TTLM Itss Li
TTLM Itss Li
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level I
LEARNING GUIDE # 1
Unit of Competence: Connect Hardware Peripherals
Module Title : Connecting Hardware Peripherals
LG Code : ICT ITS1 L01 01
TTLM Code : ICT ITS1 TTLM 0511
This learning guide is developed to provide you the necessary information regarding the following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Identify and confirm client peripherals requirements in accordance with organizational standards
Document client requirements and peripherals needed in line with organizational standards and report findings to the
appropriate person
Verify client requirements with appropriate person in line with organizational standards and reporting procedures
Take action to ensure client support expectations are covered by vendor warranty and support services
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1” in pages 3-15.
3. Accomplish the “Self-check” in page 16.
4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is unsatisfactory, see your teacher
for further instructions or go back to Learning Activity # 1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.
6. Read the information written in the “Information Sheet 2” in pages 17-28.
7. Accomplish the “Self-check” in page 29.
8. If you earned a satisfactory evaluation proceed to “Operation Sheet” in pages 30-32. However, if your rating is unsatisfactory, see
your teacher for further instructions or go back to Learning Activity # 2.
9. Read the “Operation Sheet” and try to understand the procedures discussed.
10. Do the “LAP test” in page 43 (if you are ready) and show your output to your teacher. Your teacher will evaluate your output
either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if satisfactory you can
proceed to Learning Guide 2.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on
additional work. But if satisfactory you can proceed to the next topic.
External or tangible devices which are attached to the external part of the computer
Any device connected internally or externally to a computer and used in the transfer of data. A personal computer
or workstation processes information and, strictly speaking, that is all the computer does. Data (unprocessed
information) must get into the computer, and the processed information must get out. Entering and displaying
information is carried out on a wide variety of accessory devices called peripherals, also known as input/output
(I/O) devices
Any input, output or storage device connected externally or internally to the computer's CPU, such as a monitor,
keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse.
Device driver
It is a small program that tells the computer how to communicate with input/output (peripheral) devices. Every
peripheral device needs device driver to communicate with the computer system.
Computer peripherals were grouped into several categories: The Input Devices, The Output Devices, the
Processors, The Storage Devices.
The Input device - is a device that’s been used as a means of input. It is any peripheral (piece of computer
hardware equipment) used to provide data and control signals to an information processing system such as
a computer or other information appliance. The common input devices are keyboard, mouse, scanner.
Keyboard - The computer key board is used to input, or enter, letters, numbers, symbols,
punctuations and commands into the computer. The standard keyboard layout is sometimes called QWERTY
layout and it is the most common layout.
How keyboard works - The keys are arranged in rows and columns. When a key
is pressed, a unique row-and-column signal is generated and sent to the keyboard
interface IC on the keyboard. The keyboard interface then converts the row-and-
column signal into single byte code called a Key code or scan code. When the key
is released, a second signal is sent to the keyboard interface IC, which generates a
break code. The keyboard interface IC then sends the scan codes by means of serial
connection through the keyboard interface to the computer. The keyboard controller, located on the motherboard, converts
the signals to parallel data and generates an interrupt so that the input can be serviced by the microprocessor.
Mouse – or a pointing device is any human interface device that allows a user to input spatial data to a
computer. In the case of mice and touch screens, this is usually achieved by detecting movement across a
physical surface. Analog devices, such as 3D mice, joysticks, or pointing sticks, function by reporting their
angle of deflection. Movements of the pointing device are echoed on the screen by movements of the cursor,
creating a simple, intuitive way to navigate a computer's GUI.
Types of mouse
Opt mechanical mouse - The optical-mechanical or Opto-mechanical mouse consists of a ball that
rolls one of two wheels inside the mouse. This wheel contains a circle of holes or notches that allow a LED light
to be shined through and detected by a sensor, as each wheel spins they represent the X or Y axis for the mouse
pointer. This mouse is much more accurate than the traditional mechanical mouse that used only wheels and
rollers, however is not as good as an optical mouse.
Optical mouse - Computer mouse that utilizes light-emitting diodes (LED) or laser as a method of
tracking movement. These mice are more proficient than other computer mice. These mice are easily identified by
examining the bottom of the mouse. If the mouse has no ball or has a light emitting from the bottom it's most
likely an optical mouse. This mouse is much more accurate than the ordinary optical mechanical mouse that relies
on the traction between the mouse ball and the rollers. One drawback to an optical mouse is they can have
problems in bright lights.
New Optical Mice no longer have the disadvantages of earlier mice and are capable of being utilized on
any surface. In comparison to the traditional Optical-Mechanical mouse, the Optical is a much better solution for
a computer mouse.
Scanner is a device that can scan or digitize images on paper and convert them to data that the computer can
use. They can then be stored in a file, displayed on the screen, added to documents, or manipulated.
Composite devices
Input devices, such as buttons and joysticks, can be combined on a single physical device that could be thought of as a
composite device. Many gaming devices have controllers like this. Technically mice are composite devices, as they both
track movement and provide buttons for clicking, but composite devices are generally considered to have more than two
different forms of input.
Medical Imaging
In the fashion of video devices, audio devices are used to either capture or create sound. In some cases, an audio output
device can be used as an input device, in order to capture produced sound.
Microphone
MIDI keyboard or other digital musical instrument
Output Device
An output device is any piece of computer hardware equipment used to communicate the results of data
processing carried out by an information processing system (such as a computer) to the outside world.
In computing, input/output, or I/O, refers to the communication between an information processing system (such
as a computer), and the outside world. Inputs are the signals or data sent to the system, and outputs are the signals or data
sent by the system to the outside.
Speakers
Computer speakers range widely in quality and in price. The computer speakers typically packaged with computer
systems are small, plastic, and have mediocre sound quality. Some computer
speakers have equalization features such as bass and treble controls.
Headphones
Screen (Monitor)
The first computer monitors used Cathode ray tubes (CRTs), which was the dominant technology until they were
replaced by LCD monitors in the 21st Century.
Originally computer monitors were used for data processing while television receivers were used for
entertainment. From the 80s onwards, computers have been used for both data processing and entertainment,
while televisions have implemented some computer functionality. The common aspect ratio of televisions, and
then computer monitors, has also changed from 4:3 to 16:9.
Printer
In computing, a printer is a peripheral which produces a text and/or graphics of documents stored in electronic form,
usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals,
and are attached by a printer cable or, in most newer printers, a USB cable to a computer which serves as a document
source. Some printers, commonly known as network printers, have built-in network interfaces,
typically wireless and/or Ethernet based, and can serve as a hard copy device for any user on the network. Individual
printers are often designed to support both local and network connected users at the same time. In addition, a few
modern printers can directly interface to electronic media such as memory cards, or to image capture devices such
as digital cameras, scanners; some printers are combined with a scanners and/or fax machines in a single unit, and can
function as photocopiers. Printers that include non-printing features are sometimes called multifunction
printers (MFP), multi-function devices (MFD), or all-in-one
(AIO) printers. Most MFPs include printing, scanning, and copying among their many features.
