition,
Pentium D, Pentium
4, and Celeron
Socket 478 Pentium 4, Celeron  478 holes in the socket are
used by 478 pins on the
processor.
 Uses a dense micro Pin Grid
Array (mPGA).
Socket 423 Pentium 4  423 holes in the socket are
used by 423 pins on the
processor.
 39 x 39 SPGA grid.
Processor Sockets for AMD

AMD USED BY DESCRIPTION


SOCKET PROCESSOR
NAMES FAMILY
FM2 Used with the Trinity  904 holes for pins (PGA)
line of AMD  Uses AMD Piledriver
processors architecture with integrated
graphics controller in the
processor
 Works with DDR3 memory
 Soon to be released
FM1 AMD A4, A6, A8, E2,  905 holes for pins (PGA)
Athlon II  Works with DDR3 memory
AM3+ AMD FX  942 holes for pins (PGA)
 Uses Bulldozer architecture and
is compatible with AM3
processors
 Works with DDR3 memory
AM3 or Phenom II  941 holes for pins (PGA)
AMD3  Works with DDR3 or DDR2
memory
AM2+ or Phenom II, Phenom,  Works with DDR2 memory
AMD2+ and Athlon  940 holes for pins (PGA)
 Faster than AMD2
Socket F Opteron, Athlon 64  1207 pins for lands on the
(1207) or F FX bottom of the processor
 Used with servers and high-end
workstations
AM2, Athlon, Phenom,  940 holes for pins (PGA)
AMD2, or Sempron, Second  Works with DDR2 memory
M2 Athlon Generation Opteron
64,

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 31
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Socket 940 Athlon  940 holes for pins (PGA)
 Works with DDR memory
Socket 939 Athlon and Sempron  939 holes for pins (PGA)
 Works with DDR memory
Socket 754 Athlon and Sempron  754 holes for pins (PGA) Works
with DDR memory
Socket A Athlon, Sempron,  462 holes for pins (PGA) Works
and Duron with DDR memory

 Cooling System

 Heat sink: a heat sink is a passive cooling device. It


conducts heat away from the Central Processing Unit,
Northbridge by using a heat conductive metal, most
commonly aluminum or copper, sometimes in combination
with heat pipes. It uses air (most common) or in extreme
cooling situations, water, to remove the heat from the CPU.
When air is used, a fan is often used to increase cooling
effectiveness.

 Computer Fan: an example of an active cooling part. It is


usually used with a heatsink. Due to the moving parts, a fan
requires maintenance and possible replacement. The fan
speed or actual fan can be changed for more efficient or
quieter cooling.

 Water Block: A water block is a heat sink suited to use


water instead of air. It is mounted on the Motherboard and
has a hollow inside. Water is pumped through the water
block, transferring the heat into the water, which is then
usually cooled in a radiator. This is the most effective cooling
solution without extreme modification.

 Hard Disk Drives

A hard disk drive (often shortened as hard


disk, hard drive, or HDD) is a non-volatile
storage device that stores digitally encoded
data on rapidly rotating platters with
magnetic surfaces. It is where your OS

Date Developed: Document No.


Computer Systems November 2018 Issued by: Page 32
Servicing NC II Metro Dumaguete of 120
Developed by: College, Inc.
Install and Configure
Computer Systems Revision # 00
(Operating System) is stored. Hard disks have magnetic surfaces,
in this case, any devices that has magnet must be putted far away
from the hard disk.

 DVD/CD-ROM

DVD, also known as "Digital Versatile Disc" or "Digital


Video Disc", is an optical disc storage media format. Its main uses
are video and data storage. DVDs are of the same dimensions as
compact discs (CDs), but store more than six times as much data.

Variations of the term DVD often describe the way data is


stored on the discs: DVD-ROM (Read Only Memory) has data that
can only be read and not written; DVD-R and DVD+R can record
data only once, and then function as a DVD-ROM; DVD-RW,
DVD+RW, and DVD-RAM can both record and erase data multiple
times.

 The Memory

Memory is installed in memory sockets located on the


motherboard. These are easily locatable by looking for the small
hinges on either side that lock the memory in place.

RAM

Random-access memory (usually known by its acronym


RAM) is a form of computer data storage. Today, it takes the form of
integrated circuits (IC) that allow stored data to be accessed in any
order. The word random thus refers to the fact that any piece of
data can be returned in a constant time, regardless of its physical
location and whether or not it is related to the previous piece of
data.

Memory modules come with various storage capabilities.


Modern memory modules can be purchased in 256MB, 512MB, 1GB,
2GB, and 4GB sizes.

Types of RAM:

There are many different types of RAM which have appeared


over the years and it is often difficult knowing the difference
between them both performance wise and visually identifying them.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 33
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
This article tells a little about each RAM type, what it looks like and
how it performs.

 FPM RAM

FPM RAM, which stands for “Fast Page Mode” is a type


of Dynamic RAM (DRAM). The term “Fast Page Mode” comes
from the capability of memory being able to access data that
is on the same page and can be done with less latency. Most
486 and Pentium based systems from 1995 and earlier use
FPM Memory.

 EDO RAM

EDO RAM, which stands for “Extended Data Out RAM”


came out in 1995 as a new type of memory available for
Pentium based systems. EDO is a modified form of FPM RAM
which is commonly referred to as “Hyper Page Mode”.
Extended Data Out refers to fact that the data output drivers
on the memory module are not switched off when the memory
controller removes the column address to begin the next
cycle, unlike FPM RAM. Most early Pentium based systems use
EDO.

 SDRAM

SDRAM, which is short for Synchronous DRAM is a


type of DRAM that runs in synchronization with the memory
bus. Beginning in 1996 most Intel based chipsets began to
support SDRAM which made it a popular choice for new
systems in 2001.

SDRAM is capable of running at 133MHz which is about


three times faster than FPM RAM and twice as fast as EDO
RAM. Most Pentium or Celeron systems purchased in 1999
have SDRAM.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 34
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
 DDR RAM

DDR RAM, which stands for “Double Data Rate” which


is a type of SDRAM and appeared first on the market around
2001 but didn’t catch on until about 2001 when the
mainstream motherboards started supporting it. The
difference between SDRAM and DDR RAM is that instead of
doubling the clock rate it transfers data twice per clock cycle
which effectively doubles the data rate. DDRRAM has become
mainstream in the graphics card market and has become the
memory standard.

 DDR2 RAM

DDR2 RAM, which stands for “Double Data Rate 2” is


a newer version of DDR which is twice as fast as the original
DDR RAM. DDR2RAM came out in mid 2003 and the first
chipsets that supported DDR2 came out in mid 2004. DDR2
still is double data rate just like the original DDR however
DDR2-RAM has modified signaling which enables higher
speeds to be achieved with more immunity to signal noise and
cross-talk between signals.

 RAMBUS (RIMM) RAM

RAMBUS RDRAM is a type of ram of its own, it came out


in 1999 and was developed from traditional DRAM but its
architecture is totally new. The RAMBUS design gives smarter
access to the ram meaning that units can pre-fetch data and
free some CPU work. The idea behind RAMBUS RAM is to get
small packets of data from the RAM, but at very high clock
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 35
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
speeds. For example, SD RAM can get 64bit of information at
100MHz where RAMBUS RAM would get 16bits of data at
800MHz.

Memory Module and Bus Standards/Bandwidth

BUS
MODULE CLOCK CYCLES BUS TRANSFE
MODULE CHIP WIDTH
STANDAR SPEED PER SPEED R RATE
FORMAT TYPE (BYTE
D (MHZ) CLOCK (MT/S) (MBPS)
S)
FPM SIMM 60ns 22 1 22 8 177
EDO SIMM 60ns 33 1 33 8 266
PC66 SDR DIMM 10ns 66 1 66 8 533
PC100 SDR DIMM 8ns 100 1 100 8 800
PC133 SDR DIMM 7/7.5ns 133 1 133 8 1,066
PC1600 DDR DIMM DDR200 100 2 200 8 1,600
PC2100 DDR DIMM DDR266 133 2 266 8 2,133
PC2400 DDR DIMM DDR300 150 2 300 8 2,400
PC2700 DDR DIMM DDR333 166 2 333 8 2,667
PC3000 DDR DIMM DDR366 183 2 366 8 2,933
PC3200 DDR DIMM DDR400 200 2 400 8 3,200
PC3500 DDR DIMM DDR433 216 2 433 8 3,466
PC3700 DDR DIMM DDR466 233 2 466 8 3,733
PC4000 DDR DIMM DDR500 250 2 500 8 4,000
PC4200 DDR DIMM DDR533 266 2 533 8 4,266
PC2-3200 DDR2 DIMM DDR2-400 200 2 400 8 3,200
PC2-4200 DDR2 DIMM DDR2-533 266 2 533 8 4,266
PC2-5300 DDR2 DIMM DDR2-667 333 2 667 8 5,333
PC2-6000 DDR2 DIMM DDR2-750 375 2 750 8 6,000
PC2-6400 DDR2 DIMM DDR2-800 400 2 800 8 6,400
PC2-7200 DDR2 DIMM DDR2-900 450 2 900 8 7,200
DDR2-
PC2-8000 DDR2 DIMM 500 2 1000 8 8,000
1000
RIMM1200 RIMM-16 PC600 300 2 600 2 1,200

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 36
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
RIMM1400 RIMM-16 PC700 350 2 700 2 1,400
RIMM1600 RIMM-16 PC800 400 2 800 2 1,600
RIMM2100 RIMM-16 PC1066 533 2 1066 2 2,133
RIMM2400 RIMM-16 PC1200 600 2 1200 2 2,400
RIMM3200 RIMM-32 PC800 400 2 800 4 3,200
RIMM4200 RIMM-32 PC1066 533 2 1066 4 4,266
RIMM4800 RIMM-32 PC1200 600 2 1200 4 4,800

SELF-CHECK 1.1-2

I. Matching Type. Match the names with the corresponding


hardware components.

