Nothing Special   »   [go: up one dir, main page]

CSS11 q1 Mod1 InstallandConfigureComputerSystem v5

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 48

Senior High School

Computer System
READY TO
PRINTNCII
Servicing
MODULE 1:
Install and Configure
Computer Systems
Computer System Servicing NC II0 Grade 11
Alternative Delivery Mode
Quarter 1 – Module 1: Install And Configure Computer Systems
Second Edition, 2021

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.
Borrowed materials (i.e., songs, poems, pictures, photos, brand names,
trademarks, etc.) included in this book are owned by their respective copyright holders.

READY
PRINTTO
Every effort has been exerted to locate and seek permission to use these materials from
their respective copyright owners. The publisher and authors do not represent nor claim
ownership over them.

Published by the Department of Education -Division of Misamis Oriental

Development Team of the Module

Author: Alexis V. Larosa, PhD


Reviewers: Cherry M. Sadicon
Fe L. Dalugod
Shiela T. Arellano

Development Team
Chairperson: Dr. Arturo B. Bayocot, CESO III
Regional Director
Co-Chairpersons: Dr. Victor G. De Gracia Jr. CESO V
Assistant Regional Director
Jonathan S. dela Peña, PhD, CESO V
Schools Division Superintendent
Nimfa R. Lago, PhD, CESO VI
Assistant Schools Division Superintendent
Mala Epra B. Magnaong, Chief ES, CLMD

Members: Marie Emerald A. Cabigas, PhD, EPS-LRMS; Bienvenido U. Tagolimot,


Jr., PhD, EPS-ADM; Erlinda G. Dael, PhD, CID Chief; Ferminia M. Labis,
EPS (Araling Panlipunan); Celieto B. Magsayo, LRMS Manager; Loucile
L. Paclar, Librarian II;
Kim Eric G. Lubguban, PDO II

Printed in the Philippines by


Department of Education – Division of Misamis Oriental
Office Address: Del Pilar corner Velez Street, Brgy. 29, Cagayan de Oro City 9000
Telefax: (088) 881-3094 | Text: 0917-8992245 (Globe)
E-mail Address: misamis.oriental@deped.gov.ph
11
Computer System
Servicing NCII
READY
PRINT
MODULE 2:
TO
Install and Configure
Computer Systems

Table of Contents
What I Need To Know …………………………………….…….…… 1
General Instructions ………………………………………………… 1
Module Objectives ………………………………………………… 2
Module Content ………………………………………………… 2
What I Know ………………………………………………… 2
Definition of Terms ………………………………………………… 5

READY
PRINTTO
Quarter 2- Learning Outcome 3: Install operating system and drivers for
peripherals/ devices
Learning Outcome 4: Install application software
Learning Outcome 5: Conduct testing and documentation
Information Sheet No. 1.2-2 - Creating Installers 6
Task Sheet No. 1.2-2 9
Information Sheet No. 1.2-3- Creating Bootable USB Media 10
Task Sheet No. 1.2-3 11
Information Sheet No. 1.3-1- Installing Windows Operating System 12

Task Sheet No. 1.3-1 15


Information Sheet No. 1.3-2- Installing Device Drivers 16
Information Sheet No 1.4-1- Installing an Application Software 18
Task Sheet 1.3-2 23
Information Sheet No 1.5-1- Conduct Testing and Documentation 24
Self-Check 1.5-1 34
Post-Test ………………………………………………… 35
Key to Answers ………………………………………………… 41
References ………………………………………………… 44
TO THE STUDENT

Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems

READY
PRINTTO
that is in line with the industry standards. You need to complete this module before
you can perform the next module.

HOW TO USE THIS MODULE

The unit of competency, “Install and Configure Computer Systems“, is one of the
competencies of Computer Systems Servicing NCII, a course which comprises
knowledge, skills and attitudes required for a trainee to possess.
In this module, you are required to go through a series of learning activities in
order to complete each learning outcome. In each learning outcome are Information
Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the
activities on your own. If you have questions, do not hesitate to ask for assistance from
your teacher.
Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there
to support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you
will improve your speed, memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with
essential Knowledge, Skills, and Attitude in performing the tasks on Computer System
Servicing which will lead you to acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills
and understanding through step-by-step procedures and helpful techniques that will
guide you on how to install and configure computer systems. Furthermore, applications
to real life situations are also included for lifelong learning.

READY
PRINTTO
What to Learn in this Module?
At the end of the lesson, you’re expected to:

1. Assemble computer hardware.


2. Prepare installer.
3. Install operating system and driver for peripherals/devices.
4. Install application software.
5. Conduct test and documentation.

1
Pre-Test
What I Know?

1. What does BIOS stand for?

a. BASIC INPUT OUTPUT SYSTEM


b. BASIC INDUCT ONLINE SYSTEM
c. BASIC INDUSTRY ONLINE STANDARDS
d. BASIC INSULATOR OPEN SOURCE

READY
PRINTTO
2. CPU is the _____________ of the computer.

a. mother
b. system
c. brain
d. process

3. What cable is used to connect PC to switch hub and router?

a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable

4. Is the hardware in a computing device where the operating system (OS), application
programs and data in current use are kept so they can be quickly reached by the
device's processor.

a. RAM
b. Operating system
c. CPU
d. HDD

5. What RAM stands for?

a. Random Access Memory


b. Random Autonomous Memory
c. Read Action Memory
d. Rare Ally Memory

2
6. Identify the malwares.
a. trojan
b. virus
c. spyware
d. all of the choices

7. An example of super computer is :


a. MP3 players
b. Desktop
c. Cell phones
d. Mainframe computers

READY
PRINTTO
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent

9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard

10. USB stands for


a. Universal Serial Bus
b. University Serial Bus
c. Universal Serial Body
d. Universal Series Bus