The Processor
The Processor or the central processing unit (CPU) is the portion of a computer system that carries out
the instructions of a computer program, to perform the basic arithmetical, logical, and input/output operations of the
system. The CPU plays a role somewhat analogous to the brain in the computer. The term has been in use in the computer
industry at least since the early 1960s. The form, design and implementation of CPUs have changed dramatically since
the earliest examples, but their fundamental operation remains much the same
On large machines, CPUs require one or more printed circuit boards. On personal computers and small
workstations, the CPU is housed in a single chip called a microprocessor. Since the 1970s the microprocessor class of
CPUs has almost completely overtaken all other CPU implementations. Modern CPUs are large scale integrated circuits in
small, rectangular packages, with multiple connecting pins.
Two typical components of a CPU are the arithmetic logic unit (ALU), which performs arithmetic and logical
operations, and the control unit (CU), which extracts instructions from memory and decodes and executes them, calling on
the ALU when necessary.
Example of Processors is: Pentium 4, Core Duo, Dual Core, Core i3, Core i5, Corei7
Computer data storage, often called storage or memory, refers to computer components and recording
media that retain digital data. Data storage is one of the core functions and fundamental components of computers.
1. Primary Storage – is also known as the main memory or a temporary storage device. It is fast in nature
but can accommodate only few data. Data that has been stored in memory flushes off when you restart
your computer, thus called temporary storage device.
It is the only one directly accessible to the CPU. The CPU continuously reads instructions stored
there and executes them as required. Any data actively operated on is also stored there in uniform manner.
3. Tertiary Storage - Tertiary storage or tertiary memory, provides a third level of storage. Typically it
involves a robotic mechanism which will mount (insert) and dismount removable mass storage media into
a storage device according to the system's demands; this data is often copied to secondary storage before
use. It is primarily used for archiving rarely accessed information since it is much slower than secondary
storage (e.g. 5–60 seconds vs. 1–10 milliseconds). This is primarily useful for extraordinarily large data
stores, accessed without human operators. Typical examples include tape libraries and optical jukeboxes.
Connectivity devices
The majority of external peripheral devices connect to the back of the computer’s system unit with cables. The
computer’s system unit has a variety of ports available for use by different peripheral device cables. A port is a socket
that is used to connect the cables from peripheral devices to the computer.
Computer connectivity devices were grouped into several categories:
Ports
There exist several types of ports like serial port, parallel port, USB port, AGP port, power supply port.
Parallel ports can send or receive a byte (8-bit) at a time. Unlike the serial port, these 8-bits are transmitted
parallel to each other. Parallel ports come in the form of 25-pin female connector. Parallel ports are popularly used to
connect printer, scanner, CD writer, zip drive, external hard disk drive, tape backup drive, etc.
To spare the user botheration of 8-pin, 25-pin, male, female connectors, the USB has been designed. It gives you
a single, standardized, easy-to-use way to connect up to 127 devices to a computer. These devices include printers,
scanners, mice, joystick, digital camera, web cameras, speakers, telephones, zip drives, network connections, scientific
data acquisition devices, etc.
The AGP (Accelerated Graphics Port) port is used to connect to graphic card that provides high-speed video
performance typically required in games and other multimedia applications.
Alternatively referred to as an Ethernet port, the LAN port is a port connection that allows a computer to
connect to a network using a wired connection. In the picture to the right, is a close up example of what a LAN port looks
like for a network cable using an RJ-45 connector. In the case of this example, the two led lights will blink when that port
is active and receiving activity.
The PS/2 connector is a 6-pin Mini-DIN connector used for connecting some keyboards and mice to a PC
compatible computer system. Its name comes from the IBM Personal System/2 series of personal computers, with which
A power supply is a device that supplies electrical energy to one or more electric loads. The term is most commonly
applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert
another form of energy (e.g., mechanical, chemical, solar) to electrical energy. A regulated power supply is one that
controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in
either load current or the voltage supplied by the power supply's energy source.
Every power supply must obtain the energy it supplies to its load, as well as any energy it consumes while performing that
task, from an energy source.
A Video Graphics Array (VGA) connector is a three-row 15-pin DE-15 connector. The 15-pin VGA connector
is found on many video cards, computer monitors, and some high definition televisionsets. On laptop computers or other
small devices, a mini-VGA port is sometimes used in place of the full-sized VGA connector.
Terminals
A computer terminal is an electronic or electromechanical hardware device that is used for entering data into,
and displaying data from, a computer or a computing system.
The function of a terminal is confined to display and input of data; a device with significant local programmable
data processing capability may be called a "smart terminal" or fat client. A terminal that depends on the host computer for
its processing power is called a dumb terminal or thin client. A personal computer can run software that emulates the
function of a terminal, sometimes allowing concurrent use of local programs and access to a distant terminal host system.
The System console is a text terminal used to operate a computer. Modern computers have a built-in keyboard
and display for the console. Some Unix-like operating systems such as Linux, FreeBSD and Mac OS X have virtual
consoles to provide several text terminals on a single computer.
A terminal emulator is a computer program in a graphical windowing system that lets the user operate a text
terminal in a window. This lets applications for text terminals run under a modern graphical user interface. Popular
terminal emulators include xterm and rxvt.
Connectors
CAT5 NETWORK CABLE - This cable allows the computer to communicate
to other computers over a network. It also provides networked computers
access to the Internet
USB CABLE - Most PC's now have these fast and versatile ports on the front and back.
They can be used for portable storage devices, digital cameras, scanners, video cameras,
printers, keyboards and mice - just about everything!
POWER CORD - This is a standard "kettle cord" that connects the computer to
the AC outlet on the wall and the power supply of the computer. This MUST be
unplugged if you are ever doing any maintenance work inside the computer.
PRINTER CABLE - This is a 25-pin "D" shaped connector that connect printers to
the parallel port on a computer. (Newer printers may connect with a USB plug.)
PS2 CABLE - On most computers these days, this connection is used for
both the Mouse and the keyboard. This plug has 6 pins-
VGA CABLE – This is use to connect the monitor to the VGA port.
Planning
This stage involves identifying the client’s current technology and taking into account any limitations. During the
planning phase it is necessary to find out information including:
system specifications
connections available
budget constraints
available timeframe
availability of physical space.
A feasibility study can be performed to provide a preliminary report to the client about benefits, costs and impact
to the organisation. Additionally, a project request form allows a client to document their initial request.
System specifications
It is important to find out the specifications of the computer system you are planning to connect the peripheral
device to. Many newer types of peripheral devices require a specific amount of memory, CPU speed, hard disk space, and
may only be compatible with certain operating systems.
You also need to be aware of the peripheral’s system requirements. The manual for the peripheral device
as well as the manufacturer’s website will help you determine the minimum system specifications.
Desktop hardware, such as a desktop computer itself, is the most common type of IT hardware purchased by a
small business. The cost of hardware depends on its specification, which in turn is determined by some key components.
When you buy desktop hardware, you will need to decide what the specification of these key components should be.
The processor is the driver of the computer. Processors are usually differentiated by speed, measured in gigahertz
(GHz). The higher the GHz, the faster the computer will run. You should buy the fastest processor you can afford, but a 3
GHz processor will normally be enough for most business functions, e.g. word processing and spreadsheets, together with
some multimedia.