1. RAM a.

4. CPU b.

8. Motherboard c.

11. Power Supply d.

14. Hard Disk Drive e.

II. Identification. Identify the following back panel connectors

Computer Systems Date Developed: Document No.


Servicing NC II November 2018 Issued by:
Metro Dumaguete
Install and Configure College, Inc. Page 37
Developed by:
Computer Systems of 120
Revision # 00
ANSWER KEY 1.1-4

I. Matching Type

1. D
2. C
3. B
4. A
5. E

II. Identification

1. PS/2 Mouse Port


2. PS/2 Keyboard Port
3. HDMI Port
4. VGA Port
5. DVI Port
6. USB Ports
7. LAN Port

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 38
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 1.1-3
Tools, Equipment and Testing Devices

Learning Objectives:
After reading this information sheet, the reader will be able to:
1. Identify the different tools and equipment
2. Differentiate materials, tools and equipment devices

 Equipment - the necessary items for a particular purpose.


 Tools - any physical item that can be used to achieve a goal,
especially if the item is not consumed in the process.
 Testing Devices –

The following tools and equipment are classified according to their


functions and uses:

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 39
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
LAN Card – is a network interface card. This is a computer circuit board or
card that is installed in a computer so that it can be connected to a
network.

Server – is a part of a network. It is a special computer that users on the


network can access to carry out a particular job.

Scanner- it is an input device that read text or illustration printed on


paper, translates the information into a form that a computer can
use.

Printer - is a piece of hardware that produces a paper copy (also known


as ‘hardcopy’) of the information generated by the computer.

Flash Drive– retains data without electrical power. It is widely used for
BIOS chips and for digital camera and digital music storage

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 40
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Long Nose Pliers – is used for holding, bending and stretching the lead
of electronics component or connecting wire.

Soldering Iron – is used to join two or more metal conductors with the
support of soldering lead melted around it.

De-soldering Tool – is used to unsolder unwanted parts or component in


the circuit with the support of soldering pencil.

Philips Screw Driver- is used to drive or fasten positive slotted screws.


Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 41
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Flat Screw Driver – is used to drive or fasten negative slotted screws.

Anti-Static Wrist Strap- used to safely ground a person working on very


sensitive electronic equipment, to prevent the buildup of static
electricity on their body, which can result in electrostatic discharge
(ESD).

Multi-Tester - Used to test the integrity of circuits and the quality of


electricity in computer components.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 42
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
SELF-CHECK 1.1-3

A. IDENTIFICATION
Direction: Identify the following tools and equipment.

1. A

2. A

3.

4.

5.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 43
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
ANSWER KEY 1.1-2

A. IDENTIFICATION

1. LAN Card
2. Long Nose Pliers
3. Anti-Static Wrist Strap
4. Soldering Iron
5. Multi-Tester

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 44
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO.:1.1-4
Assembling Computer Hardware

Learning Objectives:
After reading this information sheet, the trainee will be able to:
1. Assemble Computer Hardware
2. Conduct Inventory

This set of instructions will help you assemble a basic computer


capable of running most modern software packages encountered by a
casual user. Modern computers become more affordable when users
supplement their monetary investment with a few hours of effort. This
computer build will be very basic and will be the minimum hardware
necessary to have a functional system. After you have all of the parts and
materials needed, it will take between 2 and 4 hours to assemble your
computer and you will need to be able to use simple hand tools, such as a
screwdriver and a pair of pliers.

Step 1: Procuring Parts

First you will need to buy the parts necessary to build the computer.
The parts we will use in this project are labeled in the image below:

1. Processor (CPU)
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 45
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
2. Computer Case or System Unit
3. Optical Drive (DVD RW and SATA capable)
4. Memory (RAM)
5. Power Supply
6. SATA Cables
7. Motherboard (SATA Capable)
8. Processor Fan
9. Case Fan
10. Hard Drive (SATA Capable)
11. Assortment of case and drive screws (Not Pictured)

Step 2: Gather Tools and Supplies

Gather the tools you will need for the project:

1. Screwdriver (for slotted and Phillips head screws)


2. Wire cutters and strippers
3. Needle-nosed pliers
4. Utility knife
5. Small flashlight
6. Adjustable wrench
7. Small container to hold screws
8. Heat sink compound
9. Grounding Strap

You may not use every single one of these tools in every installation,
but it is best to have all of them on hand in case you have a use for them.
Warning: Using incorrect tools for a task (such as turning a screw with a
knife blade) can cause equipment damage and bodily injury.

Step 3: Open the Case

Open the computer case by removing the side panels. Find the
screws that hold the side panels in place and remove them (shown in
figure 3 circled in red). The panel is removed by first sliding it back then
lifting it away from the case.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 46
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Step 4: Ground Yourself

Put the grounding strap on your wrist (see image below) and
connect the other end to the computer case. If your strap is not equipped
with a clip to hook to the case, find a place to wedge against the metal as
shown in figure 11. This will prevent any buildup of static electricity on
your body from damaging the computer components.

Caution: Static electricity can ruin computer components. Always wear a


grounding strap when handling any internal components.

Step 5: Install Motherboard

To install the motherboard we need parts that should have been


included with your purchased components:

1. I/O Bezel is a trim panel installed in the back of the case that
surrounds the interface ports on the motherboard. It should be
included with the motherboard. The image below shows the
contents of the motherboard box.
2. Standoffs are installed in the case screw holes to create a riser that
separates the case and motherboard. The screws install into the
standoffs. Screws and standoffs should be included with the case,
but it is a good idea to order these items just in case they aren't
included.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 47
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Follow these steps to install the motherboard in the case:

1. Install the I/O bezel plate into the opening in the back of the
case. It pushes in from the inside.
2. Install standoffs in the case. The standoffs screw into the
motherboard mounting holes. Check the screw hole locations on
the motherboard for exact placement.
3. Lower the motherboard into the case and align with the I/O bezel.
4. Install the screws.

Caution: To prevent damage to the motherboard it must only contact the


standoffs and screws. All of the standoffs and screws must be installed.

Step 6: Install Hard Drive

The hard drive is the device that stores all of your data. It is 3.5"
wide and needs to be mounted so that you can gain access to the cable
connections on the back. If that is not possible you may need to connect
cables before you install the drive. To mount the drive:

1. Find a 3.5" drive bay to install the drive in. If you have trouble
finding a place to mount the drive consult your case documentation
for suggestions.
2. Slide the drive into place until the screw holes on the sides are lined
up with the holes in the case.
3. Install the screws.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 48
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Step 7: Install the CPU

The CPU is the brain of the computer. It is installed on the


motherboard in the socket shown in figure 20.To install the CPU:

1. Find the corner marking that designates pin 1 of the CPU. On this
AMD brand processor, the corner is marked with an arrow. Consult
the manufacturer's documentation for specific information about
your processor.
2. Lift the small metal rod next to the socket as shown in the image
below.
3. Find the corresponding marking on the CPU socket and insert the
CPU so that the markings are lined up.
4. Push the rod down to lock the processor in place.

Step 8: Install RAM

The RAM is the temporary memory location that the processor works
from. Permanently stored data is pulled from disks and stored in RAM
while the processor works with it. The memory is easy to install:

1. Set the RAM board in the socket as shown in the image below on
the left side. Check to see that the notch in the board is in the
correct location. If it is not, turn it around 180º.
2. Press firmly on both ends of the board to set it into the socket.
Make sure the tabs lock into place as shown in the image below
on the right side.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 49
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Caution: Pressing the boards in when the tab is not aligned could cause
damage to the RAM boards as well as the motherboard.

Step 9: Install Power Supply

Consult your case documentation for details and then follow these
directions to install the power supply:

1. Align the mounting holes in the case and power supply as shown in
the image below.
2. Insert screws and tighten.

Step 10: Connect Cables

With all of the components installed in the case, the jungle of wires
can be daunting. It is important to consult the motherboard manual in
order to make sure proper connections are made. There are two kinds of
connections, power and data.