11. What is this?


a. Mouse
b. Speakers
c. Keyboard
d. Monitor
 
12. What is this?
a. CPU
b. Modem
c. Internet
d. Cable

13. What is this?


a. Malware
b. Software
c. Hardware

3
d. People

14. OS stands for


a. Onsite Software
b. Operating System
c. Only Read Software
d. On-demand System

15. What is this?


a. CPU
b. Processor

READY
PRINTTO
c. System Unit
d, PC

Definition of Terms

4
CPU-Central processing unit; the brain of the computer; controls the other elements
of the computer

Disk Drive-A peripheral device that reads and/or writes information on a disk

Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files

Keyboard-A peripheral used to input data by pressing keys

Modem-A peripheral device used to connect one computer to another over a phone
line

READY
PRINTTO
Monitor-A device used to display information visually

Mouse-A peripheral device used to point to items on a monitor

Printer-A peripheral device that converts output from a computer into a printed image

Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer

Driver-Software program that controls a piece of hardware or a peripheral

Icon-A small picture used to represent a file or program in a GUI interface

Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols

URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet

Virus-A deliberately harmful computer program designed to create annoying glitches or


destroy data

Window-A screen in a software program that permits the user to view several programs
at one time

5
What I Need To Know?

Read Information Sheet No. 1.2-2 and find out how much you can
remember. Do Self-Check 1.2-2 to know how much you have learned.

CREATING INSTALLERS

ISO and IMG Files

WHAT IS AN IMG OR ISO FILE? An IMG or ISO file is a complete image of physical
media such as a CD-ROM, DVD, floppy disk, etc. that contains all of the files in a

READY
PRINTTO
particular package.

Bootable Installation Packages

PACKAGE? IMAGE? DISK/MEDIA?

a. Installation Package: what you purchase from the WebStore


b. Installation Image: the content of the installation package
c. Installation Disk/Media: what you produce from the installation image through
the burning process

BOOTABLE INSTALLATION PACKAGE

The bootable installation package


contains a disk image that is identical to
the boxed product that you would
purchase at any software retailer. This
image may be burned directly to physical
media to produce a bootable installation
DVD. Once copied to physical media, this
package may be used to install an
Operating System on any compatible
hardware, with or without an existing
Operating System installed.

WHAT DO I DO WITH MY INSTALLATION PACKAGE?

6
Your installation package contains one of the images identified in the previous section.
To install any software package from an image, the image itself must first be “mounted”
by the Operating System.

This can be accomplished by:

∙ Burning the image directly to DVD making sure to specify the source type as
“image”. Once the burning of the image is complete, the physical media can be
inserted into the computer and will be recognized like any other DVD. You must
have a writable DVD drive. See the Creating Bootable DVD Media section below.

∙ Burning the image directly to a USB thumbdrive. This is particularly useful for

READY
PRINTTO
those people who have Netbooks or other computers without a writable DVD
drive. See the Creating Bootable USB Media section below.

Note: Burning the file to a disk as a “data disk” will simply end up with
an .img or .iso file on the disk, which cannot be used for the installation.

Preparing physical media from a bootable installation Image REQUIREMENTS

To prepare physical media from a bootable installation image, you require the following:

∙ Writable DVD drive (DVD-R, DVD-RW, DVD+R, DVD+RW)


∙ Writeable DVD media
∙ CD/DVD Burning Software (Roxio©, Nero ©, Active@ ISO Burner, CD
BurnerXP Pro, etc.)
∙ Bootable Installation image
o The image downloaded when selecting the Bootable Installation
Package or that created from the Executable Installation Package using
the instructions in the section entitled “Creating A Bootable Installation
Image from the Executable Installation Package”

CREATING BOOTABLE DVD MEDIA


The general process for creating bootable DVD media is similar in all CD/DVD
burning software.
If you do not already have an application to burn files onto a DVD, you will need
to download a freeware version. Following are the steps to download Active@ISO
Burner (available through NTFS.com at http://software.lsoft.net/IsoBurner-Setup.exe).
If you choose to use a different application, follow the steps for that application

LAUNCHING THE BURNING SOFTWARE

The instructions below use Windows as an example

7
To launch the burning software:

1. Double Click to launch the program.

SELECTING THE IMAGE TO BURN To select the image to burn:

1. In the Active@ISO Burner window, click on


the locator box as shown by the red arrow

2. Find and select the IMG file previously

READY
PRINTTO
downloaded.

3.Mode: Track-At-Once Speed:2.0x

4. Click Options: Check:


Verify Data & Burn in
Test Mode

5. Click Burn and wait for the process to Finish , then Exit
.

8
TASK SHEET. 1.2-2

Title: Creating a Bootable DVD/CD

Performance Objective In the Computer Lab, given all the software and a
computer, the learner must be able to create a an installation disk for Drivers,

READY
PRINTTO
Applications and Utilities 15 Minutes.

Supplies/Materials: Software/Flash/USB Drive/Computer

Equipment:

1.Computer
2.Installation Software (Drivers, Application Software and Utilities)
3. PPE

Steps/Procedure:

1.Proceed to the station (with PC Unit) assigned to you


2. Create a :Driver Installers and Utilities
1. Submit output to teacher for evaluation

Assessment Method: Practical with interview

9
What I Need To Know?

Read Information Sheet No. 1.2-3 and find out how much you can
remember. Do Task Sheet 1.2-3 to know how much you have learned.

CREATING BOOTABLE USB MEDIA


To create bootable USB Media:

To be able Create a Windows bootable USB from an ISO image we must have a
8GB or higher USB and a Windows 10 ISO image downloaded on your computer.