Memory is used by the processor to run programs. Generally, the more random access memory (RAM) you have,
the better your computer will run when using several programs at once. Your computer should have enough memory to
The hard disk is used to store the data you create in your business, as well as the programs you use. Its capacity
is much greater than the RAM. An office computer with a 3 GHz processor should have at least 200 GB of hard disk
space, but if you intend to use a single desktop PC as the main storage location for all your business data, you will need at
least 500 GB.
External plug-ins, such as rewritable DVD, DVD-Read Only Memory (ROM), or CD-RW (rewritable) drives
can be used to supplement your computer's memory.
The monitor is the computer's display screen. Liquid Crystal Display (LCD) or flat screen monitors offer reduced
bulk and lower power consumption, relative to cathode ray tube (CRT) monitors. Monitors are normally measured
diagonally in inches - typically 19, 22 or 24. Larger or wide-screen monitors allow you to compare two documents on-
screen. Many monitors have an aspect ratio - the proportion of image width to height - of 16:10, although screens with a
16:9 ratio are becoming more widely available and offer higher resolution.
Display adapter
Software requiring a better than average computer graphics display, like graphics editors and high-end games,
often define high-end display adapters in the system requirements.
Software requirements
Software Requirements deal with defining software resource requirements and pre-requisites that need to be
installed on a computer to provide optimal functioning of an application. These requirements or pre-requisites are
generally not included in the software installation package and need to be installed separately before the software is
installed.
1. Platform
In computing, a platform describes some sort of framework, either in hardware or software, which allows
software to run. Typical platforms include a computer's architecture, operating system, or programming languages and
their run time libraries.
Operating system is one of the first requirements mentioned when defining system requirements (software).
Software may not be compatible with different versions of same line of operating systems, although some measure of
backward compatibility is often maintained. For example, most software designed for Microsoft Windows XP does not
run on Microsoft Windows 98, although the converse is not always true. Similarly, software designed using newer
features of Linux Kernel v2.6 generally does not run or compile properly (or at all) on Linux distributions using Kernel
v2.2 or v2.4.
Software making extensive use of special hardware devices, like high-end display adapters, needs special API or
newer device drivers. A good example is DirectX, which is a collection of APIs for handling tasks related to multimedia,
especially game programming, on Microsoft platforms.
Most web applications and software depending heavily on Internet technologies make use of the default browser
installed on system. Microsoft Internet Explorer is a frequent choice of software running on Microsoft Windows, which
makes use of ActiveX controls, despite their vulnerabilities
Other requirements
Some software also has other requirements for proper performance. Internet connection (type and speed)
and resolution of the display screen are notable examples.
Examples
Following are a few examples of system requirement definitions for popular PC games and trend of ever
increasing resource needs:
As a cost-saving consideration, for a small enterprise, getting the exact client specifications would be a good
consideration but for a big enterprise, getting the high end hardware would be of great choice.
Considering the future hardware trend would also be a deciding factor. If the price of a specific peripheral
remains the same for a long period of time, you could consider buying a high end one since over time the price remains
the same while you get a higher hardware performance. Otherwise, choose a medium range peripherals or just exactly
what your organization need since for a short period of time the price lowers so you could have an opportunity of
upgrading it to a high end one in the future at a low cost.
Another factor is what operating system are you going to use? Below are the hardware requirements for installing
Windows XP and Windows 7:
After you have determine your organization needs, you can now start documenting your hardware needs, to help
you decide on the specifications, canvassing would be a great idea. There were several sites in the net where you can
browse and compare the price of the different medium range to high end computer peripherals. One by one you can list
down the hardware specs for your client. The list below will help you in documenting your chosen hardware:
Processor :
RAM or Memory :
Hard Disk size :
Video Card :
Lan Card :
DVD drive :
Sound Card :
Mouse :
Keyboard :
Monitor :
Complied by: Sofiyan Gelaw Page 16
Training, Teaching and Learning Materials Development
One deciding factor to consider in buying computer peripherals is the warranty and after sales support service. A
cheaper price would vary greatly on the performance, durability and warranty. Mostly, the cheaper it gets, the less
durable and less warranty you could expect. Oftentimes, the good warranty and after sales service they provide, the better
the quality of the products they have. Do not risk buying the cheaper one if you’re not sure of the quality.
After you have finalized your hardware specifications, you can now forward it to the right person for budget
considerations and finally for procurement.
Budget constraints
While planning the connection of hardware peripheral devices, it is important to be aware of the client’s available
budget. A client needs to determine whether the benefits that will be gained from the peripheral device justify the
financial outlay. Factors including the organisation’s size, the necessity of the peripheral device to the organisation,
number of people requiring the device, will all contribute to the organisation’s allocation of a budget. Costs will
sometimes prohibit an organisation from proceeding with the purchase of equipment.
Another cost to consider is ongoing maintenance. A laser printer, for example, may initially be more expensive to
purchase than an inkjet printer. However when you consider that some inkjet cartridges can cost nearly as much as an
inkjet printer, it may be more practical to choose a laser printer, where toner costs are more reasonable.
Available timeframe
The time available to complete a task also needs to be considered when identifying client requirements. If, for
example, a peripheral device is needed urgently, it will be necessary to quickly find out which suppliers can immediately
provide the peripheral equipment.
Before considering acquiring any peripheral device, planning needs to be done to work out where and how the
peripheral will reside. The following questions need to be considered:
What physical space is available to accommodate the device?
Are power points in a near proximity if the device needs them?
If a peripheral does not have access to a suitable power source, problems may occur including the overloading of
power boards and power leads causing dangerous obstructions to users of the equipment.
Will the installation of the device mean other equipment needs to be relocated?
Could the device cause disruption or impact on the safety of users?
Feasibility study
A feasibility study can be carried out to show the client benefits, approximate costs of the new equipment and the
impact on the organisation. Several hardware devices can also be recommended to the client. The aim of the feasibility
study is to recognise the best solution under the circumstances by identifying the effects of this solution on the
organisation.
After undertaking a feasibility study, it may be discovered that a simple solution is possible. Take the example of
an organisation that would like to update their monitors so that they can have better screen resolution. Changing the
monitors’ internal settings could be a very simple solution to obtain an improved resolution.
An initial request for hardware peripheral devices can be documented using a project request form. This form
documents information from both the client and the computer consultant in order to document preliminary requirements.
Typical information requested on a project request form includes:
project title objectives
date received anticipated benefits
completion date person requesting
project number constraints.
description of problem
Request information:
First name: Last name:
Email:
Project title:
Project information:
Analyzing
In the analysis phase, the client’s requirements are investigated in more depth. It is important to try to gain as much
information from the client as possible, in order to obtain an accurate understanding of the situation. Detailed client
requirements, such as:
specific features of the device required
the number of people who will need to use device
support expectations
training requirements
can all be obtained during this phase.
Interviews, questionnaires, checklists and observations are some methods that consultants use to gather
information. If a device is to be used by a large group of users, a questionnaire or checklist could be constructed to find
out what features are required by the majority of users. Interviewing users can provide a better way of finding out specific
information.