 Every device that has been installed needs power. In the image
below, the power supply connectors are shown. The motherboard
has two power connections, and there are two connectors
specifically for SATA devices (drives). The other connectors will run
fans and other non-SATA devices.
 Data cables connect drives and front panel devices to the
motherboard. Please consult the motherboard documentation for
the exact placement of connectors.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 50
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Warning: Incorrect connections can damage components and cause bodily
injury.

Step 11: Wrap Up

Now that the components are completely installed, the last thing to
do is to reinstall the side panels on the case. The computer is now ready
to be turned on and to have software loaded on it. If the computer has
problems starting up, check all component connections and mounting to
make sure that you have hooked everything up correctly. Consult
individual component manuals for specific troubleshooting information if
problems persist.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 51
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 1.1-4
Title: Procedures in Assembling Computer Hardware

Performance Objective: Given the procedures in Assembling


Computer Hardware, you should be able to
assemble computer hardware in accordance
with the industry standards.
Supplies/Materials : Computer Manuals, Handouts

Equipment and Tools : Computer with peripherals, Screw


Drivers
Procedure:
1. Gather all Materials
2. Open the case.
3. Ground yourself
4. Install motherboard
5. Install hard drive
6. Install the CPU
7. Install RAM
8. Install Power Supply
9. Connect Cables
10. Wrap-Up / Cover the case
Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 52
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CHECKLIST 1.1-4
CRITERIA
YES NO
Did you….
1. Gather all Materials?
2. Open the case?
3. Ground yourself?
4. Install motherboard?
5. Install hard drive?
6. Install the CPU?
7. Install RAM?
8. Install Power Supply?
9. Connect Cables?
10. Wrap-Up / Cover the case?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 53
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION 1.1-4
Configuring BIOS Setting

Learning Objectives:
After reading the information sheet, the trainees will be able to:
1. Configure BIOS setting
2. Identify the function of BIOS

This section describes how to view and/or modify the Basic


Input/output System (BIOS) settings. The BIOS Setup utility reports system
information and can be used to configure the server BIOS settings.

BIOS have a Setup utility stored in the BIOS flash memory. The
configured data is provided with context-sensitive Help and is stored in
the system's battery-backed CMOS RAM. If the configuration stored in the
CMOS RAM is invalid, the BIOS settings default to the original state
specified at the factory.

Principal Duties of the BIOS during POST:

Power on Self-Test (POST) is a process performed by firmware or


software routines immediately after a computer or other digital electronic
device is powered on.

1. Identify, organize and select which devices are available for booting
2. Find, Size and Verify system main memory
3. Verify CPU Registers
4. Verify the integrity of the BIOS code itself.
5. Verify basic components like timer, interrupt controller.

Access BIOS Utilities

Access BIOS set-up configuration and to change the system’s


parameters, complete the following:

1. Start the computer.

2. Press ESC, F12, DELETE, or F10 during the initial startup


screen. Depending on the BIOS manufacturer, a menu may
appear.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 54
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
3. Use the left and right arrow keys to select the different menu
options.

4. To select an option on a top-level screen, use the up and down


arrow keys to scroll up and down the options presented.

5. Modify the setup field and press the ESC or backspace key to
save the changes and exit the screen

6. On sub-screens that only provide configuration information and


cannot be modified, press the Esc key to exit the screen.

7. To continue modifying other setup parameters, repeat Step 3


through Step 6. Otherwise, go to Step 8.

8. Press and release the right arrow key until the Exit menu screen
appears.

9. Follow the instructions on the Exit menu screen to save or discard


your changes and exit the BIOS Setup utility.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 55
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
BIOS SETUP SCREENS SUMMARY
SCREE DESCRIPTION
N
General product information, including BIOS type,
Main
processor, memory, and time/date.
Configuration information for the CPU, memory, IDE,
Advanced Super IO, trusted computing, USB, PCI, MPS and
other information.
Configure the server to clear NVRAM during system
PCI
boot.
Configure the boot device priority (storage drives
Boot
and the DVD-ROM drive).
Security Set or change the user and supervisor passwords.
Chipset View the configuration of server chipsets.
Save changes and exit, discard changes and exit,
Exit
discard changes, or load optimal or fail-safe defaults.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 56
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 1.1-5
Title: Procedures in Configuring BIOS Settings

Performance Objective: Given the procedures in Configuring BIOS


setting, you should be able to change the
settings of the BIOS.
Supplies/Materials : Computer Manuals, Handouts
Equipment : Computer with peripherals

Steps/Procedure:
1. Start the Computer
2. Press the DEL button to enter bios utility menu
3. Use the Left – Right Arrow to move menu settings
4. Modify the setup field and press the ESC or backspace key to
save the changes and exit the screen
5. Press and release the right arrow key until the Exit menu
screen appears.
6. Follow the instructions on the Exit menu screen to save or
discard your changes and exit the BIOS Setup utility.
Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 57
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA 1.1-5

CRITERIA
YES NO
Did you….
1. Start the Computer?
2. Press the DEL button to enter bios utility menu?
3. Use the Left – Right Arrow to move menu
settings?
4. Modify the setup field and press the ESC or
backspace key to save the changes and exit the
screen?
5. Press and release the right arrow key until the
Exit menu screen appears?
6. Follow the instructions on the Exit menu screen
to save or discard your changes and exit the
BIOS Setup utility?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 58
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
LEARNING OUTCOME NO. 2: PREPARE INSTALLER

Assessment Criteria:
1. Portable bootable devices are created in accordance with software
manufacturer instruction
2. Customized installers are prepared in accordance with software
utilization guide and end user agreement.
3. Installation of portable applications are carried out in accordance
with software user guide and software license

Contents
 Creating portable bootable devices.
 Preparing customized installers.
 Installation of portable applications.

Conditions
The students/trainees must be provided with the following:
 Tools and test instruments
 PC or workstation
 Computer peripherals/devices
 Appropriate OS, drivers and software applications/programs

Methodologies
 Lecture-demonstration
 Self-paced instruction
 Group discussion

Assessment methods
1. Hands-on
2. Direct observation
3. Practical demonstration

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 59
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Learning Experiences

Learning Outcome 2

PREPARE INSTALLER
Learning Activities Special Instructions
Read Information Sheet No. 2.1-1
on Different Types of Bootable
Software

Answer Self-Check No. 2.1-1


Checking answers with Answer
Key 2.1-1
Read Information Sheet 2.1-2
Create Customized Installers

Perform Task Sheet No. 2.1-2


Self-Check using Performance
Criteria Checklist 2.1-2
Read Information Sheet 2.1-3
Installation of Portable
Applications

Perform Task Sheet No. 2.1-3


Self-Check using Performance
Criteria Checklist 2.1-3

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 60
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET 2.1-1
Different Types of Bootable Software

Learning Objectives:
After reading this information sheet, the trainee will be able to:
1. Identify the different bootable makers

What is Boot, Booting and Bootable Devices?

Here’s the story of a technical word called boot, normally we use


this word to describe ‘startup’ in our computer system and it can our
computer’s bios or maybe our system’s hard drive etc.

Mainly this word “boot” comes from the word Bootstrapping and
this bootstrapping term originally appears in early 19th century in the
United States.

A Boot Loader is a computer program which is responsible for


managing and starting operating system software of the computer after
when the power-on self-tests gets completed.

Once the bios initialize the operating system, it starts to copy its
files into the computer memory and after that; the Operating System
basically takes control over the whole booting process.

What Is Bootable Device?

In a computer language, a bootable device a storage device where


boot loader is located and have a free access for your bios to compile it, in
a normal language a bootable device is a part of computer hardware that
can read or contains the files required for a computer to start.

Installations from a USB flash drive have become one of the easiest
ways to update your computer with a new operating system. A USB
installation is quick, extremely portable, and has the bonus of reverting to
a storage device following the install.

You’ll find a fair few ISO to USB tools out there, and they feature a
range of tools for beginners and advanced users. Let’s take a look at the
burn time, and the resources available to each software.

Now, in no particular order, here are the ISO to USB burning tools
with their respective times:

1. RUFUS
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 61
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Features: Partition schemes, file
systems, automatic ISO detection, target
system type, mode of bootable, bad
sector checks, ISO write mode.

First up, Rufus. Rufus is a very small


executable that has consistently
improved its offerings over the years.
Along with standard ISO to USB options
such as cluster size and file system,
Rufus now automatically detects
settings for the ISO you select and fills in
the optimal settings. Rufus clocked in at
21m12s which is definitely not the
fastest. Regardless, Rufus is an excellent
ISO to USB tool.

2. Windows USB/DVD Download Tool

Features: None

Such an eloquent name.