READY
PRINTTO
Download: Rufus app: https://rufus.akeo.ie/ Download Windows 10: https://goo.gl/Q75Q4d

Steps in Creating a bootable USB Media (Using Rufus)


1. Insert the USB Drive to any USB Port in your PC.
2. Double click the Rufus Application to launch the program.
3. Once its open, make sure the USB Drive you inserted can be seen Rufus, else click the drop
down arrow to select your media.
4. On the Boot Selection Menu, Click Select.
5. Browse for your Windows Image file in your PC.
6. Click Start. When prompted with a Warning: ALL DATA… Click OK.
7. When the status bar reached 100 percent or Ready, click Close .

3
5

10
TASK SHEET. 1.2-3

Title: Creating a Bootable USB Drive

Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to create a bootable Windows in USB Drive
in 25 Minutes.

READY
PRINTTO
Supplies/Materials: Software/Flash/USB Drive/Computer

Equipment:

1.Computer
2.Installation Software (Windows ISO File, Rufus, ISO Burner)
3. PPE

Steps/Procedure:

1.Proceed to the station (with PC Unit) assigned to you


2. Create a :
1. bootable Windows
2. bootable Windows Server
3. Driver Installers and Utilities
1. Submit output to teacher for evaluation

Assessment Method: Practical with interview

What I Need To Know?

Read Information Sheet No. 1.3-1 and find out how much you can
remember. Do Self-Check 1.3-1 to know how much you have learned.
11
Installing Windows Operating System

Installing Windows 10

In order to install your copy of the Windows 10 operating system please make sure to
have the following items:

-Windows 10 Installation disk / bootable USB Drive


-Drivers CD: * Use after installation process if needed.

READY
PRINTTO
*NOTE: Please make sure to back up all of your important data before proceeding with
this installation.

Setting up your Computer & BIOS changes ( If required)

Boot your computer after popping in the Windows 10 DVD into the DVD Drive/ bootable
USB Drive. In most cases if you do this you'll automatically boot in to the Windows 10
Installation DVD. Bootable USB Drive. But in some cases if the Boot device order is
changed in the BIOS it may boot in to your older OS, instead of our DVD/USB Drive. In
that case you'll need to change the BIOS settings to get it done.

Before the starting installation make sure what type of PC you are using( 32bit or 64 bit)
To do this:
1. Right Click on This PC and click Properties:
2. You will then get the necessary information you need.

Booting Up and First Installation Steps


The steps are pretty straight forward. Please read the descriptions in each pages
carefully before clicking the Next button.
Step 1. Insert the Windows operating
system disk into your DVD/USB drive, and
then restart your computer

12
Step 2. You will see a prompt that says ‘Press any key to continue’. When you see this
press any key immediately. *NOTE: The following screen shots may differ from what
you may see during your installation.
Step 3: Starting windows with windows logo will appear

Step 4: Language option , by default is


English will be set along with “time currency
“ format and “keyboard” or input method.
Click Next

Step 5. Install Now

READY
PRINTTO You will be prompted to enter the license key. You
can choose skip at
this time

Step 6. End User License Agreement ( E.U.L.A) check


the box and click “Next”

Step 7: “Which type of installation?” will appear. Choose Custom(advanced) for clean
installation.

Step 8.
“Where do
you want to
install Windows?” Make sure the partition is
highlighted.

Step 9. Delete the partition by clicking on Drive


options (advanced) on the bottom right corner of the
field. Make sure the partition is highlighted and click
Delete.

Note: Deleting all the partition will erase all data in the
system

13
Step 10. Disk 0 Unallocated Space should be the only listing at this point. If it is press
next, if not please delete any additional partitions that are listed. Clicking Next will
automatically reformat the drive and install the Operating System

Step 11. The next screen will show “Installing


Windows” This process will take approximately
25-20 minutes after which the system will
reboot.

Note: Do not press any key during this boot

READY
PRINTTO
up process so as not to disturb the rest of
the installation process.

Step 12. The next screen will show “Installing


Windows” to complete the installation process.

Step 13. “Set=up is staring windows “ will appear,


then you will be asked to create a username and
a computer name

Step 14. The next screen will prompt you to


create a password for your account (optional)

At this point windows installation will be setting


up you computer for its first run.

The installation is done. You have successfully installed Windows 10.

TASK SHEET. 1.3-1

Title: Installing Windows 10

Performance Objective In the Computer Lab, given all the software and a
computer, the trainee must be able to Install Windows Operating system, Drivers,
Applications and Utilities in 1 hour

14
Supplies/Materials: Software/Flash/USB Drive/Computer

Equipment:

1.Computer
2.Installation Software (Windows Operating System Installer, Drivers, Application
Software and Utilities)
3. PPE

Steps/Procedure:

READY
PRINTTO
1.Proceed to the station (with PC Unit) assigned to you
2. Clean Install a Windows 10 Operating System
3. Install all Device Drivers
4. Install windows Update
5. Install third Party Software
a. Antivirus
b. MS Office
c. PDF Reader
d. Web Browser

Assessment Method: Practical with interview

What I Need To Know?

Read Information Sheet No. 1.3-2 and find out how much you can
remember. Do Self-Check 1.3-2 to know how much you have learned.

Installing Device Drivers

Device driver

15
More commonly known as a driver, a device driver or hardware driver is a group of files
that enable one or more hardware devices to communicate with the computer's
operating system.

How do I locate software or drivers for my computer?

Determine the hardware

Before searching for the drivers or software of a device, make sure you know the
manufacturer and model of the device.You can often find the drivers available for
download from the manufacturer's web page or the drivers and utilities CD shipped with
your computer. You can find a listing of computer manufacturers in the internet.

READY
PRINTTO
What hardware device drivers should be updated?
Below is a listing of recommended hardware devices that you should make sure
are updated. Updating your computer's drivers and other updates can resolve problems,
improve the performance, and increase the stability of your computer.
⮚ BIOS updates
⮚ CD or DVD drive drivers and firmware
⮚ Controllers
⮚ Display drivers
⮚ Keyboard drivers
⮚ Mouse drivers
⮚ Modem drivers
⮚ Motherboard drivers and updates
⮚ Network card drivers
⮚ Printer drivers
⮚ Removable media drivers
⮚ Scanner drivers
⮚ Sound card drivers
⮚ Video drivers
⮚ BIOS updates

What order should I install my computer drivers in?