Interviews
A well-prepared interview can help provide you with valuable information about your client requirements.
Information that has been collected during the planning stage can also give you some useful background information
when preparing questions.
Questions asked of a client may be specific or open ended. Specific questions generally mean that the client will
give either a yes/no response or a specific answer. Open-ended questions, however, generally commence with ‘how’ or
‘why’. These types of questions help to discuss and clarify issues and establish a firmer understanding of client
requirements.
For example, some questions you may want to ask during an interview to replace an existing printer could include:
How will a new printer solve existing printer issues?
Who will be using the new printer the majority of the time?
What will be the new printer key purposes? Eg:
– letters
Questionnaires
Questionnaires are helpful when you need to gather information from a number of clients. A number of questions
incorporating short answers, multiple choice and true/false choices can help you quickly determine what kinds of features
the majority of clients are requiring.
Checklists
In a similar manner to questionnaires, checklists that ask clients to choose what features they would like from a
specific peripheral device can also provide an efficient way to determine a set of popular requirements.
Observations
Even informal observations of current business procedures can provide another way of determining client needs.
Observing users as they go about their day-to-day tasks, can confirm if current peripheral devices are not working
properly or assessing the need for a new peripheral device.
Designing
The design phase enables you to figure out an effective solution. All the information you have gathered via
questionnaires, interviews, observations and during planning can be assessed to determine the best way of satisfying client
requirements.
There will often be several peripheral devices that are capable of performing the job satisfactorily. An evaluation
grid can be created to show the client each device’s functionality.
The example below illustrates an evaluation grid that could be used for appraising scanners.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
1. What are the three(3) stages of the system development life cycle? (3 points)
2. In planning phase, what five(5) information is necessary to find out? (5 points)
3. The processor’s speed has been measured in what? (1 point)
4. How many processors speed in Ghz is needed for most business functions, e.g. word
processing and spreadsheets, together with some multimedia. (1 point)
5. If you have 3Ghz processor’s speed, how much ideal memory (RAM) size
you must have? (1 point)
6. An office computer with a 3 GHz processor should have at least how
many GB of hard disk space? (1 point)
7. What can we use to supplement your computer's memory? (1 point)
8. Which monitor is better in terms of electric consumption? (1 point)
9. What are the 3 Software requirements needed in before buying a PC? (3 points)
10. What are the Hardware Requirements for Windows 7 operating system in terms of:
(4 point)
Processor :
RAM or Memory :
Hard Disk size :
Video Card :
Instructions: You are required to perform the following individually with the presence of your teacher.
1. Showing the ports below, demonstrate what peripheral was needed for each port
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1” in pages 3-5.
3. Accomplish the “Self-check” in page 6.
4. If you earned a satisfactory evaluation proceed to “Information Sheet 2”. However, if your rating is unsatisfactory, see your teacher
for further instructions or go back to Learning Activity # 1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.
6. Read the information written in the “Information Sheet 2” in pages 7-13.
7. Accomplish the “Self-check” in page 14.
8. Do the “LAP test” in pages 15-16 (if you are ready) and show your output to your teacher. Your teacher will evaluate your output
either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if satisfactory you can
proceed to Learning Guide 3.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on
additional work. But if satisfactory you can proceed to the next topic.
Obtaining a peripheral
The first step in obtaining a peripheral device is to locate suppliers of that device. Then, there are factors you
need to consider about the supplier and the devices on offer, such as support provided and purchase price. This will help
you to compare and choose the most appropriate supplier and the exact model of the device according to client
requirements. Finally, you are ready to place an order for your organisation or client to purchase the device.
Locating a supplier
There are many ways to find a supplier of peripheral equipment. Some ways include:
Complied by: Sofiyan Gelaw Page 23
Training, Teaching and Learning Materials Development
Searching the Internet
The Internet provides different methods for searching for suppliers. Using search engines such as Google or
Yahoo can help you find a hardware supplier anywhere in the world. Suppliers will often have their own websites that can
provide you with catalogues of available equipment. Other ways to investigate suppliers are to follow links from a website
such as a manufacturer’s website, or to browse website directories that may be linked to search engine home pages.
PC magazines
Computing magazines often contain a large section devoted to advertising current hardware suppliers.
Newspapers
Major newspapers have computer/IT sections or classified advertisements which can be a source for finding
suppliers.
Brochures/advertising material
Many larger hardware suppliers use television, radio or leaflet deliveries to inform potential customers of their
latest hardware.
Telephone directory
A telephone directory is useful if you need to find a hardware supplier located within your local area.
Manufacturers generally have their own websites. These may list major suppliers in your area. Emailing or
telephoning the manufacturer may also be a way to find out names of local suppliers.
Choosing a supplier
With so many choices of suppliers available, how do you find the right one? There are a few factors to consider:
How long has the supplier been operating? It is a good idea to find a supplier who will still be around for the
lifetime of the hardware.
Does the supplier offer suitable support and training? If the client will be requiring a lot of additional
assistance, training could be a major contributing factor for choosing a particular supplier.
Does the supplier offer competitive pricing? Considering the support and stability, it is also important to weigh
up these factors in relation to price. For a client with a strict budget, price may be a big issue when determining
where to purchase hardware.
Is the supplier a preferred supplier for your organization? Some organizations have arrangements that
equipment must be purchased from suppliers who are considered to be the preferred provider for the organization.
Organisations create these agreements because customer loyalty offers substantial discounts, extended warranties
and additional support.
Once you have selected suitable suppliers you need to contact each supplier. Information you should find out from
the supplier includes:
model and manufacturer names of peripherals that will satisfy the majority of your clients requirements (including
system specifications, physical dimensions, support)
price of each model
availability of each model.
You may find it helpful to keep a record of any details that you collect so you refer to this information quickly and easily.
Placing an order
Depending on the type of organisation you work for, placing an order for a hardware peripheral device could be
done in a variety of ways. In a small organisation you may be responsible for ordering the device yourself. However, in a
larger organisation there may be employees who are responsible for purchasing new equipment. You may need to fill out
an order form that can be given to the purchasing department.
Before an order is submitted, it could also be necessary to obtain final approval from senior staff. Often an order
form might require signatures from the manager or supervisor before it can be processed. A purchasing department might
require written quotes from three suppliers, a recommendation and justification for the chosen supplier.
Make sure that you find out from your supervisor or manager what procedures you need to follow when placing an order
within your organisation.
GST
TOTAL
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
3. After choosing the suitable supplier, what three (3) information you should find out from the supplier? (3 points)
Note: Satisfactory rating – 10 points above / Unsatisfactory - below 10 points. You can ask you teacher for
the copy of the correct answers
Hardware inventories
The purpose of a hardware inventory (or registry) is to keep detailed information about all the hardware
equipment within an organization. Every piece of hardware, including each computer and peripheral device, should be
recorded on the inventory. As well as providing an excellent quick reference guide to the organization’s hardware, an
inventory can be very useful for insurance, warranty and service purposes.
In order for an inventory to be a valuable source of information, it is vital that the information be maintained
regularly. New devices need to be entered into the inventory as soon as they have been obtained. You must also adjust the
inventory frequently, to delete hardware that is no longer functional or has been removed. Some organizations do random
checks or yearly audits of their hardware inventories to ensure that all information is current.
There are a number of tools available to create hardware inventories. Databases and spreadsheets are often used
to store the information. There are also software programs that you can purchase, designed specifically for recording
hardware and software details. Although these programs are good for keeping a ‘soft copy’ of the information, it is also
essential that you keep a current ‘hard copy’ (printed version) of the inventory. In this way, if the computer system ever
fails you will still have the information.
Details that should be included within a hardware inventory include:
Complied by: Sofiyan Gelaw Page 27
Training, Teaching and Learning Materials Development
description of hardware device components
manufacturer location
supplier number and identity of authorised users
model number purchase price
serial number date of purchase.
warranty or maintenance conditions
If the peripheral is an essential part of the computer system (for example mouse, keyboard or monitor) it is logical
to record information about the device within the documentation for the computer to which it is connected. Individual
computer inventories will often contain detailed information about the computer’s related hardware and software. It may
also be more practical to record information about the peripheral inside the computer’s record, if the device is also
permanently connected to a computer (for example a printer or scanner)
If the device is shared between several computers, it makes more sense to keep information about the peripheral
as an individual entry in an inventory. Devices such as digital cameras, data projectors and USB drives would more likely
to be used by many computers, thus it would make more sense to record their details separate to the computer details
Checking contents
When unpacking any peripheral device, an organized and methodical approach needs to be taken. Randomly
ripping open boxes and packaging without carefully identifying each component can potentially cause many problems
later on.
Prepare a suitable work area before you begin unpacking. This should include a large sturdy flat area with no
carpet so that small components will not be lost.
Before commencing to open any packaging, find the manual for the device. Check instructions for any
precautions or specific unpacking procedures. Most manuals will also contain a section that tells you a list of included
components. It is useful to create a checklist based on the component list. You will then be able to use the checklist to
mark off the components when they have been identified.
Below is a sample checklist for a typical inkjet printer.
printer sample paper
cartridge feeding device
power cable CD driver
USB cable
Be attentive when unpacking a peripheral device — handle the packaging and contents with care, as you do not
want to damage your new device. Remove any packing material surrounding and also within the device. Some printers,
for example, have soft foam and plastic pieces inside the device to ensure that parts are locked into the correct position.
Make sure that you remove these pieces and foam before installation.
Inspect the equipment for damage that may have occurred during transport. If the equipment has been
damaged, report the damage to the supplier immediately.
If possible, try to keep all the original packing material that came with your computer and its peripherals. Often
this packaging gets thrown out because it is so bulky. It can be very useful, however, if you need to return the item within
the warranty period as some manufacturers will request original packaging. It can also be good protection when
transporting sensitive peripheral devices. For example, equipment such as digital cameras, video cameras and data
projectors have delicate lenses which can break very easily.
Storing peripherals
Each manufacturer will have their own recommendations on how to store their peripheral equipment. In order to
guarantee that a peripheral will function correctly throughout its life it is important to follow guidelines that have been
recommended by the manufacturer. Some common recommendations may include:
Keep equipment in the correct position — After unpacking, most devices will usually have a proper resting
position. If a device is not kept in its natural position, there could be problems when trying to operate the device
later on. For example, when a printer is stored in a vertical position, components such as the ink cartridges could
leak or be dislodged.
Keep equipment away from weather, dust and other harmful material — When finding a storage location,
consider what kind of elements the device may be subjected to. If, for example, you store a USB drive in a cabinet
next to chalk, dust from the chalk could potentially damage the storage device’s USB connection.
Do not expose equipment to extreme temperatures and high humidity — Sudden changes in temperature can
cause condensation in many peripheral devices. For instance, if a video camera is taken from a cold place to a warm
place, condensation may form on the lens and internal parts.
Avoid storing the device in direct sunlight — Exposure to direct sunlight could damage many of the external
components of a device as well as subject the device to high temperatures.
Do not expose equipment to water or moisture — If water gets inside many peripheral devices there is a risk of
electric shock.
When positioning peripherals in their permanent locations it is important to take into account many OH&S
considerations as follows.
Positioning of the monitor
It is essential to position a monitor correctly to ensure it will suit the needs of the user. Tips include:
Try to make sure that monitor is in a position away from the glare of sunlight.
Check that the brightness and contrast controls of the screen have been adjusted to suit lighting conditions in the
room.
The top of the screen should be the same level as the user’s eye level.
Positioning of the keyboard
Some general Occupational Health and safety guidelines to consider when positioning other peripheral equipment
are:
Make sure that you can reach the peripheral device and its components without having to strain your back.
Place equipment such as scanners and printers at a suitable height so a user is easily able to reach paper trays, open
scanner lids, etc.
Make sure that equipment such as speakers is easily accessible if settings such as volume control need to be
changed.
In many situations it is important to consider the physical security of the peripheral devices. Some devices, such
as digital cameras, data projectors and USB drives, may not be permanently connected to a computer so it will be
necessary to find a secure location to store the device. Make sure that these kinds of devices are secured in a lockable
storage cupboard, cabinet or safe when not required. Some organisations install security devices onto desks to guarantee
that computers are secure and will not be able to be taken from their position unless unlocked.
Storing consumables
The term ‘consumables’ refers to a product that is used once and then replaced. Examples of consumables include
printer cartridges, CDs and paper. As well as for computer equipment, consideration also needs to be given to the way
consumables for peripheral devices are stored.
Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from fusing pages together.
CDs
When possible, make sure that CDs are kept in their protective case, to minimise the chances of being scratched.
Also keep them out of direct sunlight and extreme temperatures.
Summary
There are several steps that you must go through when you obtain a peripheral device. The first step involves
working out where to obtain the device, whether it is from a supplier who regularly provides equipment to the
organization, or a supplier found from searching the Internet, magazines or telephone directory.
Depending on the organization, placing an order for a device may be done in different ways. Some smaller
organizations may not have strict guidelines, while larger organizations may have strict procedures that need to be
followed.
Once the device has arrived it is always a good idea to keep a record of the device in a hardware inventory.
Recording details such as manufacturer, supplier, model, date of purchase and purchase price, can be very useful —
especially if you need to send a device back within the warranty period.
It is also a good idea to unpack the contents in an organized manner. Find a clear space to unpack contents and
create a checklist of equipment that should be supplied.
Once the device has been unpacked, storage is another consideration. Make sure to look at the manufacturer’s
guidelines, consider the security of the device and any occupational health and safety issues.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
1. What do you need to have to have a detailed information about all the
hardware equipment within an organization? (1 point)
2. What are the two(2) common tools to create a hardware inventories? (2 points)
3. Give at least six(6) details that should be included in hardware inventory. (6 points)
4. Give at least 2 considerations when unpacking delivered items. (2 points)
5. What are the four(4) important considerations when storing the
hardware? (4 points)
6. What are the five(5) steps in obtaining a peripheral devices? (5 points)
Note: Satisfactory rating – 17 points above / Unsatisfactory - below 17 points. You can ask you teacher for
the copy of the correct answers
Instructions: You are required to perform the following individually with the presence of your teacher.
Scenario: You have already selected a supplier of computer peripherals. You are going to
place an order of the peripherals per piece. It will be assembled later by the
company technician. You can decide on the specs of it.
Fill up an order form below
From:____________________________
Date: ____________________________
COST
GST
TOTAL
Make an inventory of all the delivered items. (Just choose one item for the purpose of this activity)
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Verify timeframe for installation schedule with the client in accordance with the organization requirements
Remove and/or replace old peripherals with minimum disruption to clients taking into account environmental
considerations and OHS standards
Connect new peripherals with minimum disruption to clients and taking into account the operating system
procedures
Configure the computer to accept the new peripherals
Test hardware peripherals and confirm client satisfaction, particular attention must be paid to possible impact on
other systems and adjustments are made as required
Complied by: Sofiyan Gelaw Page 35
Training, Teaching and Learning Materials Development
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1-2” in pages 3-6.
3. Accomplish the “Self-check” in page 7.
4. If you earned a satisfactory evaluation proceed to “Information Sheet 3”. However, if your rating is unsatisfactory, see your teacher
for further instructions or go back to Learning Activity # 1.
5. Submit your accomplished Self-check. This will form part of your training portfolio.
6. Read the information written in the “Information Sheet 3” in pages 8-10.
7. Accomplish the “Self-check” in page 11.
8. If you earned a satisfactory evaluation proceed to “Operation Sheet” in pages 12-41. However, if your rating is unsatisfactory, see
your teacher for further instructions or go back to Learning Activity # 2.
9. Read the “Operation Sheet” and try to understand the procedures discussed.
10. Do the “LAP test” in page 42 (if you are ready) and show your output to your teacher. Your teacher will evaluate your output
either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if satisfactory you can
proceed to Learning Guide 2.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on
additional work. But if satisfactory you can proceed to the next topic.
One of the most important considerations when installing a new hardware peripheral is to try and install the device
with the least amount of disruption to the client. A client may not be very happy if you install a piece of hardware
equipment while they are creating an urgent report. It is important to schedule installation times that are:
1. also suitable to the client’s or computer user’s schedules
2. sufficient length to install and thoroughly test the hardware device.
To achieve this, make sure that you are aware of:
common organizational procedures that regularly need to be performed on the computer (for example, end of
month processing or weekly backups) and plan installations outside these periods
current projects, deadlines and schedules of the client/user.
Installations should be scheduled for times such as:
quiet periods (for example, during holiday periods)
before or after normal office hours
while the client/user is out of the office
when the client will not be needing their computer.
It can be difficult to work out how long it will take to install a peripheral device. It will vary according to the type
of device, current operating system, problems requiring troubleshooting and the experience of the installer. If you will be
Testing
In addition to ensuring a device is able to perform a basic task (such as printing a test page or scanning an image)
it is also necessary that all functionality required by the client is tested. When new peripheral equipment is not tested for
critical functions before being used, it can lead to malfunction, causing large disruptions to clients and potentially damage
other parts of a computer system. If, for example, a new external zip drive has not been tested to check it will be capable
of making backups of specific files, it could mean that vital information of the client’s could be destroyed if those backups
were not successful.
Ensure that all new installations are thoroughly tested after initial setup and prior to use by the client. Depending
on the device, different functions will need to be tested.
Devices that have components that are known to degrade with time, especially printers, should also be tested
periodically. Printers need to be routinely tested, as components such as the ink cartridges and toner can cause
deterioration of print quality and may require maintenance and/or cleaning.
All tests should be completed according to a documented test plan.
Some suggestions of functions that may be tested for a printer, scanner and digital camera devices are included
below.
Printer
Scanner
A test plan is used to work out a structured process to ensure that a new device will work under all expected
circumstances. It logically describes:
1. functions that need to be tested
2. an example test case scenario
3. expected results for each scenario
4. what actually happened once the test has been performed.
Example test case scenarios should simulate realistic work patterns — ie the scenario should realistically
demonstrate if a function will be satisfactory after implementation.
Because testing is so critical to the successful implementation of the new device, it is important that a test plan is
comprehensive and considers every way a device will need to function after implementation. It is useful to refer back to
the client requirements so that you will remember functions that will regularly be expected by the client.
On the next page is a test plan, with selected scenarios, to ensure that a printer is working to acceptable client
requirements.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
1. When is the best time to schedule hardware installation? Give four(4). (4points)
2. What must be done after the installation of hardware peripherals? (1 point)
3. It is used to work out a structured process to ensure that a new device will work under all expected circumstances. (1
point)
4. What does the test plan logically describes? (4 point)
With the large variety of computer systems, operating systems, peripheral types and features, and manufacturers,
each peripheral device will have its own individual installation procedure. It is important to refer to manufacturer
guidelines and manuals when installing any hardware device to ensure that all procedures are correctly followed.
Procedures which are generally followed when installing any new peripheral device include:
1. plugging in the cables between the device and the computer
2. installing any drivers
3. troubleshooting installation when necessary
4. customising the device
5. testing the device for satisfying required conditions.
Whenever you install a hardware peripheral device, you will also have to install a driver. A driver is a software
program that allows the hardware device to talk to the operating system.
Generally, driver software will be included within the packaging of a new device. Sometimes operating systems,
such as Windows XP, automatically provide their own drivers if you don’t provide one. At times it may be necessary to
find a newer version of a driver than the one that has been provided by the manufacturer. It is a good idea to regularly
check the manufacturer’s website to see if any new drivers have been developed.
Plug and play is a hardware technology that enables many operating systems to automatically recognise new
hardware devices and configure them automatically. Most USB devices support plug and play.
To make your computer work, you need to connect all the hardware peripherals to the ports at the back of the
CPU case, as shown above.
Before connecting all the peripherals to its corresponding ports, see to it that the power cord was unplug into the
power source to prevent electrical related injury.
You should be able to connect the Mouse, Keyboard, Monitor, Printer, Scanner, Speaker and power up your
computer by connecting the power cord to the power supply. After doing so, you can now start using your computer.
To do it, you connect the Monitor by using the VGA cord connector to the port
Monitors will either have a VGA or a newer DVI plug (see picture, as they are a lot less apparent than
PS/2 / USB by comparison). Most monitors use VGA connectors, and so most graphics cards have VGA output.
If you have one type of plug and the graphics card has another, you can easily buy an adapter. Some cards even
come with one.
There are two standard connectors for mice and keyboards; PS/2 connectors and the more modern USB
connectors. Plug the mouse and keyboard in the appropriate slot.
PS2 Cable
To connect the scanner to the PC, you will use also use the USB cable.
USB Cable
For audio devices such as speaker or headset, you can connect it o and mic
Speaker/headset
mic
Before powering up your PC, make sure that the power cable was connected to the power supply
To connect the Printer to the PC, you will use the cable below via printer port.
A USB able is now also being use to connect the new printer to the computer especially the colored and laser
printer.
Installing a printer
Printer cable
In many cases a printer won’t automatically have a cable included with the original purchase. Check the printer
specifications — you will probably need to buy either a parallel or USB cable.
1. Turn off the power to both the printer and the computer.
2. Plug the printer cable into the correct port of the PC — depending on the type of printer the port will most likely
to be either a USB or a parallel port located on the back of the computer. If you are plugging the cable into a
parallel port connection you will need to secure the cable by either tightening small screws or snapping in wire
connectors.
3. Install ink
Depending on the printer you have you may need to install an ink cartridge (for inkjet printers) or toner cartridge
(for laser printers). Turn the computer’s power on and follow the manufacturer’s guidelines to install a new cartridge.
Often at the end of the driver installation you will be asked if you would like to print a test page. This is a good
idea because you can quickly determine if the printer is working correctly. If not you can troubleshoot the installation.
If a page is not able to print it is necessary to go back and determine why the printer is not working. There are a
number of factors that can contribute to printer problems including:
cables between printer and computer are not properly connected
printer driver is not suitable for the current operating system
paper is loaded incorrectly
ink cartridge or toner is not correctly installed
printer power switch is off.
Depending on your client’s needs, there may be a need to alter the default printer settings. Some settings that may
be customised include:
Changing the Page Layout — a page may need to be printed in either landscape or portrait orientation.
Changing the Paper Source — depending on the complexity of the printer there may be a variety of trays the
printer has available to use.
Installing a scanner
Scanners can attach to a computer generally via a USB or a parallel port connection.
Before commencing installation, turn of power to the computer and place the scanner on a level surface, close
enough to the computer so that the cable will be able to attach to both devices.
Many scanners have a lock on the bottom to make sure that components are not dislodged when transporting.
Make sure that you unlock the scanner before commencing installation.
Plug the cable into either the USB or parallel port connection, depending on the type of scanner.
Some scanners will have a power cord that will need to be plugged into a power outlet. Other scanners are
dependent on power from the computer. Some scanners will also have an on/off switch, which will also need to be turned
on.
5. Turn on the PC
When you turn on your computer, most operating systems will recognise that new hardware has been added (eg it
is plug and play compatible). If it hasn’t recognised the new scanner you may need to tell your computer that a new device
has been added.
At some point you will be asked if you have a disk for your scanner. This generally means the computer is
requesting you provide it with the disk containing the driver software.
Ensure that the scanner is working by performing a scan of a book or magazine page.
Make the computer works? Connect the peripherals listed below to its corresponding ports and make sure that it
will all work. (Apply safety procedure)
o Monitor
o Mouse
o Keyboard
o Printer
o Scanner
o Speaker
o Power Cord
Why is it necessary to make minimal disruption to the client when replacing hardware peripherals?
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Connect workstations to the internet through the existing internet connection and functionality confirmed
Launch internet browser software is launched to enable access to the internet and functionality confirmed
Learning Activities
1. Read the specific objectives of this Learning Guide.
2. Read the information written in the “Information Sheets 1” in pages 3-6.
3. Accomplish the “Self-check” in pages 7.
4. If you earned a satisfactory evaluation “Information Sheets 2”.
However, if your rating is unsatisfactory, see your teacher for further instructions or go back to Learning Activity #1 .
5. Read the information written in the “Information Sheets 2” in pages 8-10.
6. Accomplish the “Self-check” in pages 11.
7. If you earned a satisfactory evaluation proceed to “Operation Sheet” in pages 12-17. However, if your rating is
unsatisfactory, see your teacher for further instructions or go back to Learning Activity #2.
8. Read the “Operation Sheet” and try to understand the procedures discussed.
9. Do the “LAP test” in page 14 (if you are ready) and show your output to your teacher. Your teacher will evaluate your
output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall advice you on additional work. But if
satisfactory you can proceed to Learning Guide 2.
Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory, your teacher shall
advice you on additional work. But if satisfactory you can proceed to the next topic.
Types of connection
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone
network (PSTN) to establish a dialed connection to an Internet service provider (ISP) via telephone lines. allows
you to connect to the internet via a local server using a standard 56k modem
Your PC literally dials (hence the name) a phone number (provided by your ISP) and connects to the server and
therefore the internet
Internet service providers charge by the minute for your dial-up connection
2. Leased connection
ADSL connection
ADSL (Asymmetric Digital Subscriber Line, or DSL for short) is a high-speed Internet access service that
utilizes existing copper telephones lines to send and receive data at speeds that far exceed conventional dial-up
modems.
The fastest dial-up modems are rated at 57 kilobits per second (Kbps), and usually operate at about 53
Kbps under good conditions. By comparison, ADSL allows data stream speeds from 1.5 to 8 megabits per second
(Mbps), depending on the grade of ADSL service purchased.
ADSL uses standard telephone lines to transmit upstream and downstream data on a digital frequency,
which sets these data streams apart from the analog signals telephones and fax machines use. Because the ADSL
signal is operating on a different frequency, the telephone can be used normally, even when surfing the Web with
ADSL service. The only requirement will probably be inexpensive DSL filters on each phone or fax line, to
remove any "white noise" on the line that might be generated from ADSL service.
The "asymmetric" in ADSL refers to the fact that the downstream data rate, or the data coming to your
computer from the Internet, is traveling faster than upstream data, or the data traveling from your computer to the
Internet. Upstream data rates are slower because Web page requests are fairly miniscule data strings that do not
require much bandwidth to handle efficiently.
Some businesses, however, may require matching upstream rates for uploading large files. SDSL,
or Symmetric Digital Subscriber Line is an option. "Symmetric" indicates that both data streams are operating at
ADSL is an "always on" service, meaning that as long as your computer is powered on, it will
automatically stay connected to the Internet unless you manually disconnect via software or hardware. ADSL is
especially suited for gamers, CAD use, streaming multimedia and downloading large files. Family members can
share ADSL accounts, with a basic monthly fee covering several mailboxes. Unlike dial-up service, which
stipulates only one session be instigated at a time, multiple members can be using ADSL service simultaneously
on various computers in the house without violating policy.
ADSL is not available to everyone. DSL providers, or even your local phone company, can tell you if
service is available in your locale. Speeds will vary depending upon your physical distance from local hubs. Some
customers with close proximity may be able to take advantage of newer varieties of ADSL, called ADSL2 and
ADSL2+, which have even greater throughput rates, from 12 to 24 Mbps downstream and 1 to 3.5 Mbps
upstream.
To generalize ADSL
It stands for Asymmetric digital subscriber line
Uses phone line
The connections work by splitting your phone line into two separate channels, one for data (internet) and
one for voice (phone calls), which means you can talk on the phone and be connected to the internet at the
same time.
Have incredible performance compared to dial up
Have a flat monthly fee
Disadvantages of ADSL
Does not available everywhere
Additional hardware cost, since it needs a special modem called ADSL modem
3. Cable connection
In telecommunications, cable Internet access, often called simply cable Internet, is a form of broadband Internet
access that uses the cable television infrastructure. Like digital subscriber line, cable Internet access provides network
edge connectivity (last mile access) from the Internet service provider to an end user. It is integrated into the cable
television infrastructure analogously to DSL which uses the existing telephone network. Cable TV networks and
telecommunications networks are the two predominant forms of residential Internet access. Recently, both have seen
increased competition from fiber deployments, wireless, and mobile networks.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
Troubleshooting
From time to time, you are bound to run into some "potholes" on the information highway. The following are
some common problems that you might encounter when using the Internet... along with some possible solutions:
Make sure your modem is switched on and connected to a live phone line. If necessary, refer to your
modem's user manual.
Make sure your connection software is configured properly. If necessary, refer to the original setup
instructions, or call your provider's customer service number.
You might be having trouble with your phone line. Before attempting a connection, make sure that all
phones on the line are hung up, and check for a dial tone. You may experience problems if your modem is
"connected" to your phone line by way of a radio-based phone extension. While adequate for voice
Complied by: Sofiyan Gelaw Page 52
Training, Teaching and Learning Materials Development
communications, these extenders usually do not provide a connection that is clean enough (noise-free) for
digital transmissions.
The problem might not be on your end, but might lie with the service provider. Often, if too many users
are logged on to a provider's system, the provider will not permit additional connections. Also, the
provider might be performing system maintenance (though most providers try to do such work during
"off" hours to minimize disruption). If you believe this to be the case, try connecting again until you
establish a connection, or try another "point of presence" phone number for your provider.
Problem: Accessing the Web and Other Resources Takes a Long Time
Solutions:
During particularly busy times, your Internet access provider—along with other servers and gateways on
the Net—might slow down substantially. Some providers report that the hours 12 noon - 3 PM and 9 - 11
PM Eastern time are "prime time" because many users are online for fun as well as business. If you
experience consistently slow performance within a specific time frame, try logging on at a different time
(the early morning hours are typically the least busy).
If your modem speed is slower than 14.4 kbps accessing the more elaborate graphics and other resources
on the Web will be difficult, if not impossible. To enhance the speed at which your computer accesses
information on the Net, replace your modem with a model that transmits data at 28.8 kbps or faster.
Some Internet access providers require that you dial into a special number in order to take advantage of
higher speeds (namely 28.8 kbps). Double-check your connection settings to make sure you are dialing in
to the number that will offer you the best performance.
Most Web browsers allow you to turn off the automatic downloading of graphics when accessing a Web
site, thereby speeding access time. Although Web sites will not look as attractive when you choose this
option, you will access the text and hotlinks (the "guts" of most sites!) much more quickly. And, you can
always load the picture later on by clicking on your browser's RELOAD or REFRESH button, or by
clicking on the blank placeholder of the page graphic (usually designated by a "?" or other icon).
Sites that rely on plug-in or helper applications, or that contain special features such as Java applets,
usually take longer to load than less complex sites.
Web sites are not permanent, and may change URL addresses or even close without notice. In such cases,
hotlinks to affected sites are not always updated or deleted right away. If you receive an error message
when attempting to access a particular site, try searching for a more up-to-date URL via a Web index.
Some access providers maintain their own archives (caches) of Web sites in order to speed up access.
Sometimes, this archiving process will inadvertently disable certain Web functions, making some pages
difficult or impossible to access properly. Also, this archiving process can prevent you from loading the
most current version of a page (a dilemma most noticeable when accessing news sites or other resources
that change frequently).
Your access provider may maintain firewalls that prevent you from accessing certain Internet resources
for security reasons. Contact your service provider if you believe this to be the case.
A Webmaster may establish bozo filters that block certain users from accessing Web pages. Some bozo
filters are temporary, so wait a few days to see if it is removed. Otherwise, try contacting the Webmaster
to see if there are other ways of accessing the site.
Some Web sites require registration before you can access them. Follow the registration procedure (which
may require you to pay a fee before full access is granted).
Your access software may contain a monitoring application that blocks access to Internet resources
considered inappropriate for children. Disable this application if necessary; if you need help, ask your
service provider.
The site may contain a Java applet, ActiveX control, JavaScript, or some other advanced feature that your
browser cannot process. Make sure that:
o your browser is capable of using such features, and that
o these capabilities are activated (see your browser's "Preferences" or "Options" menu).
Download a newer version of your browser if necessary. Look under "Help" in your browser's menu bar
to determine its version. For Netscape Navigator and Internet Explorer, download Version 3 or higher if
you have not already done so.
Your browser might require a plug-in (auxiliary file) to use a feature contained in the site. Most sites will
provide a link for downloading the necessary plug-in; Microsoft Internet Explorer will attempt to
download whatever plug-ins it needs automatically.
If you are on a slow connection (slower than 28.8 kbps), have a slow CPU, or if you are online at a
particularly busy time, your system may have trouble downloading or processing the feature. Try again at
a different time, or just be patient. If your computer has consistent problems processing Java or ActiveX,
disable those capabilities.
Some "virtual memory" applications, which allow a computer to operate as though it has more RAM than
it actually does, can interfere with browsers. If you use virtual memory software and experience frequent
problems with your browser, remove the virtual memory software. If your computer needs more memory,
upgrade it with actual RAM.
The site contains non-standard HTML or unusual scripting that is specific to a particular browser. Look for special
instructions on the site concerning preferred browsers and plug-ins that enable other browsers to use the features.
Many sites offer alternative (usually text-only) pages for users without certain capabilities.
The site contains code that is erroneous or corrupt. If you believe this to be the case, notify the Webmaster.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
Given the Internet connection problem below, please advise at least 3 solutions for each:
d. Accessing the Web and Other Resources Takes a Long Time Solutions
The connection to the Internet is shared to other computers on the local area network (LAN). The network adapter
that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0
On the client computer
To connect to the Internet by using the shared connection, you must confirm the LAN adapter IP configuration,
and then configure the client computer. To confirm the LAN adapter IP configuration, follow these steps:
1. Log on to the client computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click Local Area Connection, and then click Properties.
6. Click the General tab, click Internet Protocol (TCP/IP) in the This connection uses the following itemslist,
and then click Properties.
7. In the Internet Protocol (TCP/IP) Properties dialog box, click Obtain an IP address automatically (if it is not
already selected), and then click OK.
Note You can also assign a unique static IP address in the range of 192.168.0.2 to 192.168.0.254. For example,
you can assign the following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.0.2
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.0.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.
To configure the client computer to use the shared Internet connection, follow these steps:
1. Click Start, and then click Control Panel.
2. Click Network and Internet Connections.
3. Click Internet Options.
4. In the Internet Properties dialog box, click the Connections tab.
5. Click the Setup button.
When you now start Microsoft Internet Explorer, the client computer will try to connect to the Internet by using
the host computer's shared Internet connection.
Troubleshooting
When you turn on Internet Connection Sharing on the host computer, the host computer's LAN adapter is
automatically assigned the IP address of 192.168.0.1. Therefore, one of the following situations may occur:
On the Control Panel, click on Connect to the Internet on the Network and Internet.
A dialog box will appear asking if “Do you want to use a connection that you already have?
Choose No, create a new connection.
You have just set-up a DSL connection. You can now start browsing the web using any of the internet browser.
You may any of the common browser like Internet Explorer or Mozilla Firefox.
To launch it, click on the start menu then click Internet explorer