You select your ISO. You select
your media type; USB or DVD.
You click Begin Copying, and off
it goes. In what is the most basic
of basic UIs, and with only two
options, the Windows USB/DVD
Download Tool is almost
sublimely simple, comparable
only to ISO to USB.

Windows USB/DVD
Download Tool came home in
17m51s which puts it toward the
top of the ISO to USB timings
board.

3. YUMI

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 62
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Features: Multiboot,
ISO auto-download

YUMI (Your
Universal
Multiboot Installer)
is another multiboot
ISO to USB installer
with settings for a
vast range of Linux,
Windows, and system
utility ISOs. YUMI is
easy to use. You scroll
down the distribution
list and check for the
ISO you want, then
select the
corresponding ISO on
your system from the
box below.

4. WinSetUpFromUSB

WinSetUpFromUSB is yet
another popular and feature-rich
bootable media creator for
Windows. Though
WinSetUpFromUSB is specifically
designed to create bootable
Windows drives, you can also
create bootable Linux
distributions using SysLinux or
IsoLinux. Apart from creating
boot drives for regular operating
systems, WinSetUpFromUSB is
also capable of creating
bootable media for WinBuilder,
WinPE, BartPE, UBCD4Win, etc.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 63
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
SELF-CHECK NO. 2.1-1

I. IDENTIFICATION

1. A storage device where boot loader is located and have a free


access for your bios to compile it.
2. A computer program which is responsible for managing and
starting operating system software of the computer after when
the power-on self-tests gets completed.
3. Describe ‘startup’ in our computer system.

II. ENUMERATION

1. Name the different USB tools to create a bootable devices.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 64
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
ANSWER KEY NO. 2.1-1

I. IDENTIFICATION

1. Bootable Devices
2. Booting
3. Boot

II. ENUMERATION
1. Rufus
2. Yumi
3. Windows USB/DVD Download Tool
4. WinSetUpFromUSB

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 65
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 2.1-2
Create Customized Installers

Learning Objectives:
After reading this information sheet, the reader will be able to:
1. Create customize installers
2.

Create bootable USB drives the easy way using RUFUS

Rufus is a utility that helps format and create bootable USB flash
drives, such as USB keys/pen drives, memory sticks, etc.

It can be especially useful for cases where:

 You need to create USB installation media from bootable ISOs


(Windows, Linux, UEFI, etc.)
 You need to work on a system that doesn't have an OS
installed
 You need to flash a BIOS or other firmware from DOS.
 You want to run a low-level utility.

Despite its small size, Rufus provides everything you need!

Requirements:
 Windows XP or later, 32 or 64 bit doesn't matter.
 Rufus Application
 ISO file
 Flash Drives

Use Rufus to Write an .ISO File

1. Download Rufus. Rufus is a standalone program and does not require


installation.

2. Insert Flash Drive to your USB port.

3. Open the Rufus program from where you downloaded it to run it.

4. Select Create a bootable disk using and choose ISO Image from the
drop-down menu. Click the disc icon and browse to your Windows .iso
file and select it.

5. To ensure the flash drive is compatible with UEFI, select FAT32 for "File
System".
6. To create the flash drive with the "Press any key to boot from USB"
prompt, select the Create extended label and icon files option.
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 66
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
7. When you are done selecting options, click Start When prompted,
confirm that you want to erase the flash disk.

8. The .iso files will start copying to the flash drive (the process can take
several minutes). When Rufus is done, close the program and eject and
remove the flash drive.

TASK SHEET 2.1-2


Title: Procedures in creating bootable device using RUFUS

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 67
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Performance Objective: Given the procedures in creating bootable
flash drive, you should be able to create a bootable
flash drive.
Supplies/Materials : Computer Manuals, Handouts

Equipment : Computer with peripherals, Flash Drives

Steps/Procedure:
1. Download Rufus. Rufus is a standalone program and does not require
installation.
2. Insert Flash Drive to your USB port
3. Open the Rufus program from where you downloaded it to run it.
4. Select create a bootable disk using and choose ISO Image from the drop-
down menu.
5. Click the disc icon and browse to your Windows .iso file and select it.
6. To ensure the flash drive is compatible with UEFI, select FAT32 for "File
System".
7. When you are done selecting options, click Start When prompted, confirm
that you want to erase the flash disk.
8. The .iso files will start copying to the flash drive (the process can take
several minutes).
9. Wait until Rufus message box pop-up and says successful.
10. When Rufus is done, close the program and eject and remove the
flash drive
Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 68
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA NO. 2.1-2
CRITERIA
YES NO
Did you….
1. Download RUFUS?
2. Insert flash drive to your USB port?
3. Open the Rufus program?
4. Select create a bootable disk using and choose
ISO Image from the drop-down menu?
5. Click the disc icon and browse to your
Windows .iso file and select it?
6. Ensure the flash drive is compatible with UEFI;
select FAT32 for "File System"?
7. Start when prompted; confirm that you want to
erase the flash disk?
8. See Rufus message box pop-up and says
successful?
9. Close the program and eject and remove the
flash drive?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 69
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 2.1-3
Installation of Portable Applications

Learning Objectives:
After reading this information sheet, the trainee will be able to:
1. Identify the different portable applications
2. Install a portable application

A portable application (portable app) is a software product


designed to be easily moved from one computing environment to another.
They include portable versions of regular applications – such as browsers,
for example – as well as specialized apps designed to enhance mobile
computing. Portable apps are typically open source and either free, low-
cost or donation-funded.

Portable apps are usually stored on USB drives but can be stored on
some other flash media. A portable app may also be uploaded to a cloud
storage service, such as Dropbox or Google Drive, and accessed online. In
either case, portable apps can be used on any compatible device,
wherever the user is.

A portable app is not installed and as a rule, does not put associated
files and configuration information on the host device but stores all
application files and data together. Because files and data are self-
contained, portable apps run independently of the host operating system
(OS).

Nevertheless, portable apps are created for compatibility with


specific operating systems. The portability in portable apps refers to the
way they can be physically carried from one place to another, not
interoperability among different operating systems. Software portability (a
different concept) involves software that is written so that the source code
can be compiled for different platforms.

Portable Windows Applications

A portable application does not leave its files or settings on the host
computer or modify the existing system and its configuration. The
application does not write to the Windows registry or store its
configuration files (such as an INI file) in the user's profile; instead, it
stores its configuration files in the portable directory. Another
requirement, since file paths will often differ on changing computers due
to variation in Windows drive letter assignments, is the need for
applications to store them in a relative format. While some applications
have options to support this behavior, many programs are not designed to
do this. A common technique for such programs is the use of a launcher
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 70
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
program to copy necessary settings and files to the host computer when
the application starts and move them back to the application's directory
when it closes.

An alternative strategy for achieving application portability within


Windows, without requiring application source code changes, is
application virtualization: An application is "sequenced" or "packaged"
against a runtime layer that transparently intercepts its file system and
registry calls, then redirects these to other persistent storage without the
application's knowledge. This approach leaves the application itself
unchanged, yet portable.

The same approach is used for individual application components:


run-time libraries, COM components or ActiveX, not only for the entire
application. As a result, when individual components are ported in such
manner they are able to be: integrated into original portable applications,
repeatedly instantiated (virtually installed) with different
configurations/settings on the same operating system (OS) without mutual
conflicts. As the ported components do not affect the OS-protected related
entities (registry and files), the components will not require administrative
privileges for installation and management.

Microsoft saw the need for an application-specific registry for its


Windows operating system as far back as 2005. It eventually incorporated
some of this technology, using the techniques mentioned above, via its
Application Compatibility Database using its Detours code library, into
Windows XP. It did not make any of this technology available via its
system APIs.

Portability on Linux and Unix-like Systems

Programs written with a Unix-like base in mind often do not make


any assumptions. Whereas many Windows programs assume the user is
an administrator—something very prevalent in the days of Windows
95/98/ME (and to some degree in Windows XP/2000, though not in
Windows Vista or Windows 7)—such would quickly result in "Permission
denied" errors in Unix-like environments since users will be in an
unprivileged state much more often. Programs are therefore generally
designed to use the HOME environment variable to store settings (e.g.
$HOME/.w3m for the w3m browser). The dynamic linker provides an
environment variable LD_LIBRARY_PATH that programs can use to load
libraries from non-standard directories. Assuming /mnt contains the
portable programs and configuration, a command line may look like:

A Linux application without need for a user-interaction (e.g. adapting


a script or environment variable) on varying directory paths can be

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 71
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
achieved with the GCC Linker option $ORIGIN which allows a relative
library search path

Not all programs honor this—some completely ignore $HOME and


instead do a user look-up in /etc/passwd to find the home directory,
therefore thwarting portability.