After reinstalling Windows or your operating system you may find that you have
to reinstall many if not all of the drivers for your computer components. Microsoft
Windows and all other operating systems will not require you install drivers in order. As
long as you are installing the correct drivers for your computer you should have no
issues installing the drivers in any order.

Computer drivers, firmware, and software


Click the following link
http://www.computerhope.com/drivers/index.htm

16
follow this link for Tips and Tricks in installing and updating device drivers.

https://www.youtube.com/watch?v=BDtwfRnEl7I

READY
PRINTTO

What I Need To Know?

Read Information Sheet No. 1.4-1 and find out how much you can
remember. Do Self-Check 1.4-1 to know how much you have learned.

Installing an Application Software

Application software consists of programs designed to perform specific tasks for users.

How To Start A Software Application?

Both the Microsoft Windows and the Apple Macintosh operating systems use the
concept of a desktop. The desktop is an on-screen work area with common graphical

17
elements such as icons, buttons, menus, links, windows, and dialog boxes. A software
application can be started by clicking its program name on a menu, or list of commands.

The Widely Used Products and its key features

1. People use productivity software to become more effective and efficient while
performing daily activities. Word processing software allows users to create and
manipulate documents that contain text and graphics. With word processing software,
you can insert clip art into a document; change margins; find and replace text; use a
spelling checker to check spelling; place a header and footer at the top and the bottom
of a page; and vary font (character design), font size (character scale), and font style
(character appearance).

READY
PRINTTO
2. With spreadsheet software, data is organized in rows and columns, which
collectively are called a worksheet. The intersection of a row and column, called a cell,
can contain a label (text), a value (number), or a formula or function that performs
calculations on the data and displays the result.

3. Database software allows you to create and manage a database. A database is a


collection of data organized to allow access, retrieval, and use of that data. A query is
used to retrieve data according to specified criteria, which are restrictions the data must
meet.

4. Presentation graphics software is used to create presentations that communicate


ideas, messages, and other information to a group through a slide show. You can use a
clip gallery to enhance your presentation with clip art images, pictures, video clips, and
audio clips.

5. A personal information manager (PIM) is software that includes an appointment


calendar to schedule activities, an address book to maintain names and addresses, and
a notepad to record ideas, reminders, and important information. A software suite is a
collection of individual applications sold as a single package.

6. Project management software allows you to plan, schedule, track, and analyze the
progress of a project. Accounting software helps companies record and report their
financial transactions.

7. Power users often use software that allows them to work with graphics and
multimedia. Computer-aided design (CAD) software assists in creating engineering,
architectural, and scientific designs. Desktop publishing (DTP) software is used to
design and produce sophisticated documents. DTP is developed specifically to support
page layout, which is the process of arranging text and graphics in a document. Paint
software is used to draw graphical images with various on-screen tools. Image editing
software provides the capability to modify existing images. Video editing software and
audio editing software can be used to modify video and audio segments.

18
8. Multimedia authoring software is used to create electronic interactive presentations
that can include text, images, video, audio, and animation. Web page authoring
software is designed to create Web pages and to organize, manage, and maintain Web
sites.

9. Integrated software combines several productivity software applications that share


a similar interface and common features into a single package. Personal finance
software is an accounting program that helps pay bills, balance a checkbook, track
income and expenses, follow investments, and evaluate financial plans. Legal software
assists in the creation of legal documents and provides legal advice. Tax preparation
software guides users through the process of filing federal taxes. Personal DTP
software helps develop conventional documents by asking questions, presenting

READY
PRINTTO
predefined layouts, and supplying standard text.

10. Photo-editing software is used to edit digital photographs. A clip art/image gallery
is a collection of clip art and photographs that can be used in all types of documents.
Home design/landscaping software assists with planning or remodeling. Educational
software teaches a particular skill and exists for about any subject. Reference software
provides valuable and thorough information for all individuals. Entertainment software
includes interactive games, videos, and other programs designed to support a hobby or
provide amusement.

11. One of the main reasons people use computers is to communicate and share
information. E-mail software is used to create, send, receive, forward, store, print, and
delete e-mail (electronic mail). A Web browser is a software application used to access
and view Web pages. A chat client is software that allows you to connect to a chat
room, which permits users to chat via the computer.

12. A newsreader is a software program used to participate in a newsgroup, which is


an online area on the Web where users conduct written discussion about a particular
subject. An instant messenger is a software program installed to use instant messaging
(IM), a real-time communications service that notifies you when one or more people are
online and then allows you to exchange messages or files. Groupware is a software
application that helps groups of people on a network work together and share
information. A videoconference is a meeting between two or more geographically
separated people who use a network or the Internet to transmit audio and video data.

Various Products Available As Web Applications

A Web application is a software application that exists on a Web site. To access the
Web application, you visit the Web site that offers the program.

The Learning Aids Available With Many Software Applications

Many software applications and Web sites provide learning aids. Online Help is the
electronic equivalent of a user manual. Usually integrated into an application software

19
package, online Help often is context-sensitive, meaning that the Help information is
related to the current task being attempted. Most online Help also provide links to Web
sites that have a FAQs page. FAQs (Frequently Asked Questions) supply answers to
common queries. Many books are available to help you learn to use the features of a
personal computer application package. A wizard is an automated assistant that helps
complete a task by asking questions and then performing actions based on the
answers.

Popular types of application software can be categorized by their general use:

⮚ productivity software,
⮚ graphics design/multimedia software,

READY
PRINTTO
⮚ home/personal/educational software,
⮚ and communications software.