There are also cross-distro package formats that do not require


admin rights to run, like Autopackage, klik (now called AppImage), or CDE,
but which gained only limited acceptance and support in the Linux
community in the 2000s.[6][7][8] Around 2015 the idea of portable and
distro independent packing for the Linux ecosystem got more traction
when Linus Torvalds discussed this topic on the DebConf 2014 and
endorsed later AppImage for his dive log application Subsurface.[9][10]
[11] For instance, MuseScore and Krita followed in 2016 and started to use
AppImage builds for software deployment.[12][13] RedHat released in
2016 the Flatpak system, which is an successor of Alexander Larsson's
glick project which was inspired by klik (now AppImage).[14] Similarly,
Canonical released in 2016 Snap packages for Ubuntu and many other
Linux distros.

Downloading and Installing - Step By Step

If you're not as familiar with downloading software and then


installing it where you need it to be, this is the guide for you. It explains in
a step by step fashion, how to download an app (or the suite) and install it
to the portable device of your choice.

Downloading:

1. Decide What You Want - The first step is to decide what you want
to get. Do you want a copy of Firefox Portable to run by itself? Or do
you want to download the full PortableApps Suite so you have a
whole platform for portable apps? For most folks, getting the whole
suite is recommended.

2. Browse to the App Page - Now that you've decided what you'd
like to get, browse to the app's page with its logo and the big
download button. If you scroll down to the download details section
of that page, it'll tell you how much space it will take up on your
device.

3. Click the Download Button - Click the big red download button

4. Select a Mirror - The next page lets you select a mirror. This is just
a technical way of saying, select a download server that's close to
you geographically so your download will be faster. You'll see
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 72
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
servers all over the world. Pick one nearby and then click the
Download link in the right-hand column of the table for the server
you've chosen.

5. Save it Locally - Your browser will usually ask you where you'd like
to save the file at this point. We recommend saving it right to your
computer's desktop so it's easy to find.

6. Wait for it to finish - The download will begin. After it finishes, you
can move on to installing

Installing:

Now, installing is a bit different depending on whether you are


installing the suite, installing an app within the suite or just installing a
standalone app.

Installing the Portable Apps

1. Start the Installer - Find the installer you downloaded in the steps
above (usually on your desktop) and double-click it to start the
install process.

2. Install To - The installer will ask where you'd like to install to. It's
best to select the "root directory" of your portable device. So, if your
portable device is plugged in and shows up as drive E in Windows
Explorer, you'd select the path E:\ You can easily just click the
browse button next to the Install To line and then select your drive
and click OK to fill this in.

3. Click Ok - Once you're sure you've picked the right place to install
to, just click ok.

4. Waiting - Installation will take a while. It will take anywhere from 1


to 20 minutes depending on the speed of your drive. There will be
times where the progress bar isn't moving during this time. Be
patient. It's installing. If your portable device has a little light on it
that lights up when it's being used, you'll see it flickering.

5. You're done - Once the install window goes away, it's installed. You
can use the suite by browsing to your portable device and double-
clicking on the StartPortableApps.exe file.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 73
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Installing an App Manually

1. Start the Installer - Find the installer you downloaded in the steps
above (usually on your desktop) and double-click it to start the
install process

2. Install To - The installer will ask where you'd like to install to. It's
usually recommended you keep your apps in a PortableApps
directory on your portable device to keep things organized. So, if
your portable device is plugged in and shows up as drive E in
Windows Explorer, you'd select the path E:\PortableApps\ You can
easily just click the browse button next to the Install To line and then
select this directory and click OK to fill this in.

3. Click Ok - Once you're sure you've picked the right place to install
to, just click ok.

4. Waiting - Installation will take a while. It will take anywhere from 1


to 10 minutes depending on the speed of your drive and the app
you selected. There will be times where the progress bar isn't
moving during this time. Be patient. It's installing. If your portable
device has a little light on it that lights up when it's being used,
you'll see it flickering.

5. Install Done - Once the install window goes away, it's installed. You
can use your software by browsing to the location you installed it to
and double-clicking on the launcher (For Firefox Portable, for
instance, it would be FirefoxPortable.exe). If you're using the
PortableApps Menu and you installed manually, just click Options
and then Refresh App Icons within the menu to make your new app
show up.

TASK SHEET 2.1-1

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 74
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Title: Procedures in Installing Portable Applications
Performance Objective: Given the procedures in installing portable
applications

Supplies/Materials : Computer Manuals, Handouts

Equipment : Computer with peripherals, Flash Drives

Steps/Procedure:
1. Start the installer(Click setup.exe)
2. Installed to.. (the path you want)
3. Click Ok
4. Wait for the application to finish
5. Click Done
Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 75
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA NO. 2.1-3

CRITERIA
YES NO
Did you….
1. Start the installer (Click setup.exe)?
2. Installed to.. (the path you want)?
3. Click Ok?
4. Wait for the application to finish?
5. Click Done?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 76
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
LEARNING OUTCOME NO. 3: INSTALL OPERATING SYSTEM
AND DRIVERS FOR
PERIPHERALS /DEVICES

Assessment Criteria:
1. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
2. Peripherals/devices drivers are installed and configured in
accordance with manufacturer’s instructions and/or OS installation
procedures.
3. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer’s recommendations and
requirements
4. On-going checks of the quality of the work are undertaken in
accordance with established procedures

Contents
 Install operating system (OS)
 Install peripherals/devices drivers.
 OS and drivers updates/patches.

Conditions
 The students/trainees must be provided with the following:
 Tools and test instruments
 PC or workstation
 Computer peripherals/devices
 Appropriate OS, drivers and software applications/programs

Methodologies
 Lecture-demonstration
 Self-paced instruction
 Group discussion

Assessment Methods

1. Hands-on
2. Direct observation
3. Practical demonstration

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 77
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Learning Experiences

Learning Outcome 3

INSTALL OPERATING SYSTEM AND DRIVERS FOR


PERIPHERALS/ DEVICES
Learning Activities Special Instructions
Read Information Sheet No. 3.1-1
Operating System

Perform Task Sheet No. 3.1-1


Self-Check using Performance
Criteria Checklist No. 3.1-1
Read Information Sheet 3.3-2
Device Drivers or Peripheral
drivers

Perform Task Sheet No. 3.1-2


Self-Check using Performance
Criteria Checklist No. 3.1-2
Read Information Sheet 3.3-3 The
Importance of Updating our
Operating System and Device
Drivers

Perform Task Sheet No. 3.1-3


Self-Check using Performance
Criteria Checklist No. 3.1-3

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 78
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET 3.1-1
Operating System

Learning Objectives:
1. Explain the functions of an Operating System
2. Differentiate Operating system from other System Programs
3. Identify widely used Operating systems

Software

Software is a set of programs and data that a computer uses. It is


kept on a hardware device such as a hard disk or floppy disk, but it is
intangible. Say that you have a floppy disk with a program saved on it.
Now say that you erase the program from the disk. The atoms and
molecules of the disk are the same ones as before, but now the program
is "gone." The intangible software has been removed without removing
anything tangible.

Software consists of both programs and data. Programs are lists of


instructions for the processor. Data can be any information that a program
needs: character data, numerical data, image data, audio data, and
countless other types. The distinction between programs and data is not
as clear-cut as you might think, however.

Fundamental Idea: Both programs and data are saved in


computer memory in the same way. The electronics of computer memory
(both main memory and secondary memory) make no distinction between
programs and data.

The insight that both programs and data can be saved using the
same electronic methods is one of the most important ideas in computer
science. Computer systems can use their memory for whatever needs
arise.

Types of Programs

There are two categories of programs. Application programs


(usually called just "applications") are programs that people use to get
their work done. Computers exist because people want to run these
programs. System programs keep all the hardware and software running
together smoothly. The difference between "application program" and
"system program" is fuzzy. Often it is more a matter of marketing than of
logic.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 79
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
APPLICATION PROGRAMS SYSTEM PROGRAMS
Word processors Operating system
Game programs Networking system
Spreadsheets Database system
Data base systems Programming language software
Graphics programs Web site server
Web browsers Data backup

The most important systems program is the operating system. The


operating system is always present when the computer is running. It
coordinates the operation of all the hardware and software components of
the computer system. The operating system is responsible for starting
application programs running and finding the resources that they need.
When an application program is running, the operating system manages
the details of the hardware for it. For example, when you type characters
on the keyboard, the operating system determines which application
program they are intended for and does the work of getting them there.

Modern operating systems usually come with a user interface that


enables users to easily interact with application programs (and with the
operating system itself) by using windows, buttons, menus, icons, the
mouse, and the keyboard. Examples of operating systems are Unix,
Windows 98, Windows NT, Linux, Solaris, and System 7.