An application can belong to more than one category. For example, an e-mail program
can be considered both productivity software and communications software.

Anti-Virus

Overview

Anti-virus is a security program you install on your computer or mobile device to protect
it from getting infected by malware. The term “malware” is a catch-all phrase for any
type of malicious software, such as viruses, worms, Trojans and spyware. In fact, the
term malware comes from combining the words malicious and software. If your
computer has become infected by malware, a cyber attacker can capture all of your
keystrokes, steal your documents or use your computer to attack others. Contrary to
what some people believe, any operating system, including Mac OS X and Linux, can
be infected.

Types of Computer Viruses

Browser Hijacker

One type of virus is called a browser hijacker. This works in a way that it takes over
parts of the internet browser you are using and redirects it to certain sites. Its purpose is
to increase advertisement revenue by bringing traffic to certain web pages.

Directory Virus

A second type of virus is known as a Directory Virus and are also called File System
Virus or Cluster Virus. This virus works by changing the path that indicates the files
location by infecting the directory of your computer. These infect the entire directory but
are usually found in a location in the disk. An example is Dir-2 virus. These make it
difficult to locate your files and may seem that files have disappeared.

20
Trojan

Trojan or Trojan horse is sent to your computer by a program that it is hidden inside . A
trojan disguises itself to make one believe it is an important or useful program. These
are often in highly desirable downloads like games, free software, and even movies or
music. Trojans are different that other viruses, because they don’t multiply or spread.
However, they are very dangerous because they can capture your login information on
sites that you input your information.

Memory Resident Virus

Memory Resident Virus are put on your computers memory. When the operating system

READY
PRINTTO
runs the virus gets activated and every file that was opened gets infected. Even after
execution of the malicious code the virus stays hidden in the RAM. This virus corrupts
programs and files that are used in any way. Randex, Meve and MrKlunky are some,
just to name a few.

Overwrite Virus

Another type is Overwrite Virus. This virus takes a file and infects it and the information
in it is deleted, once that happens the file is partially useless or totally. The file size is
not changed even though the content has been replaced. The file needs to be deleted,
and you will lose the content originally in it.

Anti-Virus Tips

1.Obtain anti-virus software only from known, trusted sources and vendors. It is a
common ploy of cyber attackers to distribute fake anti-virus programs that are really
malware.

2. Make sure you have the latest version of your anti-virus software installed, that your
annual subscription is paid for and active and that your anti-virus is configured to update
automatically. If your computer has been offline or powered off for a while, your anti-
virus software will need to update itself when you turn it back on or reconnect it to the
Internet. Do not postpone these updates.

3. Make sure your anti-virus automatically scans portable media, such as USB sticks,
and ensure real-time protection is on.

4.Pay attention to the on-screen warnings and alerts generated by your anti-virus
software. Most alerts include the option of getting more information or a
recommendation about what to do next. If you get an alert on a work-supplied computer,
be sure to contact the help desk or your supervisor immediately.

5.Do not disable or uninstall your anti-virus software because you feel it is slowing down
your computer, blocking a website or preventing you from installing an app or program.

21
Disabling your anti-virus will expose you to unnecessary risk and could result in a
serious security incident. If problems persist on a work computer, contact your help
desk. If the problems persist on your personal computer, try contacting the anti-virus
vendor, visiting their website for more information or replacing your anti-virus with
another product.

6.Do not install multiple anti-virus programs on your computer at the same time. Doing
so will most likely cause the programs to conflict with each other and may actually
reduce the security of your computer.

7.Learn to recognize the warnings that your anti-virus software produces. Cyber
attackers can set up malicious websites that post very realistic but fake anti-virus

READY
PRINTTO
warnings and offer to help you “fix” your computer. Clicking on the links or buttons on
these websites can actually harm your computer.

Visit: https://www.youtube.com/watch?v=6ZGhDPfSXXA

https://www.youtube.com/watch?v=TyvNWL4QaQw

22
Task Sheet 1.3-2

At this point your teacher will again demonstrate how to install an Operating
system, device drivers and third-party application. After which you will be asked to do
the task by yourselves. Below is the rubrics on how you will be assessed.

Task 1- Install an Operating System based on the specifications given to you.

READY
PRINTTO
Task 2- Install the necessary drivers and updates.

Task 3- Install a third party application as instructed.

23
What I Need To Know?

Read Information Sheet No. 1.5-1 and find out how much you can
remember. Do Self-Check 1.5-1 to know how much you have learned.

Conduct Testing and Documentation

CONDUCT TEST ON THE INSTALLED COMPUTER SYSTEM

You were introduced with all the necessary knowledge and skills on installation of
computer devices and operating system. Now, after executing the correct procedures I

READY
PRINTTO
am sure that installation is a very easy task for you.
Those skills will be very essential for the next lesson.
In the next phase of your learning it will focus in conducting test on the 588 installed
computer components. After reading all the required topics and performing the essential
skills you must be able to:
✔ Follow OHS policies and procedures in conducting tests;
✔ Check circuits and systems being isolated using specified testing procedures;
✔ Test devices, systems and/or installation to determine its conformity with the
requirements;
✔ Undertake final inspections on the installed devices, systems to ensure
conformity with the requirements;
✔ Accomplish technical reports on the tests conducted; and
✔ Follow procedures in forwarding documentation to appropriate personnel and/or
authority on the test conducted.

TESTING INSTALLED EQUIPMENT / DEVICES (COMPONENTS)


As computer technician you will need a good understanding of the health and safety
regulations from early on in your career, so that you understand the good practices
demanded by law. In particular, you need to:
✔  report any accidents
✔  take reasonable care of your own health and safety when moving heavy
components
✔  not cause any electrical hazards
✔  make sure that workstations meet safety requirements.

You need to adhere to health and safety regulations as they will help to protect you and
others and will avoid any unnecessary legal action for reckless and unsafe working
practices. If you identify any health and safety problems, you should tell yourline
manager or the health and safety representative immediately.