Operating System

The operating system is a complex collection of many programs


concerned with keeping the hardware and software components of a
computer system coordinated and functioning. It is like a shop keeper who
keeps a shop in order by attending to customers, handling supplier
deliveries, stocking the shelves, doing the bookkeeping, and so on.
The operating system is software; the same hardware can be used
with many different operating systems (although only one at a time.)
Sometimes the operating system on a computer becomes corrupted
(perhaps because of a computer virus) and must be tediously re-installed.
Until it is up and running again, other programs will not be available.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 80
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Structures of Operating System

Ring Structure

The image above is a typical representation of operating System


(OS) as a ring-structure that you may find in reference book mainly for
UNIX OS. The outermost is the user ring and the innermost is the
hardware. In operating system programming we do not deal a lot with the
hardware (except the I/O and leave the hardware designer to do that
works) so we normally reach at the kernel as the innermost. If comparing
to the earth, the core or kernel should be the innermost. From the Figure,
there is no way the user can directly access other ring layer without going
through the other ring layers so we need interfaces, for example,
implemented as Application Programming Interfaces (APIs) etc. A
supervisor, also a user but with higher privileges normally having the
control of the operating system.

The image on the next page illustrates the overall structure of


Windows NT. Its highly modular structure gives Windows NT the flexibility.
NT can execute on variety of hardware platforms and supports
applications written for a variety of other OSes too. As virtually all OSes,
NT separates application-oriented software from OS software. The latter
runs in what is generally referred to as privileged mode or kernel mode.
Kernel-mode software has access to system data and to the hardware.
The remaining software, running in user mode, has limited access to
system data. The kernel-mode software is referred to as the NT executive.
Whether it is running on a uniprocessor or multiprocessor, a CISC (Intel) or
RISC (Motorola) system, most of NT sees the same view of the underlying
hardware. To achieve this independence, the OS system consists of four
layers:

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 81
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Layered Structure

1. HAL: Maps between generic hardware commands and responses


and those unique to a specific platform such as Intel Pentium, a
Motorola PowerPC or the defunct DEC Alpha processor. The HAL
makes each machine’s system bus, DMA controller, interrupt
controller, system timers and memory module look the same to the
kernel. It also delivers the support needed for symmetric
multiprocessing (multi-processor). Through the HAL NT system
should be platform independent.

2. Kernel: Consists of the most used and most fundamental


components of the OS. The kernel manages scheduling and context
switching, exception and interrupt handling, and multiprocessor
synchronization.

3. Subsystems: Include a variety of modules for specific functions,


which make use of the basic services provided by the kernel.

4. System services: Provide an interface to user-mode software.

From the image also we can see that the I/O Manager subsystem
bypasses the HAL to interact directly with the hardware. This is necessary
to achieve the efficiency and throughput required for I/O operation. The
protected subsystems are those parts of NT that interact with the end
user. A protected subsystem provides a graphical or command-line user
interface that defines the look and feel of the OS for a user. Additionally,
each protected subsystem provides the application programming interface
(API) for that particular operating environment. This means that
applications created for a particular operating environment may run
unchanged on NT because the OS interface that they see is the same as
that for which they were written.

Starting a Program
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 82
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
When a computer is started up, the hardware will automatically load
the operating system and start it running. This process is called booting.
The reason for this odd term is that the operating system is itself involved
in getting itself running---a process that is like someone "pulling
themselves up by their bootstraps." Once the operating system is running,
it is used to start up any other program.

Tasks of OS when running an application program.

1. The OS determines the name of the application.

2. The OS finds the section of the hard disk where the application
program and its data are stored.

3. The OS finds an unused section of main memory that is large


enough for the application.

4. The OS makes a copy of the application and its data in that section
of main memory.

 The software on the hard disk is unchanged; a copy of it has


been made in main memory

5. The OS sets up resources for the application.

6. Finally, the OS starts the application running.

As the application runs, the OS is there in the background managing


resources, doing input and output for the application, and keeping
everything else running.

Different Types of Operating System

Different operating systems run on different types of hardware and


are designed for different types of applications. For example, iOS is
designed for iPhones and iPad tablets, while Mac desktops and laptops use
macOS. Your computer or smartphone comes equipped with an OS, but
you can install another one in some cases.

 Microsoft Windows

Microsoft Windows has existed in one form or another since


1985, and it remains the most popular operating system for home
and office computers. Its latest versions, including Windows 10, are
also used on some tablets, and the OS is used on some web and

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 83
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
number-crunching server computers as well. Computers from a wide
variety of manufacturers can use Windows.

Initial versions of Windows worked with an earlier Microsoft


operating system called MS-DOS, providing a modern graphical
interface on top of DOS's traditional text-based commands.
Signature features of Microsoft Windows's user interface include
windows themselves – rectangle-shaped, on-panel screens that
represent individual applications. The Windows Start menu has
helped generations of users find programs and files on their devices.

Efforts to use versions of the Windows OS for smartphones


have been less successful.

 Apple iOS

Apple's iOS is one of the most popular smartphone operating


systems, second only to Android. It runs on Apple hardware,
including iPhones, iPad tablets and iPod Touch media players.

Signature features of iOS include the App Store where users


buy apps and download free software, an emphasis on security
including strong encryption to limit what unauthorized users can
extract from the phone, and a simple, streamlined interface with
minimal hardware buttons.

 Google's Android OS

Android is the most popular operating system in the world


judging by the number of devices installed. Largely developed by
Google, it's chiefly used on smartphones and tablets. Unlike iOS, it
can be used on devices made by a variety of different
manufacturers, and those makers can tweak parts of its interface to
suit their own needs.

Users can download custom versions of the operating system


because large portions of it are open source, meaning anyone can
legally modify it and publish their own. However, most people prefer
to stick with the version that comes on their devices.

Android, like iOS, comes with an application and media store


called the Play Store built by Google. Some phone manufacturers
and other organizations also offer their own stores to install software
and media.

 Apple macOS

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 84
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Apple's macOS, successor to the popular OS X operating
system, runs on Apple laptops and desktops. Based in part on the
historic family of Unix operating systems dating back to research in
the 1960s at AT&T's Bell Labs, macOS shares some features with
other Unix-related operating systems including Linux. While the
graphical interfaces are different, many of the underlying
programming interfaces and command line features are the same.

Signature elements of macOS include the dock used to find


programs and frequently used files, unique keyboard keys including
the Command key, and the stoplight-colored buttons used to resize
open program windows. MacOS is known for its user-friendly
features, which include Siri, a natural-voice personal assistant, and
FaceTime, Apple's video-calling application.

 Linux Operating System

Unlike many other operating systems, development on Linux


isn't led by any one company. The operating system was created by
Finnish programmer Linus Torvalds in 1991. Nowadays,
programmers from all over the world collaborate on its open source
code and submit tweaks to the central kernel software and other
programs.

A wide assortment of commercial and open source software is


available for Linux, and various Linux distributions provide custom
user interfaces and tools for installing software onto machines
running the operating system. A favorite of many programmers,
Linux is widely used on corporate and scientific servers, including
cloud computing environments. Linux can be run on a wide variety
of hardware and is available free of charge over the internet.

How to Prepare your Installer and Program

1. Check your system requirements


Confirm that your computer meets the minimum system
requirements for that product.
Note:If you're running Windows, make sure to download/install the
version that matches your operating system (32-bit or 64-bit).

2. Make sure about legitimacy


In some operating system activation is usuallyautomatic.However,
ifyou are prompted for your serial number and product key before
you can run the product, you can find the information you need in
your CD case or package.
NOTE: Product key and serial number is important so make sure you
that you keep it.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 85
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Install Windows 7 Step By Step Procedure

1. Turn your computer on and then press Del or F2 (depend on your


computer’s mainboard) to enter the system BIOS.

2. Select BIOS FEATURES

3. Select HARD DRIVE BBS PRIORITIES

4. Select BOOT OPTION #1 and the name of your Bootable device.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 86
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
5. Press any key to boot from USB…..

6. The first window will appear. Click “Next” unless you want to change
some regional settings for the installation process.

7. Click on the “Install now” button.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 87
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
8. Tick the I accept the license terms and Click Next.

9. Select Custom (advanced) to install.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 88
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
10. Decide on which hard drive and partition you want to install
Windows on and click Next.

11. Installation process will begin. This may take time.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 89
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
12. Type a user name (Ex. “BHALDZ”) then click Next

13. Set a password for your account

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 90
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
14. Choose what sort of protection your computer gets.

15. Choose your time zone and location. Click on “Next”.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 91
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
16. Your Computer is now ready to use.

This concludes the Windows 7 installation. Next, you would


probably want to update your computer with the latest hotfixes and/or
patches from Microsoft.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 92
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 3.1-1
Title: Procedures in Installing Operating System

Performance Objective: Given the procedures in installing


operating system, you should be able to install
new operating system in your computer.
Supplies/Materials : Computer Manuals, Handouts

Equipment : Computer with peripherals

Steps/Procedure:
1. Insert your flash drive
2. Go to BIOS settings
3. Click Custom (Advanced)
4. Install your OS in Local Disk C:/
5. Set your user name to Client
6. Set your password to “p@ssw0rd”

Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 93
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA 3.1-1
CRITERIA
YES NO
Did you….
1. Insert your flash drive
2. Go to BIOS settings
3. Click Custom (Advanced)
4. Install your OS in Local Disk C:/
5. Set your user name to Client
6. Set your password to “p@ssw0rd”

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 94
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 3.1-2
Device Drivers or Peripheral drivers

Learning Objectives:
After reading this information sheet, the reader will be able to:
1. Install device drivers in your computer

A device driver is a particular form of software application that is


designed to enable interaction with hardware devices. Without the
required device driver, the corresponding hardware device fails to work.

A device driver usually communicates with the hardware by means


of the communications subsystem or computer bus to which the hardware
is connected. Device drivers are operating system-specific and hardware-
dependent. A device driver acts as a translator between the hardware
device and the programs or operating systems that use it.

A device driver may also be called a software driver.

The sole purpose of a device driver is to instruct a computer on how


to communicate with the input/output device (I/O) by translating the
operating system's I/O instructions into a language that a device can
understand. There are various types of device drivers for I/O devices such
as keyboards, mice, CD/DVD drives, controllers, printers, graphics cards
and ports.

There are also virtual device drivers (VxD), which are device driver
components that enable direct communication between a hardware
device and an application. Virtual device drivers help to manage the data
flow to enable multiple applications to access the same hardware without
a conflict. When there is an interrupt (a signal from a hardware device),
the virtual device driver configures the next instruction step based on the
status of the hardware device settings.

It is essential that a computer have the correct device drivers for all
its parts to keep the system running efficiently. When first turning on a
computer, the OS works with device drivers and the basic input/output
system (BIOS) to perform hardware tasks. Without a device driver, the OS
would not be able to communicate with the I/O device.

Not only do physical hardware devices rely on a device driver to


function, but software components do as well. Most programs access
devices by using general commands; the device driver translates the
language into specialized commands for the device.
Many device drivers are provided by the manufacturer or are
available as built-in components of the OS. When hardware and software

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 95
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
components are updated or replaced, this renders the device drivers
obsolete.

How to Install Device Drivers

After installing computers, it is difficult for you to find the entire


right driver for the computer; DriverPack Solution will solve this
problem for you.

After installing the operating system for the computer, we have to


install drivers for the computer; however, your computer does not have
internet connection.

DriverPack Solution will solve this problem; you do not need


network to install drivers. All drivers will be installed automatically in 1
compact USB flash drive or in your hard drive.

How to install Drivers using DriverPack Solution

Step 1: Install and use the program, also you can download the compact
free version of DriverPack Solution.

Step 2: After you have installed the software, the interface appears

We can choose language for ease of use, If you do not like


English, you can choose Vietnamese. I choose English (this is
optional)

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 96
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Step 3: Click Install to complete the installation process. Now just wait for
Drivers to run to 100% to complete the installation process, and
your computer has been fully installed all drivers, and you can
feel free to use other apps for entertainment as well as other
programs to serve your work.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 97
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 3.1-2
Title: Procedures in Installing Device drivers

Performance Objective: Given the procedures in installing device


drivers, you should be able to install peripheral
drivers in your computer.
Supplies/Materials : Computer Manuals, Installers

Equipment : Computer with peripherals

Steps/Procedure:
1. Run DeviceDriver Pack Solution (your preferred version).
2. Click Install and update
3. Click Drivers
4. Wait for the installation to finish
5. Reboot

Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 98
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA CHECKLIST 3.1-2

CRITERIA
YES NO
Did you….
1. Run DeviceDriver Pack Solution (your preferred
version).
2. Click Install and update

3. Click Drivers

4. Wait for the installation to finish

5. Reboot

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 99
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 3.1-3
The Importance of Updating our Operating System
and Device Drivers

Learning Objectives:
After reading this information sheet, the reader will be able to:
1. Update operating system
2. Update device drivers

Why software update is important?

You’re hard at work on your computer or device and a message


suddenly pops up saying, “a software update is available”. You’re busy, so
you click “cancel” instead of “install”, thinking you’ll get to it later, but
you never do. Sound familiar?

The truth is it’s easy to skip software updates because they can take
up a few minutes of our time, and may not seem that important. But this
is a mistake that keeps the door open for hackers to access your private
information, putting you at risk for identity theft, loss of money, credit,
and more.

You may have heard of the recent Equifax data breach, in which 143
million Americans were potentially affected, with Social Security numbers,
birth dates, and home addresses exposed. The hackers were able to
access the credit reporting agency’s data through a known vulnerability in
a web application. A fix for this security hole was actually available two
months before the breach, but the company failed to update its software.
This was a tough lesson, but one that we can all learn from. Software
updates are important because they often include critical patches to
security holes.

In fact, many of the more harmful malware attacks we see take


advantage of software vulnerabilities in common applications, like
operating systems and browsers. These are big programs that require
regular updates to keep safe and stable. So instead of procrastinating
about software updates, see those updates as one of the most essential
steps you can take when it comes to protecting your information.

In addition to security fixes, software updates can also include new


or enhanced features, or better compatibility with different devices or
applications. They can also improve the stability of your software, and
remove outdated features.

All of these updates are aimed at making the user experience


better. And while repeated update reminders can be annoying, especially
if you have a lot of different applications, they can improve your
Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 100
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
experience in the long run and ensure that you get the most from your
technology.

While some computer software requires you to manually approve


and install updates, updating software on your mobile devices can be a lot
easier. You can select auto-update, ensuring that your mobile apps stay
current. Considering that the average smartphone owner uses 30 apps a
month, and have at least twice that many installed, this could save you a
lot of time and effort.

Now that you know how important software updates can be, here are a
few more tips to keep you safe:

 Know that keeping your security software up-to-date is critical. This


will protect you from the latest threats.

 Select auto-update for software on both your mobile devices and


computers, when possible. For software that doesn’t update
automatically, make it a habit to regularly check for and apply
available updates.

 Before downloading any software, read others’ reviews first to make


sure it’s safe to install in the first place. Cybercriminals like to
distribute phony applications designed to steal your information.

 Keep on top of the latest threats so you know how to protect


yourself from known vulnerabilities.

Procedures in Updating Your Operating System:

1. Open Windows Update by clicking the Start button in the lower left
corner. In the search box, type Update, and then, in the list of
results, click either Windows Update or Check for updates.

2. Click the Check for updates button and then wait while Windows
looks for the latest updates for your computer.

3. If you see a message telling you that important updates are


available, or telling you to review important updates, click the
message to view and select the important updates to install.

4. In the list, click the important updates for more information. Select
the check boxes for any updates that you want to install, and then
click OK.

5. Click Install updates.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 101
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Note: It is important that you do not shut your computer off during the
update process. Doing so can cause a corruption of the operating system,
which can often only be fixed by reformatting the computer.

The Importance of Updating Your PC Device Drivers

A PC has different types of hardware components connected to it. To


communicate with these hardware components the PC requires a software
program, popularly known as a Device Driver. Device drivers are
developed both by operating system developers and hardware
manufacturers.

Device Drivers integrated into your operating system are installed


automatically when the hardware devices that use them are connected to
the system. In case your Windows operating system is unable to install
the required driver, you can install it from the CD provided by the
manufacturer or download it either from the manufacturer’s website or
from other sources available on the Internet.

To ensure that the device drivers on your computer stay at their


best performance and are free from any bugs, you need to update them
on a regular basis. This article will help you to have a look at the steps
involved in updating device drivers.

The first step in updating your device driver is to download the


latest driver updates either from the manufacturer’s site or from other
reliable sources available on the internet. Once you have identified the
driver you want to update, download it and save it on your hard disk.

There are some drivers that get automatically updated and installed
when you download them. In case the driver does not update on its own,
you need to follow the following steps to manually update them.

1. The first step is to locate your hardware component in the Device


Manager. To open the Device Manager, right-click the My
Computer icon on your desktop, then select Properties. This will
open the System Properties dialog box. Here, display
the Hardware tab, and then select the Device Manager option.

2. In the Device Manager window you will see a broad list of hardware
devices connected to your PC. For example, you will see Display
Adaptors, Keyboard, Sound Adaptor, mouse and other such devices
listed here. You can navigate through the list of hardware devices by
clicking on the (+) icon.

3. Scroll through the list, identify the driver you want to update, right
click on it and select the Properties option.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 102
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
4. In the device properties dialog box, click on the Driver tab and
select Update Driver.

5. Upon selecting the update driver option an update driver wizard will
open. Select the option “Browse my computer for driver
software”. Next, select the option “Let me pick from a list of
device drivers on my computer” from the bottom of the open
window.

6. Now, browse to the location where you initially saved the


downloaded file on your hard disk and then click OK.

7. Select the hardware name in the given text box and click on
the Next button. The device driver update will now install on your
PC.