The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the
system after an installation.

24
The Use of Diagnostic Tools in testing installed hardware components and other
peripherals

Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the
following:
⮚ Digital multimeter is a device that can take many types of
measurements. It tests the integrity of circuits and the quality of
electricity in computer components. A digital multimeter displays

READY
PRINTTO
the information on an LCD or LED.

⮚ A loopback adapter, also called a loopback plug, tests


the basic functionality of computer ports. The adapter
is specific to the port that you want to test.

⮚ The toner probe, is a


two-part tool. The toner part is connected to a
cable at one end using specific adapters, such
as an RJ-45, coaxial, or metal clips. The toner
generates a tone that travels the length of the
cable. The probe part traces the cable. When the
probe is in near proximity to the cable to which
the toner is attached, the tone can be heard
through a speaker in the probe.

Software Tools
Like hardware tools, there are a variety of software tools that can be used to 643
help technicians pinpoint and troubleshoot problems. Many of these tools are free
and several come with the Windows operating system.

Disk Management Tools

Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able to use
a range of software tools to diagnose problems, maintain hardware, and protect the
data stored on a computer.

You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.

25
The following are some disk management tools:
⮚ FDISK: A command-line tool that creates and deletes partitions on a hard
drive. The FDISK tool is not available in Windows XP, Vista, or 7. It has been
replaced with the Disk Management tool.
⮚ Disk Management Tool: Initializes disks, creates partitions, and formats
partitions.
⮚ Format: Prepares a hard drive to store information.
⮚ ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard
drive by scanning the file system. These tools might also check the disk
surface for physical errors.

READY
PRINTTO
⮚ Defrag: Optimizes space on a hard drive to allow faster access to programs
and data.
⮚ Disk Cleanup: Clears space on a hard drive by searching for files that can be
safely deleted.
⮚ System File Checker (SFC): A command-line tool that scans the operating
system critical files and replaces files that are corrupted.

Use the Windows 10 boot disk for troubleshooting and repairing corrupted files. The
Windows 10 boot disk repairs Windows system files, restores damaged or lost files,
and reinstalls the operating system.

Test procedures
A test procedure is a set of steps to guide you through what needs to be done to
thoroughly test the installation. It is designed to help you work more effectively and
to make sure you test everything that needs testing.

Test procedures are created in-house and could include these steps:

1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your tests
in a log so that you know which pass and which fail, thereby requiring further action.

2. Validating the test information. The next step is to check the data you gathered
from the tests to make sure it is correct. This is usually done by running the tests
again.

3. Responding to test information. This step is important because you need to be


able to recognize when a test shows problems or is successful. For example, if ping
is used to test a network connection then ‘Request timed out’ shows the test was not
successful.

4. Checking specification. The final step is an important end to testing. You need
to check the specification for the installation to make sure that it has been met. For
example, if a user requested an upgrade to make their display run at 1920 x 1200,

26
then the ICT professional should check that the graphics card and screen can do
this.

External Visual Inspection

The external visual inspection consists of a quick inspection of the exterior of the
computer, the monitor, the keyboard, any peripherals, and cables. While performing
the visual inspection, make any necessary corrections. To perform the external
visual inspection, perform the following steps:

1. Turn off the computer, the monitor, and all peripherals.

READY
PRINTTO
2. Verify that all power cables are properly connected to the computer, the monitor
and peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly attached to the
proper connectors on the back of the computer.
⮚ For a PS/2-compatible mouse, the keyboard and mouse interface cable
connectors are identical except for their labels.
⮚ For a serial mouse, the mouse interface cable must be firmly attached to one
of the serial port connectors, and its captive screws must be secure enough
to ensure a firm connection.
4. Verify that network cables (if present) are properly attached.
5. Verify that any devices attached to the serial and parallel port connectors are
properly connected.
⮚ Each of the serial and parallel port interface cables must be firmly attached to an
appropriate connector on the back of the computer as well as to the interface
connector on the device. The captive screws that secure these connectors at
each end of the interface cable must be secure enough to ensure a firm
connection.

6. Verify that the video interface cable is firmly attached to the video connector on
the back panel or to a video expansion card, and also to the connector on the back
of the monitor. For proper connection of the video monitor, see the documentation
for the monitor.
7. Inspect all external monitor controls for any obvious damage or improper settings.
For proper settings of the video monitor controls, see the documentation for the
monitor.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys are
sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and all
user-accessible data storage devices for any signs of physical damage. Does the
inspection reveal any problems?

Yes. Proceed to the appropriate procedure in "Removing and Replacing Parts."

27
No. Proceed to "Observing the Boot Routine."

Observing the Boot Routine

After you have performed an external visual inspection as described in the previous
section, you should boot the system and, while the boot routine is running, observe
the system for any indications of problems.

NOTE: Most of the steps in this procedure require observation of system functions

READY
PRINTTO
and indications, some of which can occur simultaneously. It may be necessary to
reboot the system several times to complete all of these steps.

To observe problem indications during the boot routine, perform the following steps:
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan.

Does the fan run normally?


o Yes. Proceed to step 3.
o No. Troubleshoot the system power supply.

3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the
upper-right corner of the keyboard. After all three indicators flash momentarily, and
following a long pause (approximately 30 seconds), the Num Lock indicator should
light up and remain on (unless the Num Lock option is set to Off in the System
Setup program). Do these indicators flash on and off within approximately 10
seconds after the boot routine starts?
o Yes. Proceed to step 4.
o No. Troubleshoot the system power supply. If the troubleshooting
procedure indicates that the system power supply is operational, troubleshoot
the memory.

4. During the boot routine, observe the system for any of the following indications:
o Beep codes — A beep code is a series of beeps that indicates an error
condition.

o System error messages — these messages can indicate problems or provide


status information.

o Diskette-drive and hard-disk drive access indicators — These indicators


light up in response to data being transferred to or from the drives. If either of
these indicators fails to light up during the boot

28
routine, troubleshoot the diskette drive or hard-disk drive subsystem, as
appropriate.

5. Observe the monitor screen for the Diagnostics menu.

Internal Visual Inspection

NOTICE: Before you proceed with the internal visual inspection described in this
section, ensure that the user has saved all open files and exited all open application
programs if possible.

A simple visual inspection of a computer’s interior hardware can often lead to the

READY
PRINTTO
source of a problem, such as a loose expansion card, cable connector, or mounting
screw. To perform the internal visual inspection, perform the following steps:

1. Turn off the system, including any attached peripherals, and disconnect all the 779
AC power cables from electrical outlets.

CAUTION: Before beginning to work inside the computer, disconnect the power
supply from the power source and the power supply cables from the power
supply.

2. Remove the computer’s right side cover.

CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges
on the heat sink.

3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.

4. To ensure that the chips are fully seated in their sockets, press firmly on the top of
each
chip.

5. Verify that all jumpers are set correctly.

6. Check all cable connectors inside the computer to verify that they are firmly 788
attached to their appropriate connectors.

7. Reinstall the computer cover.

8. Reconnect the computer and any attached peripherals to their power sources, 791
and

29
turn them on.

Testing Computer System

Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk sound
coming from the hard drive. Or maybe you remember the last time your Internet
connection was down.

The best way to find out what's wrong is to take a proactive approach: Check under
your PC's hood with the following mostly free diagnostic tools, and see if anything is
amiss--before disaster strikes.

READY
PRINTTO
Three Major Components of Computer System:
o Hardware
o Software
o Firmware

Test Your Hardware


Checking your computer hardware and its peripherals
1. Computer Monitor and its peripherals
o Monitor and interface cables
o Video card
o Monitor power cable
2. Keyboard and Mouse
o Keyboard connector
o Mouse Connector

3. I/O port and devices


o Connection between the I/O port and the peripheral device
o A faulty cable between the I/O port and the peripheral device
o A faulty peripheral device
o Incorrect settings in the System Setup program
o Incorrect settings in the system's configuration files
o Faulty I/O port logic on the system board

4. Power supply
o Power cord
o Fuse

30
Testing Your Software
Check the different software installed in the computer.
1. Operating system
 Run live updates for your operating systems to get the latest patches and
protection for your OS.
 Run registry scanners to check the OS registry configuration
2. Application Software
 Check for live updates
3. Anti-virus software
 Run anti-virus program
 Check for virus signature updates

READY
PRINTTO
 Check for spyware updates

Test Your Firmware


Firmware- is a combination of hardware and software integrated on a chip.

To test the firmware


Check for the correct configuration can accomplish this by configuring the BIOS
in the computer

Error Beep codes

When a PC is first switched on or reset it performs a special diagnostic test called a


POST (Power-On Self Test), to check all components in the PC, the POST program
sends out a signal to each device initializing each device's built-in self test procedure.

The POST test is a two stage process:

1. First, it will check all the basic components including among other things the system
clock, the processor, RAM, the keyboard controller and the Video

2. After the video has been tested the BIOS will then indicate any errors encountered by
displaying either a numeric code or a text message on the screen.

When a device fails the first part of the POST, the BIOS will send a series of beeps
from the PC's speaker (internal) to inform the PC user that there is a problem these
beeps are coded allowing the user to diagnose the troublesome component. When the
POST has been completed successfully, the PC will make a short beep to let the user
know everything is as it should be.

31
Three (3) major brands of BIOS chip
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS

Each type of BIOS chip has it own error


code

READY
PRINTTO

Phoenix BIOS ERROR BEEP


CODES

Phoenix BIOS beep codes are a


series of beeps separated by a
pause, for example: beep ---
beep beep --- beep --- beep
beep would be 1-2-1-2

Self-Check1.5-1

32
I. Identify what computer error is illustrated on the following situations.

__________1. The LED indicator of your monitor is in steady orange color.


_________ 2. When you open your PC, nothing shows up in your monitor and
the LED indicator of your monitor is flashing in yellow color.
__________3. When you open your PC it will show the processor brand and/or
the motherboard brand but doesn't continue. Usually this error
will result to system restart over and over again.
__________4.This also happens even if you try disconnecting your computer
set from the internet. This is what we called aftershock virus
which will continue to run even if internet is disconnected.
__________5. The computer opens up then boots but when the operating

READY
PRINTTO
system loads it doesn't continue and it will take a lifetime if you're going to
wait for it to load.
__________6. This happens even if you try installing the hardware. When you
restart your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of files
in Command prompt style.
__________8. Upon loading he operating system, you will hear a loading sound
and then the sound stops, when you try running an audio file, no sound
will be heard
__________9.This will happen only in standby mode, when you move your
mouse or type something, your system will automatically restart
and the worst part is it will delete a file at random.
__________10. Just like the mouse problem, when you open a program that
will take the whole screen like for example a game and/or a program
applications, when you close it, it will cause your system to restart.
Test II. List down 5 common computer problems and their solutions
Common Computer Problems Solutions
1..
2..
3..
4..
5..

Post-Test

33
1. What does BIOS stand for?

a. BASIC INPUT OUTPUT SYSTEM


b. BASIC INDUCT ONLINE SYSTEM
c. BASIC INDUSTRY ONLINE STANDARDS
d. BASIC INSULATOR OPEN SOURCE

2. CPU is the _____________ of the computer.

a. mother

READY
PRINTTO
b. system
c. brain
d. process

3. What cable is used to connect PC to switch hub and router?

a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable

4. Is the hardware in a computing device where the operating system (OS),


application programs and data in current use are kept so they can be quickly
reached by the device's processor.

a. RAM
b. Operating system
c. CPU
d. HDD

5. What RAM stands for?

a. Random Access Memory


b. Random Autonomous Memory
c. Read Action Memory
d. Rare Ally Memory

6. Identify the malwares.


a. trojan
b. virus

34
c. spyware
d. all of the choices

7. An example of super computer is :


a. MP3 players
b. Desktop
c. Cell phones
d. Mainframe computers

8. ROM is
a. random access memory - temporary
b. random access memory - permanent

READY
PRINTTO
c. read only memory - temporary
d. read only memory – permanent

9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard

10. USB stands for


a. Universal Serial Bus
b. University Serial Bus
c. Universal Serial Body
d. Universal Series Bus

11. What is this?


a. Mouse
b. Speakers
c. Keyboard
d. Monitor

12. What is this?


a. CPU
b. Modem
c. Internet
d. Cable
13. What is this?
a. Malware
b. Software
c. Hardware
d. People

14. OS stands for


a. Onsite Software

35
b. Operating System
c. Only Read Software
d. On-demand System

15. What is this?


a. CPU
b. Processor
c. System Unit
d, PC

Generalization
READY
PRINTTO
This module gave you the opportunity to develop your knowledge, hone your
skills, behavior and motivations required in Installing and Configuring Computer
Systems that is in line with the industry standards.
You learned to Assemble computer hardware, Prepare installer, Install operating
system and drivers for peripherals/devices, install application software and conduct
testing and documentation.
This will prepare you to move on to the next lessons to improve and gain
important knowledge and skills in Setting up Computer Networks.

36
Glossary of Terms

Soldering - is a term that describes the process of joining two pieces of metal using a
filler metal.

READY
PRINTTO
Memory - Memory is a temporary storage area that holds data and instructions for an
electronic device to function.
Motherboard -A motherboard is a printed circuit board containing the components of an
electronic device.
Processor -This is the hardware within a computer that executes programs.
Microprocessor-A microprocessor is a central processing unit, or CPU, contained on a
single integrated circuit.
Power Supply -The power supply converts main AC current to low-voltage regulated
DC current used to power an electronic device.
Expansion Card -An expansion card is a circuit board that can be added to the
motherboard to give extra memory for processing data.
RAM-Random Access Memory, or RAM, is the term given to computer data storage
used to store frequently accessed data to increase the speed of the system.

Firmware-Firmware is permanent software programmed into a read-only memory that


controls, monitors, and manipulates the data stored in an electronic device.
Peripherals- are devices used to input or output data to and from the user and an
electronic device. The most widely used peripheral devices include mice, keyboards,
monitors, and printers.
I/O stands for input/output. This term refers to the communication between an
electronic device and a person, the internet, or another information processing system.
VGA-Video Graphics Array, or VGA, is the connector typically used to plug a peripheral,
most likely a monitor, to an electronic device.
HDMI-High-Definition Multimedia Interface, or HDMI, is used to transmit data
between components, typically an electronic device and monitor or television.

38
PS/2 -PS/2 is a six-pin mini-DIN connector used to connect some PC compatible
computers with keyboards and mice.
USB-USB stands for Universal Serial Bus. It is used to connect a computer to devices
and peripherals.
Serial Ports-A serial port is a communication interface that transfers one bit of data in
or out to modems, terminals, and peripherals.
Parallel Ports- A parallel port is a communication interface that transfers several bits of
data simultaneously to peripherals.
Disk Cleanups -Disk cleanups are designed to free up disk space on a computer’s hard

READY
PRINTTO
drive.
Antivirus Software -Antivirus software detects and destroys computer viruses. A
computer virus is code that is capable of copying itself to corrupt a system or destroy
data.
Antimalware-Antimalware is software that protects a computer from infections that are
aimed at stealing data from the user or computer.

39
Author

Alexis V. Larosa
Teacher II
Alubijid National Comprehensive High School-Senior High School
Division of Misamis Oriental

READY
PRINTTO
Bachelor of Science in Computer Engineering
Master’s in Management in Engineering Management
Doctor of Philosophy in Educational Supervision & Admin

National TVET Trainer Certificate (NTTC) -VGD NC III


National TVET Trainer Certificate (NTTC)-CSS NC II
Trainers Methodology I
Visual Graphic Design NC III
Computer System Servicing NC II

40
Key Answers

PRE-TEST/ POST TEST

READY
PRINTTO
SELF-CHECK 1.1-1

SELF-CHECK 1.1-2

41
SELF CHECK NO. 1.1-3

READY
PRINTTO
SELF-SCHECK 1.1-5

Self-Check 1.1-6

42
READY
Self-Check 1.2-1

PRINTTO
Self-Check1.5-1

References

1. http://www.workcover.nsw.gov.au/OHS/default.htm
2. www.cengageasia.com

43
3. www.wikipedia.com
4. commons.wikimedia.org

Video clips
http://PCitYourself.com
https://www.youtube.com/watch?v=6ZGhDPfSXXA
https://www.youtube.com/watch?v=TyvNWL4QaQw

5S –
http://www.kaizenworld.com/_Media/5s-explanation_med_hr.jpeg
http://www.canstockphoto.com/images-photos/

READY
PRINTTO
http://www.netanimations.net/computers.htm

3R –
http://www.ecocentric.co.in/site/wp-content/uploads/2013/07/reduce-reuse-recycle.jpg
http://www.neptunoeng.com/images/3r.png
http://ogs.ny.gov/Global/Images/BU/BA/RPM/Rx3.gif11/2/15
http://www.mymcpl.org/_uploaded_resources/go_green_0.jpg

Effects of contaminants -
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
https://upload.wikimedia.org/wikipedia/commons/2/2c/PCB_corrosion.jpg
http://media.salon.com/2015/01/discarded_computers_resize.jpg

44

You might also like