After the installation is complete, you might be prompted to restart


your computer. Even if you are not prompted to restart your computer, it
is always advisable to do so because the driver update process requires
some changes to be made in the Windows registry, which are
implemented only after your PC restarts.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 103
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 3.1-3
Title: Procedures in Updating Device drivers

Performance Objective: Given the procedures in updating device


drivers, you should be able to update device
drivers in your computer.
Supplies/Materials : Computer Manuals, Installers

Equipment : Computer with peripherals

Steps/Procedure:
1. Open Device Manager
2. Select the driver you want to update
3. Right Click on Properties
4. Select Update driver Software
5. Browse my Computer for software
6. Select Let me pick from a list of device drivers on my
computer
7. Browse the driver
8. Click Update

Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 104
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA 3.1-3

Did you…. YES NO


1. Open Device Manager?
2. Select the driver you want to update?
3. Right Click on Properties?
4. Select Update driver Software?
5. Browse my Computer for software?
6. Select Let me pick from a list of device?
7. Drivers on my computer?
8. Browse the driver?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 105
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
JOB SHEET 3.1-4
Title: Procedures in Installing Operating System

Performance Objective: Given the necessary materials, you


should be able to Install Operating System and
install drivers.
Supplies/Materials : Manuals, Installers

Equipment : Computer with peripherals

Steps/Procedure:
1. Install Operating System
2. Set your user name to “bhalds”
3. Install drivers

Assessment Method:
 Hands-on
 Direct Observation
 Practical Demonstration

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 106
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA 3.1-4
CRITERIA
YES NO
Did you….
1. Follow procedures in maintaining network
systems?
2. Observed safety measures?
3. Diagnose and identify faulty systems and cables?
4. Run diagnostics software?
5. Repair and replace faulty systems and cables?
6. Test and repaired/replaced network systems?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 107
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
LEARNING OUTCOME NO. 4: Install application software

Assessment Criteria
1. Application software are installed based on software installation
guides, end-user requirements and software license agreement
2. Variation to application software installation is carried out in
accordance to customer/client requirements
3. Software updates are accessed and installed in accordance with
manufacturer’s recommendations and requirements
Learning Contents
 Install application software.
 Software updates.

Conditions
Trainees must be provided with the following:

 Tools and test instruments


 PC or workstation
 Computer peripherals/devices
 Appropriate OS, drivers and software applications/programs

Assessment Method
1. Hands-On
2. Direct Observation
3. Practical demonstration

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 108
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Learning Experience
Learning Outcome No. 1
INSTALL APPLICATION SOFTWARE
Learning Activities Special Instructions
Read Information Sheet No. 4.1-1
Installing Application Software

Perform Task Sheet No. 4.1-1


Self-Check using Performance
Criteria Checklist 4.1-1

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 109
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
INFORMATION SHEET NO. 4.1-1
Installing Application Software

Learning Objectives:
After reading this information sheet, the trainee will be able to:
1. Know the different types of Application Software
2. Install Applications

Application software consists of programs designed to make


users more productive and/or assist them with personal tasks.

Application software has a variety of uses:

 To make business activities more efficient

 To assist with graphics and multimedia projects

 To support home, personal, and educational tasks

 To facilitate communications

Application software is available in a variety of forms:

 packaged
 custom
 Web application
 Open source
 shareware
 freeware
 public domain

 Packaged software is mass-produced, copyrighted retail


software that meets the needs of a wide variety of users, not just
a single user or company. Packaged software is available in retail
stores or on the Web.

 Custom software performs functions specific to a business or


industry. Sometimes a company cannot find packaged software
that meets its unique requirements.

 A Web application is a Web site that allows users to access and


interact with software from any computer or device that is
connected to the Internet. Many Web sites provide free access to
their programs; some charge a fee.
 Open source software is software provided for use, modification,
and redistribution. This software has no restrictions from the

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 110
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
copyright holder regarding modification of the software’s internal
instructions and its redistribution.

 Shareware is copyrighted software that is

 Distributed at no cost for a trial period. To


 Use a shareware program beyond that period,
 You send payment to the program developer.
 Freeware is copyrighted software provided
 At no cost by an individual or a company
 That retains all rights to the software.

 Public-domain software has been donated for public use and


has no copyright restrictions. Anyone can copy or distribute
public-domain software to others at no cost.

 Business software is application software that assists people in


becoming more effective and efficient while performing their
daily business activities. Business software includes programs
such as word processing, spreadsheet, database, presentation,
note taking, personal information manager, business software for
phones, business software suites, project management,
accounting, document management, and enterprise computing
software.

 Word processing software, sometimes called a word


processor, allows users to create and manipulate documents
containing mostly text and sometimes Graphics

 Spreadsheet software allows users to organize data in rows


and columns and perform calculations on the data. These rows
and columns collectively are called a worksheet.

 Database software is application software that allows users to


create, access, and manage a database. Using database
software, you can add, change, and delete data in a database;
sort and retrieve data from the database; and create forms and
reports using the data in the database.

A database is a collection of data organized in a manner


that allows access, retrieval, and use of that data. In a manual
database, you might record data on paper and store it in a filing
cabinet.

 Presentation software is application software that allows users


to create visual aids for Presentations to communicate ideas,
messages, and other information to a group.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 111
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
The presentations can be viewed as slides, sometimes
called a slide show, that are displayed on a large monitor or on a
projection screen

How to Install Application Software

Installation of Microsoft office (here I have office 2013 sample)

1. Open the folder for the version of Windows Office that you wish
to install (32-bit or 64-bit).

2. In the folder that opens, double click on the file setup.exe.

3. Read the license agreement, select I accept the terms of


this agreement, and then click Continue.

4. Click Install Now and Wait while the software is installed.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 112
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
5. Once the installation is complete, click Close.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 113
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
6. Microsoft Office Professional Plus 2013 is now installed and active on
your computer.

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 114
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
TASK SHEET 4.1-1
Title: Procedures in installing Application Software

Performance Objective: Given the procedures in installing


Application Software, you should be able to
install Microsoft Office.
Supplies/Materials : Computer Manuals, Handouts

Equipment : Computer with peripherals, Installers

Steps/Procedure:
1. Open Microsoft Office Folder
2. Click setup.exe
3. Read the license agreement and select I accept the terms of this
agreement, and then click Continue.
4. Click Install Now
5. Wait for the software to finish
6. Click close, once the software is installed.

Assessment Method:
 Lecture-Demonstration
 Self-paced Instruction
 Group Discussion

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 115
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
PERFORMANCE CRITERIA 4.1-1

CRITERIA
YES NO
Did you….
1. Open Microsoft Office Folder?
2. Click setup.exe?
3. Read the license agreement and select I accept
the terms of this agreement, and then
click Continue?
4. Click Install Now?
5. Wait for the software to finish?
6. Click close, once the software is installed?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 116
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
LEARNING OUTCOME NO. 5: CONDUCT TESTING AND
DOCUMENTATION

Assessment Criteria
1. Devices / systems and/or installation is tested to determine whether
it conforms to requirements
2. Stress test is conducted to ensure reliability of equipment in
accordance with manufacturer’s instructions and system
requirements
3. 5S and 3Rs are followed according to environmental policies
4. Documentation in relation to the test is forwarded to appropriate
personnel and/or authority in accordance with requirements

Learning Contents
 Conduct Test and Documentation o Software
 Operating system
 Application software
 Device driver
 Hardware
 System Unit
 IO Devices

Conditions
Trainees must be provided with the following:

 Tools and test instruments


 PC or workstation
 Computer peripherals/devices
 Appropriate OS, drivers and software applications/programs

Assessment Method
4. Demonstration
5. Oral Questioning
6. Written examination

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 117
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
JOB SHEET 5.1-1
Title: Installing and Configuring Computer System

Performance Objective: Given the necessary materials, you


should be able to Install and Configure
Computer System in accordance to industry
standards.
Supplies/Materials : Manuals, Installers

Equipment : Computer with peripherals

Steps/Procedure:
1. Assemble Computer system.
2. Create Bootable Flash Drive.
3. Install Operating System.
4. Install Drivers.
5. Install Applications.
6. Install Utilities.

Assessment Method:
 Hands-on
 Direct Observation
 Practical Demonstration

PERFORMANCE CRITERIA 5.1-1


Date Developed: Document No.
Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 118
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
CRITERIA
YES NO
Did you….
1. Assemble Computer Hardware?
2. Create Bootable Flash Drive?
3. Install Operating System?
4. Install Drivers?
5. Install Applications?
6. Install Utilities?

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 119
Developed by:
Install and Configure of 120
Computer Systems Revision # 00
Developers:

EDLYN P. CASAL MARGIELEN APRIL JOY


P. ALCOREZA D. PALAHANG

RICKY REYNALD ANNA WIZA


L. BALDADO M. MANZANO A.
GRIFON

Administrative Support:

DELMA P. MANILA, DPA, CESO V

Date Developed: Document No.


Computer Systems November 2018 Issued by:
Servicing NC II Metro Dumaguete
College, Inc. Page 120
Developed by:
Install and Configure of 120
Computer Systems Revision # 00

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy