CSS NCII Module

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 213

TABLE OF CONTENTS

Objectives -----------------------------------------------------------------------------------------------------------------------1

Introduction to Computer Systems Servicing (CSS)

Pre-Test -------------------------------------------------------------------------------------------------------------------------3
UNIT I - Exploring the Electronics Industry ----------------------------------------------------------------------------4
LESSON 1: CSS in the Electronics Industry ----------------------------------------------------------------------------4
LESSON 2: OHS Policies and Procedures -------------------------------------------------------------------------------7
LESSON 3: Applying Quality Standards ----------------------------------------------------------------------------------
UNIT TEST I --------------------------------------------------------------------------------------------------------------------

UNIT II - Understanding Basic Computer Concepts -------------------------------------------------------------------


LESSON 1: Understanding the Computer --------------------------------------------------------------------------------
LESSON 2: Basic Hardware Components of Computer Systems ----------------------------------------------------
LESSON 3: Hand Tools and Equipment ----------------------------------------------------------------------------------
UNIT TEST II -------------------------------------------------------------------------------------------------------------------

Installing and Configuring Computer Systems

Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT III - Performing Computer Hardware Services ------------------------------------------------------------------
LESSON 1: Disassembling a Computer -----------------------------------------------------------------------------------
LESSON 2: Assembling a Computer ---------------------------------------------------------------------------------------
LESSON 3: Installing I/O Devices ------------------------------------------------------------------------------------------
UNIT TEST III ------------------------------------------------------------------------------------------------------------------

UNIT IV - Performing Computer Software Services -------------------------------------------------------------------


LESSON 1: Configuring the BIOS ------------------------------------------------------------------------------------------
LESSON 2: Installing Operating Systems ---------------------------------------------------------------------------------
LESSON 3: Installing Device Drivers --------------------------------------------------------------------------------------
LESSON 4: Installing Software
----------------------------------------------------------------------------------------------
LESSON 5: Conducting Tests
------------------------------------------------------------------------------------------------
UNIT TEST IV ------------------------------------------------------------------------------------------------------------------

Setting Up Computer Networks

Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT V - Setting Network Configuration ---------------------------------------------------------------------------------
LESSON 1: Understanding Network Devices ----------------------------------------------------------------------------
LESSON 2: Creating Network Cables -------------------------------------------------------------------------------------
LESSON 3: Configuring the Network --------------------------------------------------------------------------------------
UNIT TEST V -------------------------------------------------------------------------------------------------------------------

UNIT VI - Setting Router and Wireless Configuration -----------------------------------------------------------------


LESSON 1: Configuring the Wireless Network --------------------------------------------------------------------------
LESSON 2: Securing the Network ------------------------------------------------------------------------------------------
LESSON 3: Inspect and Test Networks ------------------------------------------------------------------------------------
UNIT TEST VI ------------------------------------------------------------------------------------------------------------------

Setting Up Computer Servers

Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT VII - Set-up User Access ----------------------------------------------------------------------------------------------
LESSON 1: Understanding the "Server" and "Client" ----------------------------------------------------------------
LESSON 2: Creating User Folder -------------------------------------------------------------------------------------------
LESSON 3: Configure User Access -----------------------------------------------------------------------------------------
UNITN TEST VII
---------------------------------------------------------------------------------------------------------------

i
UNIT VIII - Configure Network Services ---------------------------------------------------------------------------------
LESSON 1: Checking Normal Functions ----------------------------------------------------------------------------------
LESSON 2: Installing Modules and Add-ons -----------------------------------------------------------------------------
LESSON 3: Performing Network Service ---------------------------------------------------------------------------------
UNIT TEST VIII
----------------------------------------------------------------------------------------------------------------

Maintaining Computer Systems and Networks

Pre-Test ---------------------------------------------------------------------------------------------------------------------------
UNIT IX - Planning and Preparing to Maintain Computer Systems and Networks -----------------------------
LESSON 1: Planning and Preparing for Maintenance -----------------------------------------------------------------
LESSON 2: Maintaining Computer Systems and Networks ----------------------------------------------------------

MODULE 5 UNIT X - Troubleshooting Computer Systems and Networks


----------------------------------------
LESSON 1: Diagnosing Faults -----------------------------------------------------------------------------------------------
LESSON 2: Correcting Defects ----------------------------------------------------------------------------------------------
LESSON 3: Inspecting and Testing Computer Systems and Networks ---------------------------------------------
UNIT TEST X -------------------------------------------------------------------------------------------------------------------
ii

OBJECTIVES

Introduction to Computer Systems Servicing (CSS)

UNIT I - Exploring the Electronics Industry


At the end of this unit, students will be able to:

 Identify the relevance of CSS in today's society


 Differentiate the possible careers after achieving the CSS Qualification
 Enumerate the different Occupational Health and Safety Procedures and Policies
 Describe the different hazards that you may encounter in the industry
 Enumerate the different forms in assessing the quality of materials

UNIT II - Understanding Basic Computer Concepts


At the end of this unit, students will be able to:

 Differentiate the different types of computers


 Enumerate the three fundamental elements of a computer
 Identify the different storage, processing, and Input/Output devices of a computer
 Describe each of the components of the system unit; and
 Differentiate the hand tools and equipment used in computer servicing

Installing and Configuring Computer Systems

UNIT III - Performing Computer Hardware Services


At the end of this unit, students will be able to:
 Disassemble a computer system;
 Document specifications and information on hardware;
 Assemble a computer system; and
 Install Input/Output devices

UNIT IV - Performing Computer Software Services


At the end of this unit, students will be able to:
 Create portable boot devices
 Customize installers
 Install operating systems;
 Install application software; and
 Conduct testing and documentation.

Setting Up Computer Networks

UNIT V - Setting Network Configuration


At the end of this unit, students will be able to:
 Install network cables; and
 Set network configuration

UNIT VI - Setting Router and Wireless Configuration


At the end of this unit, students will be able to:
 Set router/Wi-Fi/wireless access point/repeater configuration;
 Describe basic network security components; and
 Inspect and test the configured computer networks.
1
Setting Up Computer Servers

UNIT VII - Set-up User Access


At the end of this unit, students will be able to:
 Create a user folder
 Configure user access; and
 Perform security check on network access.

UNIT VIII - Configure Network Services


At the end of this unit, students will be able to:
 Check the normal functions of server
 Install and update required modules and add-ons based on NOS installation procedures
 Configure network services based on user/system requirements
 Check operation of network services based on user/system requirements
 Respond to unplanned events or conditions.

Maintaining Computer Systems and Networks

UNIT IX - Planning and Preparing to Maintain Computer Systems and Networks


At the end of this unit, students will be able to:
 Plan and prepare for maintenance computer systems and networks
 Maintain computer systems and networks

UNIT X - Troubleshooting Computer Systems and Networks


At the end of this unit, you should be able to
 Diagnose faults
 Correct defects
 Inspect computer systems and networks
2

d. Power Supply*
Pre-Test 6. This is a kind of port that is used in
modern monitors and home theaters. It
1. This is a tool used in locking Rj45 into also transmits digital audio and video.
UTP Cables
a. Firewire
a. LAN Tester b. HDMI*
b. Precision Tools c. VGA
c. Crimping Tools* d. S/PDIF
d. Desoldering Tool
7. The following are FACTS about the
2. When working with electronic equipment, Central Processing Unit (CPU) EXCEPT
it is important to make sure that there is FOR:
no static electricity to avoid damage of
computer parts that is why it is important a. It is the brain of the computer. It
to use these tools: interprets and carries out the basic
instructions to operate a computer.
a. Compressed Air b. It is also called the processor.
b. Crimping Tool c. A fan and a heat sink is usually
c. Antistatic Mat and Wrist Wrap* installed to regulate its
d. LAN Tester temperature.
d. Intel is the only brand of CPU
3. The computer, since it was made in the available in the market.*
19th century, have been developed and
improved through the years. The 8. There are various types of computers
following are the computers made during depending on its purpose. The following
those years EXCEPT FOR: are types of computers EXCEPT FOR:
a. MS-Dos a. Supercomputer
b. Value Machine* b. Mainframe Computer
c. Atanasoff-Berry Computer c. Market Computer*
d. Analytical Engine d. Microcomputer
4. The computer is a device that accepts 9. How much GB of RAM (at least) should
information in the form of the following require?
___________________, and manipulates it
for some result based on a program or Basic application software such as Office
sequence of instructions on how the data Suite at least ___ GB. Programs and
is to be processed. multimedia at least ___ GB.
Modern games and editing software at
a. Analog Frequencies least ___ GB.
b. Digitalized Data*
c. Electric Blasts a. 1, 2, 4
d. Controlled Currents b. 2, 6, 8
c. 1, 4, 8*
5. This serves as the source for electricity to d. 4, 8, 16
the computer. Attached are vital
hardware cables and buses for 10. The following are storage devices
transferring power to various components EXCEPT FOR:
in the computer.
a. Random Access Memory*
a. Battery b. Flash Drive
b. System Unit c. Solid State Drive
c. Central Processing Unit d. Hard Disk Drive
3
UNIT I - Exploring the Electronics Industry
LESSON 1: CSS in the Electronics Industry
Introduction

As many of today's basic functions are being simplified by technology, computers have been on the forefront in
developing innovations through its many functions. Many of the things that we thought were impossible before
are now being achieved by computers nowadays. In this digital economy, having the knowledge and skills in
computer servicing is the start and most fundamental of all.

TOPIC 1: Why is CSS relevant?

In today’s industry, almost every establishment needs the assistance of technology. Even establishments and
businesses are now gearing towards the use of information technology to promote their services.  The demand
for people who offer computer servicing and repair continues to increase as society rapidly changes.

For example:

Computer hardware needs maintenance services in order to repair normal wear and tear. Network
infrastructures used by organizations will need maintenance and monitoring. Computer equipment would need
occasional repair and maintenance; thus, requiring the assistance of computer systems service providers.
Commonly, the industry’s main line of business is on selling computer hardware systems and components, as
well as providing repair and installation services.  Thus, if you were to venture in this industry, you must be
well informed on basic concepts related to computer systems servicing.

TOPIC 2: What jobs can I land on?

Since society is now becoming more technology-driven and technology-dependent, it is no wonder that more
and more establishments are in need of the expertise of computer service providers. The Computer Systems
Servicing National Certificate (NC II) Qualification trains its learners with competencies that will allow them to
diagnose and troubleshoot PC systems and software issues, as well as restoring its parts to return the device to
its normal function.
4
A person who has achieved the Computer Systems Servicing NC II Qualification is competent to be a:

TOPIC 3: What are my job functions in the future?


Job Opportunities with Function
5
TOPIC 4: What does the Qualification require?
Because technology also changes rapidly, computer technicians must be updated with the current trends,
technology, and developments related to the computer industry. In addition to that, computer staff may need to
work with various people that will require their expertise. Thus, the ability to work in groups and the ability to
translate technical information to non-technical users may be required when working in this field.

Having a CSS NC II qualification is an entry point for a career in the computer field. 
Being a computer technician may require you to travel to see clients or be at an office and workplaces as a
member of the IT support team. As a technician, you must possess the interests and skills that the job demands. 

TOPIC 5: What knowledge and skills do I need?

As much as possible, you will need some prior knowledge and skills so that you will be able to perform
computer servicing easily.
6
LESSON 2: OHS Policies and Procedures
Introduction

Occupational Health and Safety or OHS is concerned with health, safety, and welfare issues in the workplace.
Policies and procedures are important in discussing OHS because it aims to make the workplace safer and
better for workers and stakeholders.  It is concerned with many factors such as removal of hazards and reducing
accidents in the workplace. As a future computer technician, it is your responsibility to know these standard
protocols especially since you will be assembling and repairing expensive and sensitive equipment that need
care and proper handling.

TOPIC 1: Occupational Health and Safety


Occupational Health and Safety (OHS) is a set of policies and procedures that is followed in a workplace in
order to prevent accidents, illnesses, and injuries.  It involves knowing the risks that can be encountered in a
workplace and figuring out how it can be prevented. Following OHS policies and procedures is important when
dealing with electronics since it would protect not only the personnel dealing with the components, but also the
unit itself. 

Three steps may be done to facilitate OHS procedures in a CSS work space:
 Hazard identification
 Risk assessment
 Risk control

In addition to that, here are some additional OHS Procedures that must be observed in computer
servicing:

7
TOPIC 2: Hazard Identification
Hazards are anything that can hurt a person. Example of hazards that can be encountered when conducting
computer systems servicing are:

 Tangled electrical cords


 Unsecured or unevenly stacked boxes
 Noise

Hazard identification involves observing the workplace’s surroundings to recognize potential risks.

What are common hazards that can be encountered in the electronic industry?

8
9
TOPIC 3: Risk Assessment
10
TOPIC 4: Risk Control
Once the hazard has been identified and its risks have been evaluated, it is time to address these issues:
 Ask your supervisor for instruction and training before using or repairing an equipment.
 Do not carry or move heavy objects by yourself.
11
12
LESSON 3: Applying Quality Standards
Introduction

Standards are sets of rules that outline specification of dimensions, design of operation, materials, and
performance. Standards provide basis for good quality and protocol. When it comes to computer systems
servicing, standards are important as it serves as comparison for computer performance. Maintaining quality is
important to manage customer satisfaction where the revenue and profits will depend upon.

TOPIC 1: Assessing Quality


In computer systems servicing, you will be handling a lot of equipment. You will be purchasing them,
assembling and disassembling, repairing, or even maintaining them! That is why it is important to assess the
quality of the materials you will be receiving especially when you are purchasing from a supplier.

Here are some standard protocols in checking the materials and goods you will be receiving in work.
13
TOPIC 2: Documentation
Here are some samples of log reports and documentation assessed by a quality checker. Take note however, that
not all organizations will make use of the same form.
TOPIC 3: Inventory Form
Here is an example of an inventory form. You will be encountering this after disassembling computers. You
will be listing down the PC specifications in this form. You can write the general description of what the item is
under while you can write the specifications or necessary description below, Description/Specification.
Anything else that you think are important notes should be written on the Remarks column.

14
1. Having a Computer Systems Servicing
UNIT TEST I NC II qualification is an entry point for a
career in the computer field.
 True*
 False a. Electric Shock Hazards
b. Thermal Hazards*
2. _____________________ is the possibility c. Physical Hazards
of the hazard harming someone. d. Chemical Hazards

a. Material 9. Occupational Health and Safety is


b. Assessment concerned with health, safety, and welfare
c. Risk* issues in the workplace. Although policies
d. Danger and procedures are not important in
discussing OHS, it is important to
3. As a computer technician, the ability to remember what the supervisor tells you
work in groups and the ability to when you are in the workplace for it to be
translate technical information to non- safer and better.
technical users are not required when
working in this field.  True
 False*
 True
 False* 10. The following are standard protocols in
checking the materials and goods you will
4. Hazard ____________ involves observing be receiving in work EXCEPT FOR
the workplace’s surroundings to
recognize potential risks. a. The device looks like it is working*
b. There is documentation
a. Identification* c. The packing slip is received
b. Control d. The purchase order matches the specific
c. Recycling device and quantity
d. Observation

5. __________ are sets of rules that outline


specification of dimensions, design of
operation, materials, and performance.
They provide basis for good quality and
protocol.

a. Standards*
b. Assessments
c. Quality
d. Guidelines

6. Computer equipment would need


occasional repair and maintenance; thus,
requiring the assistance of computer
systems service providers.

 True*
 False

7. Hazards are anything that can hurt a


person.

 True*
 False

8. The following are types of hazards


EXCEPT FOR:
15
UNIT II - Understanding Basic Computer Concepts
LESSON 1: Understanding the Computer
Introduction
We all know that computers are essential pieces of technology that we use to make life easier and perform
jobs faster. A computer increases our productivity, connects us to the internet, lets us talk with people across
the world, helps us store a lot of information, and even make money!
In this lesson, we will start with the basics. We want to understand how the computer works, how many types
of computers are there, what are the functions of the computer, and more!

TOPIC 1: The Computer


In technical terms, the computer is a device that accepts information in the form of digitalized data, and
manipulates it for some result based on a program or sequence of instructions on how the data is to be
processed.

16
TOPIC 2: Types of Computers
1. Supercomputer

Most powerful and most advance in terms of performance and data processing. These computers are commonly
used by large organizations to conduct specific tasks such as weather forecasting, research, and exploration.

 Ex. IBM’s Mira in United States. IBM’s Sequoia in United States

2. Mainframe Computer
Large and expensive computer capable of handling thousands of users and programs simultaneously.
Mainframe computers can handle, process, and store large amount of data. These are commonly stored in large
air-conditioned rooms because of its big size.

Ex. Fujitsu’s ICL VME, Hitachi’s Z800

3. Minicomputer

Also known as midrange computers. It features all the functions of a large size computer, but has a smaller size.
Minicomputers can support many users because of its multi-processing system. 

Ex. K-202, IBM Midrange computers, SDS-92


4. Microcomputer

Most widely used and fastest growing type of computer. Desktop computers, laptops, tablets, and smart phones
are types of microcomputers.

17
TOPIC 3: Fundamental Elements of a Computer

LESSON 2: Basic Hardware Components of Computer


Systems
Introduction
A computer system consists of hardware and software components. As important as the software which are
the programs that run the computer, the hardware is the physical equipment such as the case, storage drives,
keyboards, monitors, cables, speakers, and printers that builds up and let the software run.  It is important to
learn about these components as these will be the basis before you handle equipment especially in
disassembling and assembling a computer system.

TOPIC 1: Computer Systems


The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral
devices connected to it and its operating system.

 Computer systems fall into two broad divisions: clients and servers. 


 Client machines fall into three categories from low to high end: laptop, desktop and workstation. 
 Servers range from small to large: low-end servers, midrange servers and mainframes.

Processing Devices
Processing devices are the computer’s circuitry in the system unit.

Motherboard – the circuit board housing the memory and the central processing unit (CPU)

18
Central Processing Unit (CPU) – manipulates input data into the information needed by the users.

Memory – also known as Random Access Memory or RAM. It is a series of electronic elements that act as
temporary storage of data and program instructions while the instructions are being processed by the CPU.
Chips – these make up the CPU and the memory; these are electronic devices that contain many microscopic
pathways designed to carry electrical currents.(picture 6.3)

Storage Devices
Storage devices store data and programs. These hold data, information, and programs permanently.

 Solid State Drive (SSD) – mass storage device that stores data in a permanent state even
without power. Similar to an HDD’s function, only the internal components are different. SSDs do not
have moving parts but store data on magnetic platters making use of flash memory.

19
 Hard Disk Drive (HHD) – often called hard drive or hard disk. This is the most common
storage device that does not need power to maintain data; these store data through spinning platters or
magnetic disks, recording individual bits written into the disk.
 Flash Drive – highly portable small data storage devices making use of flash memory and a

Universal Serial Bus (USB) port connectio


 CD – “compact disc”, this storage device can hold up to 700 MB; it is read by an optical drive through
a laser.

Input Devices
Input devices allow the user to communicate with the computer by entering data or commands.

 Keyboard – primary input device used to input alphanumeric data and commands to the computer.

20
 Mouse – primary input device used to navigate and interact with the monitor output.

 Scanner – scans documents and converts them digitally, which can be edited on a computer.
 Webcam – small cameras attached to a monitor or desk that record or broadcast video.

 Joystick – device used to control video games, aside from the keyboard.

Output Devices
Output devices enable the computer to show the processed data and information understandably to the user.

 Printer – prints paper documents, photographs, and other outputs called hard copies which are
physical versions of the documents.

21
 Monitor – acts as the primary display of the unit where the user interface and programs are reflected.
 Speakers – sound system device that produce audio output from the computer.
TOPIC 2: The System Unit
The System Unit is the overall structure that houses the processor, memory, and electronic components of the
computer that are used to process data. All input and output devices are connected into the system unit. The
system unit is housed by what is known as system case or computer case. It holds and protects most
components of a computer.

The Computer Case contains the framework to support and enclose internal components of the computer.  It
helps to prevent damage from static electricity. It typically made up of plastic, steel, and aluminum which are
available in a variety of styles.  The size and layout of a case is called a form factor.  It is also designed to keep
internal components cool by using airflow vents and cooling fans.  

Computer cases are referred to in a number of ways: 

 Computer chassis
 Cabinet
 Tower
 Box
 Housing

Types:

Tower (Full, Mid, Mini)


Desktop (Standard, Slim line)

22
TOPIC 2: The System Unit

Power Supply
Power supplies serve as the source for electricity to the computer. Attached are vital hardware
cables and buses for transferring power to various components in the computer.
The
following are the basic connector you can see in a power supply:
ATX 24 pin main power connector is the standard motherboard power connector used in nearly every
computer.

SATA 15 pin power supply connector is one of several standard peripheral power connectors. SATA power
connectors only connect to SATA drives like hard drives and optical drives. SATA power connectors do not
work with older PATA devices.

Molex 4 pin power supply connector is a standard peripheral power connector. Molex power connectors
connect to many different kinds of internal peripherals including PATA hard drives and optical drives, some
video cards, and even some other devices.

23
Floppy drive 4 pin power supply connector is the standard floppy drive power connector. The floppy power
connector, also called a Berg connector or Mini-Molex connector, is included in even the newest power supplies
even though floppy drives are becoming obsolete.

ATX 4 pin power supply connector is a standard motherboard power connector used to provide +12 VDC to
the processor voltage regulator. This small connector usually attaches to the motherboard near the CPU.

ATX 6 pin power supply connector is a motherboard power connector used to provide +12 VDC to the
processor voltage regulator but the 4-pin variety is the more commonly used connector. This small connector
usually attaches to the motherboard near the CPU.

Motherboard
The motherboard is also known as mainboard, system board, logic board, or MOBO. It holds and allows
communication between the crucial components of the computer such as the CPU and memory. It also provides
connection for other peripherals. This provides the path which the processor (CPU) communicates with all the
components of the computer.

There are several components that are attached to the motherboard. These include:

1.     Chip – small piece of semiconducting material, where more integrated circuits are embedded. They have
standard-sized pin connectors that allow them to be attached to the motherboard.

2.     Bus - an electrical path that enables data flow between various system components.

3.     Integrated Circuit (IC) – contains microscopic pathways that carry electric current. The IC
contains millions of elements such as resistors, capacitators, and transistors. Many different kinds of chips are
located in the motherboard

4.     Microprocessor – this is the central processing unit on a chip.

24
Different variety of chip packages:

1.     Dual Inline Package (DIP) – this has two parallel rows of pints that attach the chip package to
the circuit board

2.     Pin Grid Array (PGA) – holds a larger number of pins because the pins are mounted on the
surface of the package.

3.     Flip Chip-PGA (CF-PGA) Package – higher performance PGA packaging that places the
chip on the opposite sides of the pins.

4.     Single Edge Contact (SEC) Cartridge – does not use pins but connects to one of the edges
in the motherboard.

The form factor of motherboards pertains to the size and shape of the board.  It also describes the physical
layout of the different components and devices on the motherboard.  Various form factors exist for
motherboards:

 AT – Advanced Technology


 ATX – Advanced Technology Extended
 Mini-ATX – Smaller footprint of ATX
 Micro-ATX – Smaller footprint of ATX
 LPX – Low-profile Extended
 NLX – New Low-profile Extended
 BTX – Balanced Technology Extended

The function of the Northbridge is primarily a fast path between the CPU and the video bus and system RAM.
While the Southbridge connects with the slow hardware/components of the system.
25
See the photo below (courtesy of Quora) to understand the function of these bridges:

Central Processing Unit (CPU)


Commonly known as the CPU or processor, this is the brain of the computer. It interprets and carries out the
basic instructions to operate a computer. It impacts overall computing power and manages most of the computer
operations. The motherboard contains a socket to hold the processor or CPU. The central processing unit
(CPU), also called the processor or microprocessor, does most of the processing of data and instructions for the
entire system. Because the CPU generates heat, a fan and heat sink might be installed on top to keep it cool.
Nowadays, processors have multiple cores called multi-core processors. This means that the processor is a
single chips that has two or more separate processors. In multi-core processors, each of the processors run at a
slower clock speed as compared to a single-core processor, but this efficient process typically increases
performance.

There are two kinds of common multi-core processors today:

1.     Dual Core Processor – chip that contains two separate processors

2.     Quad Core Processor – chip with four separate processors

AMD and Intel are the two most popular brands of processors in the market nowadays. Bundled with the
processors are the heat sinks.  A heat sink consists of metal fins that draw heat away from a component. The
fan and heat sink together are called the processor cooler. The photo below shows CPU with a heat sink
mounted on the motherboard.
26

Random Access Memory (RAM)


The Random Access Memory or RAM acts as temporary storage as long as the computer is running. The
contents of the RAM change as programs are executed. These are chips that are placed directly on the
motherboard. These RAM consists of switches which are triggered by changes in electric current. 

Three basic types of RAM:

1.     Dynamic RAM (DRAM) – This kind of RAM needs to be recharged by the CPU. If not, it loses
its contents. There are many variations of DRAM such as:

 Synchronous DRAM (SDRAM) – faster than DRAM because it is synchronized to the system clock
 Double Data Rate (DDR) SDRAM – faster than SDRAM because they transfer data twice for each
clock cycle
 DDR2 and DDR3 SDRAM – faster than DDR SDRAM
 Ambus DRAM (RDRAM) – type of DRAM faster than SDRAM that uses pipelining techniques

2.     Static RAM (SRAM) – This kind is faster and more reliable than any form of DRAM. Unlike the
DRAM, this does not need to be re-energized. However, it is much more expensive and it used for special
purposes.
3.     Magnetoresistive RAM (MRAM) – This kind stores data using magnetic charges instead of
electrical charges. It has greater storage capacity, consume less power, and faster access times.

27

The RAM chips are housed in a small circuit board called the memory module, which is inserted into the
motherboard.

Three types of memory modules:

1.     Single Inline Memory Module (SIMM) – this has pins on opposite sides of the circuit
board which connect together to form a single set of contacts. This houses SDRAM chips along with DIMMs.

2.     Dual Inline Memory Module (DIMM) – the pins on the opposite sides of the circuit board
do not connect and form two sets of contacts. This houses SDRAM chips along with SIMMs.

3.     Rambus Inline Memory Module (RIMM) – this houses RDRAM chips

The computer will need a certain amount of memory to be able to handle programs, data, and information,
depending on the types of applications used. The more RAM a computer has, the faster the computer will be. 

 To be able to use basic application software such as Office Suite, one needs at least 1GB of RAM. 
 Using programs and multimedia should have at least 4GB. 
 Playing modern games or using editing software will require at least 8GB. 

Today the RAM ranges up to 64GB depending on the programs that will be used for the computer.

Cooling Technology
Cooling technologies are essential in avoiding the computer from overheating and maintaining a good, well-
ventilated system.
28
Several cooling technologies are present throughout the system unit:
 Fans are also present in several components such as the power supply, ports, processor, hard disk etc.
 Heat sink, on another hand, is a small metal or ceramic component with fins on the surface which
absorbs and distributes heat produced by electrical components.
 Heat pipe is used on smaller devices like notebook computers since this is smaller in size.

Expansion Cards
A motherboard has expansion slots to be used by expansion cards. An expansion card, also called an adapter
card, is a circuit board that provides more ports than those provided by the motherboard. 

The photo below shows a Video Card where it provides three video ports. Notice the cooling fan and heat sink
on the card, which help to keep the card from overheating. The trend today is for most ports in a system to be
provided by the motherboard (called onboard ports) and less use of expansion cards.

There are also other variants of expansion cards such as network cards, sound cards, video capture cards,
interface cards, and other expansion cards that cater to whatever the computer user for his/her needs and
improvements for the system.

Storage
A system might have one or more hard drives, an optical drive, a tape drive, or, for really old systems, a floppy
drive. 

A hard drive, also called a hard disk drive (HDD), is permanent storage used to hold data and programs.
For example, the Windows operating system and applications are installed on the hard drive. All drives in a
system are installed in a stack of drive bays at either the front or on the lower portion of the case.  Nowadays,
users use Solid State Drive or SSDs because of its use of flash memory, which does not use physical disks to
write memory/data.

29

Each drive has two connections for cables: the power cable connects to the power supply and another cable,
used for data and instructions, connects to the motherboard.

TOPIC 3: Ports, Sockets, Slots, & Connectors


The motherboard has several ports, sockets, slots, and connectors that link the computers' components, input,
and output devices among each other. First we'll look at the port which are usually found at the side of the
motherboard or the back of the system case.

The port basically serves as an interface between the computer and other computers or peripheral devices.

A port generally refers to the female part of connection. Computer ports have many uses, to connect a monitor,
webcam, speakers, or other peripheral devices. 

On the physical layer, a computer port is a specialized outlet on a piece of equipment to which a plug or cable
connects. Electronically, the several conductors where the port and cable contacts connect, provide a method to
transfer signals between devices.

Familiarize yourself with the following ports usually found with computer systems below:
30
31
TOPIC 3: Ports, Sockets, Slots, & Connectors Ports

Slots
Sockets
The following are the most common sockets found in the motherboard. The CPU socket where the CPU itself is
inserted and the CMOS slot where the CMOS battery (which lets the motherboard remember the date and time
of the computer) that is replaced after it has worn out.

32
Connectors & Ports
LESSON 3: Hand Tools and Equipment
Introduction

Most tools used in computer system servicing are hand tools. These can be part of a computer repair toolkit as
well. In this lesson, you will learn about the common hand tools and equipment that you will be using especially
in handling computer equipment such as disassembly/assembly of a computer, as well as repair and
maintenance.

TOPIC 1: Electrostatic Discharge Tools


When working with electronic equipment, it is important to make sure that there is no static electricity to
avoid damage of computer parts.

Static electricity can be easily generated by friction on carpets, clothing, hair, fabric, flooring, etc. 

33
Thus, these tools should be utilized:

 Anti-static wrist wrap - Worn to prevent ESD damage to computer hardware

 Anti-static mat - Used to stand on or place tools to prevent buildup of static electricity.

TOPIC 2: Hand Tools

Pliers – for firmly holding small parts

Torx Screwdriver – for loosening or tightening screws that have a star-like head

Precision Tools – for removing screws of various sizes


34
LAN Tester – for testing connectivity of LAN cables

Crimping Tool – for locking RJ45 into UTP cables

Flat Head Screwdriver – for loosening or tightening slotted screws

Philips Screwdriver – for loosening or tightening Philip-head screws

Desoldering Tool – for removing solder from a circuit board


35
Wire Stripper –for stripping or cutting wires

Brush – for removing dust from the components

Magnifying Glass – aids visually when looking at small screws/components

TOPIC 3: Cleaning Tools

Lint-free cloth - For cleaning computer parts without leaving marks or scratches.
Cable Ties - Used to organize and bundle cable together.

36
Parts organizer - For holding and organizing screws and other small computer parts.

TOPIC 4: Diagnostic Tools

Digital Multimeter - A tool that can be used to measure amps, volts, and ohms. It can test the integrity
of circuits and the quality of electricity in computer components. Information is flashed on the screen.

Loopback Adapter - Also called as loopback plug. This tool tests the basic functionality of computer
ports. The adapter is specific to the port that you want to test.
Toner Probe - A two-part tool that generates a tone that travels the length of the cable. The toner part is
attached to a cable at one end using specific adapters, such as RJ-45, coaxial, or metal clips. When the probe is
near to the cable where the toner is attached, a tone can be heard from the speaker.

c. Precision Tools
d. Crimping Tools*

4. How much GB of RAM (at least) should


the following require?
• Basic application software such as Office
37 Suite at least ___ GB.
• Programs and multimedia at least ___
UNIT TEST II GB.
• Modern games and editing software at
1. This is a kind of port that is used in least ___ GB.
modern monitors and home theaters. It also
transmits digital audio and video. a. 1, 2, 4
b. 1, 4, 8*
a. VGA c. 2, 6, 8
b. HDMI* d. 4, 8, 16
c. S/PDIF
d. Firewire 5. There are various types of computers
depending on its purpose.
2. The computer, since it was made in the The following are types of computers EXCEPT
19th century, have been developed and improved FOR:
through the years.
The following are the computers made during a. Microcomputer
those years EXCEPT FOR: b. Market Computer*
c. Mainframe Computer
a. Analytical Engine d. Supercomputer
b. Atanasoff-Berry Computer
c. Value Machine* 6. The following are storage devices
d. MS-Dos EXCEPT FOR:

3. This is a tool used in locking Rj45 into a. Random Access Memory*


UTP Cables b. Hard Disk Drive
c. Solid State Drive
a. Desoldering Tool d. Flash Drive
b. LAN Tester
38
7. When working with electronic equipment,
it is important to make sure that there is no
Pre-Test
static electricity to avoid damage of computer
parts that is why it is important to use these 1. What is the best indicator that you have
tools: successfully assembled a computer?

a. Crimping Tool a. The PC is able to boot up to the BIOS.*


b. Compressed Air b. There is a beeping sound as you turn it on.
c. Antistatic Mat and Wrist Wrap* c. All wires are connected and the lights blink
d. LAN Tester when turned on.
d. You are able to close the system case cover.
8. The following are FACTS about the
Central Processing Unit (CPU) EXCEPT FOR: 2. The following are operating systems
EXCEPT FOR
a. It is also called the processor.
b. It is the brain of the computer. It interprets a. Linux
and carries out the basic instructions to operate b. MAC OS
a computer. c. Windows
c. A fan and a heat sink is usually installed to d. Reaver*
regulate its temperature.
d. Intel is the only brand of CPU available in the 3. The following are wirings from the power
market.* supply connected to the motherboard EXCEPT
FOR:
9. The computer is a device that accepts
information in the form of a. 2-pin power connector*
___________________, and manipulates it for b. SATA power connector
some result based on a program or sequence of c. 24-pin ATX power connector
instructions on how the data is to be processed.
4. Ideally, what is the LAST component that
a. Digitalized Data* you take out in the disassembly process?
b. Analog Frequencies
c. Electric Blasts a. CPU*
d. Controlled Currents b. RAM
c. Power Supply Connectors
10. This serves as the source for electricity to d. CPU Fan
the computer. Attached are vital hardware
cables and buses for transferring power to 5. These are the most necessary peripherals
various components in the computer. you should connect to your system unit to be able
to run the computer easily.
a. Power Supply*
b. Central Processing Unit a. Scanner, Mouse, Webcam
c. System Unit b. Keyboard, Mouse, Monitor*
d. Battery c. Speakers, Printer
d. Joystick, Headphones, Speakers

6. After removing the Central Processing


Unit, add thermal paste on the pins before
putting it back to the CPU socket.

True
False*

7. After disassembling a computer, what do


you usually do before re-assembling the
components again?

a. Use a well sanitized moist cloth and wipe the


components neatly
b. Put them away in a clean and secure box
c. Let them dry through the air conditioner or at
room temperature
d. Note the specifications*
8. When wearing the anti-static wrist wrap,
where should the other end (aside from the
wrist) should you clip the wrap onto?

a. Standoffs of the case


b. Any screw
c. I/O Bezel Plate
d. Unpainted part of the case*

9. It is a layer of software used to manage


computer resources. It provides the interface,
configures and manage hardware to connect
components to applications.

a. BIOS
b. Device Drivers
c. Program Applications
d. Operating System*

10. These are the most common ports used by


monitors to produce best video qualities
EXCEPT FOR

a. VGA
b. DVI
c. RPS*
d. HDMI

39
UNIT III - Performing Computer Hardware Services
LESSON 1: Disassembling a Computer
Introduction

You might be wondering why the lesson starts with disassembly and not assembly itself? Simply because we


want to learn how to disassemble so we can assemble it again from how we took out the parts.

It is because in the industry, you will be performing disassembly especially in servicing, compared to building a


new computer and repairing and maintaining the computers in the workplace. You will have to be familiar
especially first with the system unit. We want you to learn how to assemble what you've taken out
(disassembled).

It is important that you have taken and reviewed the prerequisite module (Intro to CSS) before going into this
hands-on course.

TOPIC 1: Preparing for Disassembly


Before going into the disassembly proper, you will have to prepare all the materials that you will need.
VIDEO: Disassembly Proper
Watch the demonstration video on Computer Disassembly

Performance Checklist

If you tried disassembling a computer on your own, this checklist might be able to help you if you've done the
job correctly.

40

Check the following if you've met the criteria:


CRITERIA
YES NO
Did you...?

   
1. Unplug the System Unit before proceeding to disassembling?

2. Wear anti-static wrist strap and other PPE properly?    

3. Remove the following safely and correctly?    

a.    Outer Steel/Casing?    

b.   Case Fan?    

c.    CPU Fan?    

d.   Power Supply?    

e.    Memory (RAM)?    

4. Remove the Optical Disk Drive?    

5. Remove the Hard Drive?     Activity:


Arrange
6. Remove the Motherboard?     the
following
sequence
_____Unplug the system unit

_____Wear Anti-static Wrist strap

_____Remove the power supply

_____Remove the motherboard

LESSON 2: Assembling a Computer


Introduction

Now that you've learned how to disassemble a PC, we are now going to proceed to assembling what we just
disassembled. Ideally, as seen in the last part of the disassembly video, you need to document the
specifications/status of the components before putting back the system unit together again.

A helpful tip is since you worked your way part by part in disassembly, now you are just going to retrace your
steps in assembling it.

TOPIC 1: Preparing for Assembly

Before going into the assembly proper, you will have to prepare all the materials that you will need.

41
VIDEO: Assembly Proper

Watch the demonstration video on Computer Assembly

Performance Checklist

If you tried assembling a computer on your own, this checklist might be able to help you if you've done the job
correctly.

Check the following if you've met the criteria:

CRITERIA
YES NO
Did you…?

1. Clean the equipment and parts before assembly?    

2. Wear anti-static wrist strap and other PPE?    

3. Install the following correctly and carefully:    

a.    CPU Fan?    

b.   Hard Disk Drive?    

c.    Optical Drive?    

d.   RAM (Random Access Memory)?    

e.    Power Supply?    

f.     Interface Cards/Add-on Cards/Adapters Graphics/Video Cards?    

g.    System Fan?    

4. Attach the System cover properly?    

42
Activity: True/False

It is not necessary to wear anti-static wrist wrap anymore in assembling a computer?

LESSON 3: Installing I/O Devices


Introduction

If you still do not have an installed operating system, you can simply install the keyboard and mouse first. Then,
install an operating system. After installing an operating system, install the rest of your peripherals.

These devices are important since it lets you control your computer.

It is important that you have assembled a PC by this time. If not, please finish the previous lesson first.

TOPIC 1: Installing the Keyboard

1.     Make sure to read the instruction manual of your keyboard first.


2.     Check whether the keyboard has a USB (flat, rectangular shape) or PS/2 (typically round and purple
colored) connector.

3.     Install the keyboard by connecting it to its proper port.


4.     Do not install the keyboard while the computer is powered on. Do not remove the keyboard while the
computer is running.

TOPIC 2: Installing the Mouse

43
The process to installing this device is similar to that of the keyboard. Check whether your mouse is using a
PS/2 Connector or a USB connector then connect it to its proper port.

TOPIC 3: Installing the Monitor

1. Identify the connection type that will connect the monitor to the motherboard or the graphics card.

2.     A DVI, VGA, or HDMI are common ports in the monitor and used  to produce best picture qualities.

3.     Once the display is plugged to its proper connector on the video card or the motherboard, the display is
ready. Most of the time, drivers are not required but it should be downloaded to utilize a maximum
resolution.

TOPIC 4: Installing the Speakers

1.     Determine the type of speaker and its connector.


2.     Connect the cable (usually a 3.5mm jack) to the line-out jack of the computer sound card or on the system
unit.
3.     Plug in the power cord.

44
TOPIC 5: Installing the Webcam

Common webcams can be simply plugged into the USB port and you will be prompted to install their drivers.
Some webcams would need to have its driver installed first. Make sure to read the manufacturer’s instruction
manual first.

TOPIC 6: Installing the Printer

1.     Make sure to have the printer and power cable.


2.     Connect the printer connector to the unit.
3.     Insert the ink or toner cartridge to the printer.
4.     Turn the printer on.
5.     Power the computer.
6.     Start the Printer Install Wizard.
7.     Follow the instructions to install the Printer Driver.
8.     Run a test print to check if the printer is installed correctly.

H5P: What's my cable?

CSS: What's my cable?

Drag the correct cable from the word box associated with the input/output device.

Keyboard, Mouse, Monitor, Speaker, Webcam, and Printer


45
UNIT TEST III a. Use a well sanitized moist cloth and wipes the
components neatly
1. These are the most common ports used by b. Put them away in a clean and secure box
monitors to produce best video qualities c. Let them dry through the air conditioner or at
EXCEPT FOR room temperature
d. Note the specifications*
a. DVI
b. VGA 8. When wearing the anti-static wrist wrap,
c. RPS* where should the other end (aside from the
d. HDMI wrist) should you clip the wrap onto?
2. When these are being installed in their a. Standoffs of the case
slots, you should push these down properly to b. Any screw
align it to the slots until you hear a click when c. I/O Bezel Plate
the tabs lock. d. Unpainted part of the case*
a. Power Supply Unit 9. It is a layer of software used to manage
b. CPU Fan computer resources. It provides the interface,
c. Random Access Memory* configures and manage hardware to connect
d. Central Processing Unit components to applications.
3. After disassembling a computer, what do a. BIOS
you usually do before re-assembling the b. Device Drivers
components again? c. Program Applications
d. Operating System*
a. Note the specifications*
b. Put them away in a clean and secure box 10. These are the most common ports used by
c. Use a well sanitized moist cloth and wipe the monitors to produce best video qualities
components neatly EXCEPT FOR
d. Let them dry through the air conditioner or
at room temperature a. VGA
b. DVI
4. The following are wirings from the power c. RPS*
supply connected to the motherboard EXCEPT d. HDMI
FOR:

a. SATA power connector*


b. 24-pin ATX power connector*
c. 2-pin power connector

5. Before assembling the computer


components, you should clean the components
with a brush and add an amount of thermal
paste to the heat sink and the processor.

True*
False

6. After removing the Central Processing


Unit, add thermal paste on the pins before
putting it back to the CPU socket.

True
False*

7. After disassembling a computer, what do


you usually do before re-assembling the
components again?
46

UNIT IV - Performing Computer Software Services


LESSON 1: Configuring the BIOS
Introduction

The BIOS (pronounced as "bay-os") or the basic input/output system of the computer is responsible in making


sure that all the other chips, hard drives, ports, and the CPU function together.

The BIOS basically sets up your computer -- it loads your drivers and boots the operating system.

TOPIC 1: Understanding the BIOS


The BIOS is a software usually built onto the motherboard that shows the major hardware components of your
computer with the operating system.

It is usually stored on a Flash memory chip on the motherboard, but sometimes the chip is another type of
ROM.

When you turn on your computer, the BIOS does several things. The sequence is as follows:

1.  Check the CMOS Setup for custom settings


2.  Load the interrupt handlers and device drivers
3.  Initialize registers and power management
4.  Perform the power-on self-test (POST)
5.  Display system settings
6.  Determine which devices are bootable
7.   Initiate the bootstrap sequence

TOPIC 2: Configuring the BIOS


By default, the first boot of the newly installed computer is on the hard disk--may it be on a laptop or a desktop
computer. When installing an operating system, the BIOS should be configured to set the system to boot on the
operating system to be installed. It should boot first on the USB installer.

Running the BIOS


 
Upon turning the computer on, press the keys that would run Setup. On most computers, it would be keys: ESC,
DEL, F1, F2, F12, Ctrl-Esc, or Ctrl-Alt-Esc to enter setup. There is usually a line of text at the bottom of the
display that tells you "Press ___ to Enter Setup."

BIOS setup would depend on the motherboard manufacturer. However, these are the common, standard options
you may see in the BIOS setup:
If you would like to boot from a certain device, say a USB Flash Drive to install an Operating System (which
we will demonstrate later), click advanced set-up and look for the first, second, and third boot device.

Select first boot device. By default, it would be the hard drive on the installed computer.
Make sure to choose "Save Changes" when you are changing settings in the BIOS. Afterwards, this will restart
the computer so the new settings take effect.       

 System Time/Date - Set the system time and date


 Boot Sequence - The order that BIOS will try to load the operating system
 Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" if your
computer and operating system both support it
 Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse"...
 Drive Configuration - Configure hard drives, CD-ROM and floppy drives
 Memory - Direct the BIOS to shadow to a specific memory address
 Security - Set a password for accessing the computer

47
 Power Management - Select whether to use power management, as well as set the amount of time for
standby and suspend
 Exit - Save your changes, discard your changes or restore default settings
48
49
WHY IS BOOTING REQUIRED?
 Hardware doesn’t know where the operating system resides and how to load it.
 Need a special program to do this job – Bootstrap loader (e.g. BIOS – Boot Input Output System)
 Bootstrap loader locates the kernel, loads it into main memory and starts its execution.
 In some systems, a simple bootstrap loader fetches a more complex boot program from disk, which in
turn loads the kernel.

Bootable Devices

Booting is a startup sequence that launches the operating system of a computer when it is turned on.

A boot sequence is the initial set of operations that the computer performs when it is switched on. Every
computer has a boot sequence.

A boot device is any device or drive that has the required boot files that allows the computer to start.

In this case, if we are building a PC from scratch, usually there is still no operating system. With this, an
operating system can be booted or installed from a boot device.
50
A boot drive commonly used is the hard drive. Usually, an operating system like Microsoft Windows is
installed in a hard drive to load Windows.

Creating Bootable USB Device

Using a third party application (Rufus), scroll the demonstration slides below to see the step-by-step process on
creating a bootable USB device.
51
52
53
ACTIVITY: Fill in the blanks!

Fill in the missing words.


The BIOS (pronounced as "bay-os") or the  basic  input/output  system  of the
computer and is responsible in making sure that all the other chips, hard drives, ports, and the CPU function
together.
 
LESSON 2: Installing Operating Systems
Introduction

When you open a computer, usually this will either be a Windows PC or a Macintosh computer. They will have
different user interfaces or applications that may be specific to that computer. The Windows or the Mac are
called operating systems.

The Operating System (OS) is a layer of software which is used to manage computer resources. It also provides
an interface, so that users can utilize computer resources. It configures and manages hardware to connect the
components and the applications.

TOPIC 1: Different Operating Systems


The three most popular operating systems are Windows, MAC, and Linux. 

Windows is the dominant over the other two. 90% of computer users use Windows operating system. Windows
and MAC are expensive operating systems however, MAC OS requires the users to buy the MAC systems
(Macbook, Mac) built by Apple.

On the other hand, Linux is a free operating system.

Windows and MAC have similar file structures while Linux has a different code base (single file tree compared
to Windows and MAC's many directories) Windows interface has a Start menu, Taskbar, System Tray, and the
Windows Explore while Linux has easy to switch interfaces.

Linux is most preferred by programmers, MAC is preferred by graphic artists, and Windows is preferred by
gamers.

54
Installing Windows Operating System

Go through the step-by-step procedure on how to install a Windows operating system.


55
56
57
TOPIC 3: Creating a Bootable Device
Common Operating Systems
The following are common operating systems being used today:

58
ACTIVITY: Guess the word!

Windows is the dominant over the other two. 90% of computer users use Windows operating system. Windows
and MAC are expensive operating systems however, MAC OS requires the users to buy the MAC systems
(Macbook, Mac) built by Apple.

On the other hand, Linux is a free operating system. Linux is most preferred by programmers, MAC is preferred
by graphic artists, and Windows is preferred by gamers.

LESSON 3: Installing Device Drivers


Introduction

This is an essential step that you need to be aware of after installing an operating system. Basically, the device
drivers tell your operating system how to use the components like the motherboard, graphics card, network
interface cards, sound cards, and other devices.

Most of the time, Windows would be able to recognize a device and will install drivers automatically. Some
cases would require installing generic drivers.

Drivers – small software programs that help the operating system use the device. When a device is
malfunctioning, one should ask whether the right driver has been installed.

TOPIC 1: Installing Device Drivers


There are several ways to install device drivers for your newly installed components:

1. Manufacturer’s DVD Installer – Provided upon buying a computer, laptop, device

2. Driverpack Solution – A free tool which automatically finds proper drivers for a computer then
downloads and installs it without wizards or installation prompts.
59
3. Device Manager (Driver Update) – Can be accessed by clicking Start > Computer > Manage >
Device Manager. From here, each component can have the option to install a driver through a CD or through
searching automatically online.

4. Download Online – Look for unit’s Model Name and Number


60
Installing Using a Driverpack
61
62
63
TOPIC 2: Checking Device Driver Installation
After installation, you would want to see if you've installed the correct device drivers to avoid any issues that
may hinder the component from running in its full performance. 

In this simple procedure, we are looking if there drivers are already installed. If the device driver is installed,
updating it through the device manager would prompt to say that the drivers are installed.

1. Open the Control Panel.


2. Select System and Security.
3. Click System and select Device Manager from the left side.
4. Click “Monitor” and you will see that a genetic monitor is installed.

LESSON 4: Installing Software


Introduction

Software is basically the instructions and programs that tells the computer to run different tasks.
It can be categorized into system or OS, application, and programming.

64
  System/Operating System - tells the CPU what to do. The most common types of operating systems
are MS DOS Windows, MAC OS, and Corel Linux.

 Application - assigned to perform specific functions / tasks on the computer.

 Programming - it is development of various sets of instructions for a computer to do a task.


Different programming languages can be used to carry out a certain task and to let the computer operate
smoothly.

TOPIC 1: Establishing Installation Procedure

Installer - computer program that installs files, such as applications, drivers, software onto a computer.
 Installation (setup) of a computer program is making a program ready for execution or user access. This
process may vary depending on the program, type of computer, computer operating system, etc.

 Common Windows Installer File Extension:


 Executable - .exe
 Microsoft Windows Installation - .msi
 Compressed Zip File - .zip
 ISO image - .iso

TOPIC 2: Types of Software


System Software

Also known as Operating System. It tells the CPU what to do.

Most common examples include Windows, MAC OS, MS-DOS and Linux.

Application Software

It accomplishes specific tasks intended for personal, business, or scientific purposes. Example tasks include
inventory management, payroll processing, human resource management, etc.

Common Application Software:


 Word Processor
 Spreadsheets
 Database Programs
 Presentation Software
 Desktop Publishing Software
 Reference Software
 Graphics Programs
 Educational Software
 Computer Games
 Network Software
 Language Software

65
 Programming Software

Use to make computer programs. Programming language is used to create computer programs.

 Eclipse
 Coda
 Notepad ++
 Sublime Text

TOPIC 3: File System Types/Formatting

File System – A program used by the operating system to organize data or application files. The type of file
system is used to determine how data and programs will be accessed. In addition to that, it can also control what
data or programs will be available to users.

Types of File System


1. FAT File System
File Allocation Table Type allows the operating system to look for files on a disk.

2.  FAT32 File System


More advanced version of the FAT File System. It can partition size as well as access speed. Because of this,
FAT32 allows users to have better disk space utilization.

3. ExFAT

Extended File Allocation Table. A file system type that can be use for memory sticks and SD cards.

4. NTFS File System


New Technology File System. Compared to FAT and FAT32, NTFS has a much bigger partition and file size.
It is a highly reliable file system type because it is recoverable. It also has fault tolerance which means that
logged transactions can be used to recover data.

Storage File System Formatting

Follow the guidelines to format the file system in a storage.

1.     By default, formatting is set to FAT.

– If you try to format an internal hard disk that is smaller than 32 GB, you will see the options for NTFS, FAT
and FAT32.

– If you try to format an internal hard disk that is larger than 32 GB, you will only see the option for NTFS.

– If you try to format an external USB device smaller than 32 GB, you will see all the options.

– If you try to format and external USB device larger than 32 GB, you will only see NTFS and exFAT.

2.     Devices smaller than 32 GB should be formatted in FAT or FAT32 for more reliability and less disk space
wastage.

3.     Files larger than 32GB should be formatted in exFAT for latest operating systems.

4.     For other compatible devices and other operating systems, files larger than 32 GB should be formatted
using NFTS.

66
Common File Formats
The following are the most common file formats that you will encounter when working in a computer.

File type File extension


Text .doc .docx .asc .rtf .msg .txt .wpd .wps
Image .jpg .gif .png .bmp .eps  .pict  .psd .tif
Sound .mp3.aac .au .mid  .ra .snd .wma .wav
Video .mp4.avi  .mpg .mov .wmv
Program .exe  .bat .com
Compressed .arj .gz .hqx .rar .sit .tar .z .zip .arc
QUESTION?

The following file extensions are part of which file type?

.jpg .gif .png .bmp .eps .pict .psd .tif

 Sound
 Text
 Image*

TOPIC 4: Installing Applications


This is the basic procedure that is most common when you are installing applications.

 Find the installer folder.


 Right click Setup.exe.
 Follow the on-screen instruction.

67
Click through the step-by-step presentation below in installing a web browser.
68
69
LESSON 5: Conducting Tests
Introduction

After installing hardware and software, it is important that we make sure that the computer runs perfectly.

Testing the computer through stress tests is a good example to check if there are remaining issues in the
computer. There are procedures such as gathering test information; validating and responding to these may help
in making sure that everything runs smoothly.

Make sure that you have reviewed the use of diagnostic tools before proceeding to this lesson.

TOPIC 1: Software Tools/Disk Management Tools


The following are different disk management tools and procedures that can optimize a PC to its full
performance as well as check errors/issues along the way.

fDisk 
A command-line tool that creates and deletes partitions on a hard drive. It is available from Windows 2002
onwards. For newer units (from Windows XP onwards) the disk management tool is used.
70
Disk Management Tool 
This is used to manage disks and drives (like internal and external hard drives), create partitions, and format
devices. This is used on newer versions of Microsoft Windows.

Format 
It is the process of preparing a data storage device (i.e. hard drive, USB drive, solid-state drive) to store
information.
71
ScanDisk or CHKDSK 
Used to check integrity of files and folders in your unit. This can also be used to check the disk surface for
physical errors.

Defrag 
It optimizes space on hard drive and allow faster access to programs and data.
 Disk Cleanup
A software utility for Windows that lets users remove files and speed up computer performance.
 

72
System File Checker (SFC) 
A tool in Microsoft Windows that allows users to scan and restore corrupt Windows system files. This is
available in Windows 98 and later.

TOPIC 2: Testing Procedures


This is the basic testing procedure you will follow throughout.

 Gathering test information. 


 Validating test information.
 Responding to rest information. 
 Checking specification.

Observing the Boot Routine


1. If you have turned off the computer, power it on including all peripherals and devices.

2. Examine the power supply fan.

Is the fan running normally?

> If YES, proceed to Step 3.

> If NOT, troubleshoot the system power.

3. Watch the NUM LOCK, CAPS LOCK, and SCROLL LOCK keys light in the keyboard.

Internal Visual Inspection


Before performing Internal Visual Inspection, make sure that all open files were saved and running application
programs were closed.

1. Like in conducting external visual inspection, make sure that you have turned off the computer including its
devices and peripherals. Disconnect all power cables and electrical outlets.

2. Remove the computer’s right-side cover.

3. Examine whether all chips, expansion cards, and SEC cartridge and heat sink assembly or assemblies are
fully seated in their sockets or connectors.

4. To ensure that chips are fully seated in their sockets, press firmly on the top of each chip.

5. Check whether all jumpers are set correctly.

73
6. Check whether all cable connectors inside the computer to verify that they are firmly attached to its right
connection.
7. Reinstall the computer cover.

Reconnect the computer and any attached peripherals to their power sources, and turn them on.

TOPIC 3: Conducting Stress Test


Stress testing is a form of software testing that determines a system’s stability, availability, and reliability. 

It is used to determine the speed  and effectiveness of a computer, network, software, or device.

Performance testing is checking the software whether it can cope up with the current system performance.
You can conduct stress test by monitoring your computer performance through the Task Manager (Just press
CTRL + ALT + DEL keys to launch the Task Manager).

1. Close all open programs and launch the Task Manager.


2. Select "Performance" from the tabs.
3. Open as many applications as you can or perform many tasks.
4. Observe the computer's CPU Usage and Memory.

The more RAM you have, the smoother it is to access programs.


74
UNIT TEST IV
1. It is a layer of software used to manage components function together properly. This
computer resources. It provides the interface, boots the computer and loads the drivers.
configures and manage hardware to connect
components to applications. a. Operating System
b. Device Driver
a. Device Drivers c. Software
b. BIOS d. BIOS*
c. Operating System*
d. Program Applications 3. These are small software programs that
help the operating system use the hardware
2. It is responsible in making sure that all devices. This is constantly updated and made
chips, hard drives, ports, CPU, and other sure that the correct versions are installed.
a. BIOS
b. Drivers* 10. The following are operating systems
c. Operating Systems EXCEPT FOR
d. Windows
a. Reaver*
4. Booting is a startup sequence that b. Linux
launches the operating system of a computer c. MAC OS
when it is turned off. When installing an d. Windows
operating system to a computer, these files are
placed in a boot drive.
What is the most common boot drive used to
load the operating system?

a. USB
b. Random Access Memory
c. Flash Drive
d. Hard Drive*

5. This is a program used by the operating


system to organize data or application files. The
type of this program determines how data and
programs will be accessed.

a. .EXE organizer
b. File System*
c. Winzip
d. Installation Procedure

6. This operating system makes use of an


interface with a Start Menu, Taskbar, System
Tray among other user interface components.

a. MAC OS
b. Reaver
c. Linux 75
d. Windows*
7. Which of the following is a FREE Pre-Test
operating system?
1. This is a network device that forwards
a. Windows data packets along networks. It is connected to at
b. MAC OS least two networks, usually two LANs or WANs
c. Reaver or a LAN and the ISP network.
d. Linux*
a. Switch
8. Third party applications like Rufus make b. Repeater
use of bootable devices in the process of c. Router*
installing an operating system. Which device do d. Hub
we usually use to install an operating system?
2. It is the actual measurement of the
a. Hard Drive network's state of operation over a period of
b. Flash Drive* time. The record is used as basis for comparison
c. Cloud Drive or control.
d. Random Access Memory
a. Network Testing*
9. These are several ways in installing device b. Strategic Network Plan
drivers EXCEPT FOR: c. Ping Results
d. Utility Command Tool
a. Downloading drivers online
b. None* 3. All modern routers support 802.11n or
c. Manufacturer's DVD Installer Wireless-N which offer the most stable speeds.
d. Driverpack Solution
e. Driver Update through Device Manager True*
False 9. The following are encryption methods for
wireless networks EXCEPT FOR
4. 192.168.0.1 is the most common default IP
Address when you are accessing the router. a. 802.1X Authentication
b. Wired Equivalent Privacy (WEP)
True* c. Wi-Fi Protected Access (WPA and WPA2)
False d. Weblock System*

5. It is the medium through which 10. A good network testing strategy is one
information usually moves from one network where the network manager is able to predict the
device to another. operation of the network.

True*
a. Cable* False
b. Wire Packet
c. Patch Panels
d. Topology
e. Modular Box

6. This is a group of computers and


connected devices that share a common
communication line to a server.

a. DHCP Server
b. Client
c. Local Area Network*
d. IP Address
e. Hub

7. This is the most popular type of cable


used for Local Area networks. It has two
shielded wires twisted around each other.

a. Shielded Twisted Pair Cable


b. Coaxial Cable
c. Fiber Optic Cable
d. Unshielded Twisted Pair Cable*

8. It is used to connect and route circuits for


monitoring, interconnecting, and testing circuits
in a convenient and flexible network. Organizing
these is important in the workplace to minimize
hazards like hanging and open network cables.

a. Modular Box
b. Switch
c. Hub
d. Router
e. Patch Panel* 76

UNIT V - Setting Network Configuration

LESSON 1: Understanding Network Devices


Introduction

We aim to understand how computers are connected to each other that is why it is essential that we should be
familiar with the different devices found in the workplace to perform network connectivity.
It is important to understand that each workplace has a unique plan/map of how the organization distributes
information and who has access.

This lesson's goal is to simply familiarize ourselves with the different network devices which we'll get to
connecting later.

TOPIC 1: Network Devices


Router 

A device that forwards data packets along networks. A router is connected to at least two networks, commonly
two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or
more networks connect.

Switch 

A device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer
2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet
protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.

Hub

A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.

Hubs and switches serve as a central connection for all of your network equipment and handles a data type
known as frames. Frames carry your data. When a frame is received, it is amplified and then transmitted on to
the port of the destination PC. 

77
Repeater 

A network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to
regenerate analog or digital signals distorted by transmission loss. Analog repeaters frequently can only amplify
the signal while digital repeaters can reconstruct a signal to near its original quality.

Bridge 

A device that connects two local-area networks (LANs), or two segments of the same LAN that use the
same protocol, such as Ethernet or Token-Ring.

TOPIC 2: Local Area Network


Basically, a local area network, called as LAN, is a group of computers and connected devices that share a
common communication line (or may be wireless) to a server. 

A LAN is where computers and mobile devices may share resources like printers, scanners, storage, etc.

Local Area Connection Properties


To make sure that your LAN works properly, make sure that the following items are installed and enabled in
the Local Area Connection Properties:

Clients for Microsoft Networks

Allow your computer to share files and printers in Microsoft Network

Internet Protocol Version 4 (TCP/IPv4)

The protocol that enables the computer to communicate with other computers in the network. This can be set
automatically or manually specified along with other network information to work properly. Make sure
however that each device has a unique IP.

LAN Settings

These are specific IP settings for the LAN interface.


The default IP Address is 192.168.0.1.
The default Subnet Mask is 255.255.255.0.

78
DHCP Server

Stands for Dynamic Host Control Protocol. This gives the IP Addresses when a device starts and requests an IP
address from the network. It can be set to obtain IP address automatically.

Different Network Location Types


Home Network

This type is ideal for home networks where you trust all the people and the devices using the network. By
default, network discovery is turned on, allowing you to see other computers and devices, and others can see
you as well.

Work Network

This type is used in small office or other workplace networks. By default, network discovery is enabled
allowing other computers on a network. However, you cannot join or create a home group.

Public Network

This type is the safest. This is designed to keep your computer from being visible to others and helps protect
your computer from malicious software from the Internet. However, network discovery is turned off and home
group is not available on this network.

Domain Network

This is used for domains and at enterprise networks. This is controlled by the network administrator.

TOPIC 3: Wide Area Network


Also known as WAN. This is a collection of computers and networks connected via a network just like the
LAN. However, in WAN, it is connected over a large geographic area.

The following are the WAN settings used to connect to the Internet Service Provider (ISP):

Dynamic IP Address

This is to obtain an IP address automatically from the ISP.


Host Name

This is optional. Usually, this is the model number of the device.

MAC Address

This is optional. MAC stands for Media Access Control. The MAC Address is set by default to the MAC
Address of the WAN interface in the device.

Primary DNS Address/ Secondary DNS Address

This is optional. A Domain Name Server (DNS) is entered. If left blank, the ISP provides the DNS address.

Auto-Reconnect

This feature allows the router to reconnect to the ISP automatically if connections is disconnected.

Static IP Address

This is to set a specific IP Address that is still provided by the ISP. However, this is avoided because this
requires a lot of work and manual entry of network information.
79
PPPoE

Stands for Point-to-Point Protocol over Ethernet. Only used if the ISP uses this protocol. The ISP provides the
username and password.

IP Addressing
IP Address, or the Internet Protocol Address, is a numerical label assigned to a device within a computer
network that uses the Internet Protocol. It has two functions: (1) network hosting; and (2) location addressing.

The IPv4  is still in use today. It is a 32-bit number system.


On the other hand, a new version of Internet Protocol called the IPv6 makes use of 128 bits for its address.
(e.g. 2001:db8:0:1234:0:567:8:1)

LESSON 2: Creating Network Cables


Introduction

Cable is the medium through which information usually moves from one network device to another.

There are several types of cables which are commonly used with LANs. In some cases, a network will utilize
only one type of cable, while other networks will use a variety of cable types. 

The type of cable chosen for a network is related to the network's topology, protocol, and size. 

Understanding the characteristics of different types of cable and how they relate to other aspects of a network is
necessary for the development of a successful network.

TOPIC 1: Network Media


The network can be connected through two types of connections: wired and wireless.
Having a wired connection is more reliable than a wireless connection. However, wireless connections are
widely used by some devices such as cell phones and laptops for their portability.

The following are different wired connections commonly used in networking. However for this Qualification,
we are focusing on UTP and STP Cables which are most common for Local Area Networks.

1. Unshielded Twisted Pair (UTP) Cable

A popular type of cable that is commonly used for Local Area Networks. It has a two shielded wires twisted
around each other. 

80

2. Shielded Twisted Pair (STP) Cable

The extra covering of the STP Cable provides extra protection to prevent electromagnetic interference.

3. Coaxial Cable

This the cable commonly used in television industries. The metal shield surrounding the cable helps block
interference from fluorescence lights, motors, and other computers.
4. Fiber Optic Cable

Transmits light rather than electronic signals which reduce the risks of electrical interference. It is ideal for
environments where electrical interference is present.

Wireless Connections
Wireless connections make use of LANs which allow high frequency radio signals to communicate between
work stations, servers, or hubs. 

Wireless networks are ideal for allowing laptops, portable devices, and other devices to connect to the LAN.
This is also beneficial in establishments where it may be harder to install cables.
81
Wireless Networking

A wireless network is any type of computer network that use wireless data connections for connecting network
nodes.

Wireless PAN

Stands for Wireless Personal Area Networks (WPANs). This connection interconnect devices within a small
area. An example would be bluetooth and infrared.

Wireless LAN

Known as WLANs. This is used to connect to local resources and the internet. It links two or more devices over
a short distance using a wireless distribution method - usually through an wireless router/wireless access point
for internet access. Wi-Fi falls under WLANs.

Wireless Mesh Networks

This is a wireless network made up of radio nodes organized in a mesh topology. It can be a:

(1) Wireless MAN or Wireless Metropolitan Area Network which connects several WLANs.
(2) Wireless WAN or Wireless Wide Area Network which covers large areas such as cities/towns, branch
offices, business, public internet access system, etc.
(3) Global Area Network (GAN) for used for mobile technology such as texting, calling, etc.
(4) Space Network which is used between spacecrafts within the vicinity of earth. NASA's Space Network
makes use of this technology.
TOPIC 2: Cable Installation
In network installation, we have to be familiar with the RJ45 (Registered Jack). It is a jack used for Ethernet
networking and used for cables. Both T568A and T568B are common wiring standards however the T568B is
widely used in the Philippines.

There are two common network cabling namely the straight-through and the crossover cables. A straight-
through cable is also known as the patch cable or Ethernet cable. This is the most common format for
network cables. The wires have same pins from either end.  This is used when connecting a computer to a
modem, router, or switch. This is also used between networking equipment that are not similar to each other.

A crossover cable crosses the wires from the other end differently to the other. We use these when we connect
two devices of the same type like two computers or two similar networking devices. These wirings use two
different ends, T568A and T568B.

However, if we use a device between two devices (such as a switch), all cables are straight through.

82
VIDEO: Creating Network Cables
Watch the video below to learn how to create straight-through and crossover cables.

TOPIC 3: Patch Panels


A patch panel, also known as patch bay, patch field, or jack field, is used to connect and route circuits for
monitoring, interconnecting, and testing circuits in a convenient and flexible matter.

Having an organized patch panel is important in the workplace. Although the patch panel is meant for
organization, it is still essential to minimize hazards such as hanging and open network cables.

Good patch panel cable management is important. Neat patch, for example, is one of the most common patch
panel cable management systems. 

It allows users to store patch panels in a neat and tidy compartment. It is also compliant with industry standards.
Patch Panel to Modular Box

In connecting a patch panel to a modular box, it is important to take note that the UTP cable at this time is
neither a straight-through or crossover. 

We will be installing both ends on a patch panel and a modular box.

(A) Patch Panel

> First, strip the outer covering of the cable


> Then, arrange the wires according to its proper color coding based on the color coding you have done on the
RJ45. 

A – white blue / blue / white green / green / white orange / orange / white brown / brown

B – white blue / blue / white orange / orange / white green / green / white brown / brown

(B) Modular Box

> Strip the outer covering of the cable


> Arrange the wires according to its proper color coding based on the color coding you have done on the RJ45.
Connect the cables just like the numbers arranged at the figure below.

83

VIDEO: Installing Patch Panels


Watch the video below on how to install patch panels:

LESSON 3: Configuring the Network


Introduction

A computer network is a collection of computers and other devices linked together via use networking devices.
Networking devices are also called as communicating devices. 
Computer networks are important because it ensures effective transmission and sharing of data between
different computer devices.

 Setting-up computer networks at your homes does not need to be complicated. Few basic pieces of computer
hardware are needed to connect your computers and other devices to each other and to the Internet.

TOPIC 1: Network Categories


Personal Area Network (PAN) This is used for communication among computer and different
devices close to a person. PAN usually reaches up to 10 meters.
                                             
Local Area Network (LAN) Consists of personal computers linked together within a limited area.
For example, within a small building, office, floor, or department.

Metropolitan Area Network Larger than LAN. It can span in no more than 50 miles. It is used to
(MAN) cover a small

Wide Area Network (WAN) This type of network covers a large geographic area such as a city or
even a country. Different types of communication channels such as
telephone lines, cables, and air waves are used for this to be possible.
The Internet is an example of a WAN and it is the worlds largest
WAN.                                                  

TOPIC 2: Difference in Network Categories


 
Difference in... LAN MAN WAN
Cost Low Optic High Higher
Network Size Small Large Largest
Speed Fastest Slower Slowest
Transmission Media Twisted Pair Twisted Pair Fiber Optic
Fiber-Optic Cables Radio Wave
Satellite
Number of Computers Smallest Large Largest
84
TOPIC 3: Network Topologies
Basically, network topology is how the network of devices/computers is arranged through the connection of
various nodes through lines of connections.

Imagine a topology as a guide or a map in creating your own network.

There are different types of network topologies that we will be going through in this topic.

Bus Topology

This is a network type in which the computers and network devices are connected to a single cable.
This type of network can transmit data in only one direction. Each device is connected to a single cable.

PROS

☑ Cost-effective
☑ Cable is required
☑For small networks
☑ Easy to understand and create
☑ Easy to expand (through joining two cables)

CONS

☑When cable fails, the whole network fails


☑If network traffic is heavy, the performance of the network decreases
☑ Cable has limited length
☑ Slower than ring topology

Ring Topology

This network forms like a ring where a computer is connected to another computer. The last computer is
connected to the first. Each computer has two neighbours.

It has a number of repeaters. The transmission is unidirectional.

The data is also transferred in a sequential manner, bit by bit.


85
PROS

☑ Not affected by high traffic


☑ Cheap to install and expand

CONS

☑ Hard to troubleshoot
☑ Adding or removing a computer will disturb network activity
☑ When a computer fails, the whole network is disturbed

Star Topology

This type features all computers connected through a single hub/switch through a cable. The hub/switch is a
central node and all others are connected to a central node.
Each node has a dedicated connection to the hub/switch. This will act as a repeater as well for data flow. This
can be done using a UTP, optical fiber, or coaxial cable.

PROS

☑ Fast performance the fewer nodes


☑ Low network traffic
☑ Switch/Hub can be easily upgraded
☑ Easy set-up and modification
☑When a node fails, the others can work smoothly

CONS

☑ High cost
☑ Expensive to maintain
☑ When switch/hub fails, whole network stops
☑ Switch/hub capacity controls the performance

Mesh Topology

This type is a point-to-point connection with other devices. The traffic is carried between two devices which it
is connected.

86

There are two types: 

(1) partial mesh topology where some of the systems are connected in the same fashion as mesh topology but
some devices are connected to two or three devices; and 
(2) full mesh topology where each and every device is connected to each other. This type features a full, robust
connection. However, it is not flexible.

PROS

☑ Each connection can carry own data load


☑ Robust
☑ Easy troubleshooting
☑ Secure and private

CONS
☑ Difficult to install and configure
☑ Expensive cabling cost
☑ Bulk wiring

Tree Topology

This type has a root device and other devices are connected to form a hierarchy. Also known as hierarchical
topology. It should have at least three levels in the hierarchy.

This is ideal if workstations are located in groups. It is used in WANs.

PROS

☑ Can be extensions of bus and star topologies


☑ Easily expanded
☑ Easily managed and maintained
☑ Errors are easily detected

CONS

☑ Heavily cabled
☑ Expensive
☑ The more devices, the harder the maintenance
☑ If central switch/hub fails, network fails

Hybrid Topology

This type is a mixture of two or more topologies. You may have a department in the office using ring topology
while the other uses a star topology. This is called a Hybrid Topology.
87

It can combine even more than two topologies. Both the advantages and disadvantages are included when you
create a hybrid, thus, ideal for a non-conventional set-up.

PROS
☑ Reliable
☑ Easy troubleshooting
☑ Errors are easily detected
☑Easily scalable
☑ Flexible

CONS

☑ Complex
☑ Expensive

ASSIGNMENT:

Draw your own topology!

Using the network devices you've learned at the previous lesson, try to draw your own office network. 

Imagine at least 10 workers but they are divided at far ends of a building.

You have a pool of options to create a topology that will fit them to still have a network connection. You may
use any (e.g. wireless, wired) connections that you deem appropriate.

88
2. There are two wiring standards used for
UNIT TEST V Ethernet networking and for cables. Which of
the wiring standards is most commonly used in
1. This is how the network of the Philippines?
devices/computers is arranged through the
connection of various nodes through lines of a. T568B*
connections. b. T478A
c. T683A
a. Computer Network d. T568A
b. Network Category
c. Network Topology* 3. For a crossover cable of T568A and
d. Hybrid Connection T568B wires, what are the four wires that
change their places?
a. Orange Stripe, Orange, Blue Stripe, Blue*
b. Brown Stripe, Brown, Blue Stripe, Blue a. Router*
c. Blue Stripe, Blue, Green Stripe, Green b. Hub
d. Green Stripe, Green, Orange Stripe, Orange c. Repeater
d. Switch
4. It is used to connect and route circuits for
monitoring, interconnecting, and testing circuits 9. This is a Local Area Connection Property
in a convenient and flexible network. Organizing protocol which enables the computer to
these is important in the workplace to minimize communicate with other computers in the
hazards like hanging and open network cables. network. This can be set automatically or
manually specified along with other network
a. Modular Box information properly. It is also uses a 32-bit
b. Hub address space consisting of numbers.
c. Switch
d. Patch Panel* a. Internet Protocol Version 6 (TCP/IPv6)
e. Router b. Wide Area Network
c. DHCP Server
5. This is a group of computers and d. Internet Protocol Version 4 (TCP/IPv4)*
connected devices that share a common e. Clients for Microsoft Networks
communication line to a server.
10. This transmits light rather than electronic
a. Local Area Network* signals which reduce the risks of electrical
b. Client interference.
c. DHCP Server
d. IP Address a. Shielded Twisted Pair
e. Hub b. Fiber Optic Cable*
c. Coaxial Cable
6. This is the most popular type of cable d. Unshielded Twisted Pair
used for Local Area networks. It has two
shielded wires twisted around each other.

a. Coaxial Cable
b. Shielded Twisted Pair Cable
c. Unshielded Twisted Pair Cable*
d. Fiber Optic Cable

7. It is the medium through which


information usually moves from one network
device to another.

a. Cable*
b. Modular Box
c. Topology
d. Patch Panels
e. Wire Packet

8. This is a network device that forwards


data packets along networks. It is connected to at
least two networks, usually two LANs or WANs 89
or a LAN and the ISP network.
UNIT VI - Setting Router and Wireless Configuration
LESSON 1: Configuring the Wireless Network
Introduction

Having a wireless network will let people communicate and access applications and information without
physical wirings. This advantage of cleaner, tidier, and freer space lets people access the internet with ease.

TOPIC 1: Broadband Internet Connection


Nowadays, broadband Internet connection is used instead of the dial-up connection. DSL, which stands for
Digital Subscriber Line, and cable are two common broadband connections. 

ISPs provide the broadband connection. For example, PLDT, a telephone company, provides DSL, and SKY, a
cable TV company, provides internet connection too. These ISPs provide broadband modems, and nowadays,
even combination modem/wireless routers. 

TOPIC 2: Wireless Router

A wireless router is essential in a WLAN for home and small office networks. It allows connection to the
Internet as well as local network access. The router can be connected through a wired or wireless WAN.

There are varieties of routers still being developed and improved today that allow capabilities such as being able
to filter traffic.

All modern routers nowadays support 802.11n, or Wireless-N, which offer the most stable speeds. These routers
still offer backward compatibility with older standards like the 802.11g.

Positioning the Wireless Router

The wireless router is ideally placed somewhere in the home/small office where it can receive a strong
signal and has least amount of interference.

Follow these guidelines to ensure the best out of your wireless router:

1. Position the router in the centre of the house. 


2. Raise the router from the floor
3. Move it away from walls and metal objects.
4. Reduce interference by placing it away from microwaves/cordless phones.
90
TOPIC 3: Securing the Wireless Network
Security is important especially in the workplace where confidential files are being transferred throughout. The
network's signal may even extend outside your home and may be accessed by people outside.

That is why it is important to set certain protocols in ensuring privacy of personal information and files as these
can lead to identity theft or malicious practices.

Simply putting a network security key to your wireless router can prevent unauthorized access to the network.

Wireless Network Security Protocols


There are three types of wireless network encryption: 
(1) Wi-Fi Protected Access, or WPA and WPA2,
(2) Wired Equivalent Privacy (WEP), and 
(3) 802.1x, however this is usually used in enterprise.

The following are encryption methods for wireless networks:

1. Wi-Fi Protected Access (WPA and WPA2)

This security method encrypts the information and assures that the security key has not been modified. WPA is
for all wireless network adapters, but not in older routers and access points. WPA2 is a secure version, but does
not work in older adapters.

2. Wired Equivalent Privacy (WEP)

This is an older method but not recommended anymore. When enabled, the security key is set up. This key
encrypts the information that one computer sends to another through the network. This, however, is easy to
crack.

3. 802.1X Authentication

This helps improve security for 802.11 wireless networks and wired Ethernet networks. It makes use of a server
to validate users and provide network access. This is common in workplaces.

TOPIC 4: Wireless Network Configuration

We can divide wireless network configuration into three tasks.

To start, we are installing the router to the computer:

(1) Using a cable, connect the router to the computer


(2) Open the internet browser and type the default IP Address (usually 192.168.0.1). This is also found at the
sticker under the router.
(3) Read the instructions, because this will depend on the manufacturer. Usually the username and password are
"admin".
(4) You can explore the interface and configure wireless set-up such as the SSID or the name of the router, the
password (e.g. WAP2), or the MAC Address.

Next, we can set-up a security key:

(1) Open Network and Sharing Centre (Start> Control Panel > Network and Sharing Centre)
(2) Click Set up a new connection or network.
(3) Click Set up a new network, then next. 

The wizard will walk you through with a network name and security key; the default will be a Wi-Fi WPA2

91
Then, we can add computers to the network:

(1) Open Connect to a Network. Click the network icon in the lower-right.


(2) In the list of networks, click where you want to connect. Click Connect.
(3) Enter the security key.

Setting up a Wireless Access Point

Follow the step-by-step procedures on how to set up wireless access point.


92
93
94
95
96
97
98
99
100
101
Changing Router Username and Password

Follow the step-by-step procedures on how to change the router username and password.

102
103
104
105
106
Changing Wireless Name and Security Key

Follow the step-by-step procedures on how to change the wireless name and security key.
107
108
109

The difference is that the previous topic is on the administrative privileges of accessing the router itself while
this is when you connect wirelessly; what name appears on your phone's Wi-Fi connection options. 

MAC Address Reservation

Follow the step-by-step procedures on how to configure the MAC Address Reserve.
110
111
112
113
114
115
116
117
118
119
This is done when you want to reserve specific devices to connect exclusively to the router, no matter how
much limit you put into wireless devices to connect, for example. Each device has a MAC Address so this
means that you are reserving these devices. Most of the time these devices are your own or the family's. So no
matter how many neighbors or friends connect to your router, and you've limited to only 5, for example, your
devices will still connect.

Creating a Workgroup

Follow the step-by-step procedures on how to create a workgroup.


120
121
122
This is especially important when you want to create a tightly-bound local area network connection within your
office, as an example. This will also be useful for servers later.

TOPIC 5: Wireless Repeater Configuration


When we find dead spots in the house, or the wireless router is not able to reach the whole house, wireless
repeaters are used. These are basically extenders that can connect via wire or wireless connections.

To configure the wireless repeater:

(1) First, find the basic wireless settings. Maximize the broadcast of the signal to the highest Mbps as possible.

(2) Select Repeating Functions or Signal Repeat Settings or menu items that mention repeating. From here, you
identify the primary router as the base station where the internet, for example, is connected first.

(3) If prompted, enter the MAC Address of the router/repeater. This is a 16-character name located at the sticker
below the device.

(4) Unplug the Ethernet from the primary router. Connect it to the repeater or secondary router that will be a
wireless repeater. Log in to the router at 192.168.0.1

(5) Type in the SSID you will use. Repeat the previous process:  Enable the signal repeating functions. Enter the
MAC address. Save and disconnect repeater from computer.

(6) Make sure you find a good location for the wireless repeater. It should still reach the Wi-Fi signal area but
enough to maximize its extended signals.

123
LESSON 2: Securing the Network
Introduction

There are many security threats that are spread over the internet. Viruses, worms, Trojan horses, zero-day
attacks, hacker attacks, denial of service (DOS) attacks, data interception, and theft.

That is why it is important that there are security protocols aside from router configuration to further protect the
network. It is wise to prevent these threats from entering and spreading on the network.

TOPIC 1: Network Security Components


To avoid these security threats, it is important that we have network security components. These are software
applications that protect the usability, reliability, integrity, and safety of the network and the data.

These components include anti-virus and anti-spyware programs, firewalls (to block unauthorized access to the


network, intrusion prevention systems, or IPS, (to identify fast-spreading threats such as zero-day or zero-hour
attacks), and Virtual Private Networks, or VPNs, (to provide secure remote access).

TOPIC 2: Firewall
Basically, a firewall is a device -- that can be hardware or software based -- which controls access to the
organization's network.

There are several types of firewalls depending on the security needed by the network.

Network Layer Firewalls

These operate at a low level of TCP/IP protocol where packets are not allowed to pass through unless they
match the rules set by the firewall administrator.

Application Layer Firewalls

These work on the application level of the TCP/IP stack. These can intercept all packets traveling to or from the
application. They can block other packets - unwanted outside traffic can be prevented.

Application Firewalls

These are network-layer and application-layer types that overlap. An example is restricting ftp services
through /etc/ ftpaccess file.

Proxy Firewalls

These operate at the firewall's application layer. These act as intermediary for requests from one network to
another for a specific network application.  These prevent direct connections between either sides allowing or
blocking traffic based on the rules set.

LESSON 3: Inspect and Test Networks


Introduction

It is important to test computer networks to assure that these networks will be effective especially in the long
run. 

Aside from ensuring that these networks are secure, it is essential that we know in the first place that they are
working correctly to avoid issues in the future.

124
TOPIC 1: Network Testing
Network Testing is the actual measurement of the network's state of operation over a period of time. This record
will be the basis for comparison or control.

It is often called understanding the past to predict the future.

A good network testing strategy is one where the network manager is able to predict the operation of the
network. 

Testing the reliability and its ability to support new applications and users are among the list of factors in
examining a good network.

TOPIC 2: Important Network Characteristics


Through a comprehensive network test, the network manager is able to maintain a network actively. When it is
implemented properly, it is easy to track the changes and trends that can be seen in its daily operation. 

From here, a network manager is able to obtain valuable insight where s/he may use for further improvements
and troubleshooting.

We should look for the following when we are testing the network:

(1) Utilization levels


(2) Number of users
(3) Number of operational protocols
(4) Error statistics
(5) Application utilization

TOPIC 3: Final Testing


Final testing aims to test the hardware and software aspect of the systems and the network.

Follow the following steps.

(1) Launch cmd by CTRL+R, typing cmd, then press enter.


(2) Type ping and the IP address of a comptuer in the network. If the timeout does not request, it means that the
computer is connected to the network.
(3) You can log-on to the network as well by accessing your network device. Observe the color of the NIC on
the computer; the light should be green or yellow and has one solid and a blinking light.

TOPIC 4: Generating Reports


Network testing will essentially need documentation and reports from the computer. This is important since this
will be used for maintenance.

The following steps may require you to be an Administrator to access some of the features in this procedure.

To enable diagnostic logging;
(1) Open the Network Connections folder and view the available connections.
(2) Press ALT to display the menu bar, then access Advanced, click Remote Access Preferences.
(3) Access Diagnostics, you can do one or more of the following:
a) You can enable logging for all remote access connections. Select Enable logging. Then
click Generate Report.
b) You can clear logs that were created during previous connection attempts. Select Clear Log. Then
click Generate Report.
 To view this report, click View Report. 
 To save it to a file, click Save report to this file. 
 To send report to an e-mail address, click Send report to this e-mail address. 
 To generate a more concise report, click Generate summary report. 125
True
UNIT TEST VI False*
1. The following are encryption methods for 9. A firewall is a device which controls
wireless networks EXCEPT FOR access to the organization's network. There are
several types depending on the security needed
a. 802.1X Authentication by the network such as network layer,
b. Weblock System* application layer, application, and proxy
c. Wired Equivalent Privacy (WEP) firewalls.
d. Wi-Fi Protected Access (WPA and WPA2)
True*
2. It is important to set certain protocols in False
ensuring privacy of personal information and
files since an unsecure network can lead to 10. The following are good practices in
identity theft or malicious practices. ensuring the wireless router can receive a strong
signal and has least amount of interference,
True* EXCEPT FOR:
False
a. Place the center at the center of the house
3. Having a wireless network will let people b. Place it away from microwaves/cordless
communicate and access applications and phones
information without physical wiring. There are c. Place the router on the floor.*
many advantages such as cleaner, tidier, and d. Move it away from walls and metal objects
freer space.

True*
False

4. It is the actual measurement of the


network's state of operation over a period of
time. The record is used as basis for comparison
or control.

a. Network Testing*
b. Strategic Network Plan
c. Ping Results
d. Utility Command Tool

5. 192.168.0.1 is the most common default IP


Address when you are accessing the router.

True*
False

6. A good network testing strategy is one


where the network manager is able to predict the
operation of the network.

True*
False

7. All modern routers support 802.11n or


Wireless-N which offer the most stable speeds.

True*
False

8. Nowadays, dial-up connections are used


instead of broadband connections. Sky and
PLDT are examples of dial-up connections.
126  Software cost
Pre-Test True*
False
1. The boot process has four major stages:
8. The Server is the process which provides
 Pre-boot requested services for the Client.
 Boot
 Load True*
 Initialization False

True 9. A server that runs ADDS is a client


False* controller.

2. The following are client/server topologies True


EXCEPT FOR False*

a. Multiple clients, single server 10. It is the storage of files stored by the user
b. Single client, single server to the computer server.
c. Multiple clients, multiple servers
d. Multiple clients, no server* a. Memory
b. ADDS
3. This service is one of the most used on a c. User folder*
Windows network. It enables one to realistically d. Random Access Memory
assess operational requirements and server
performance for each computer.

a. Web Services
b. File Services
c. Domain Controller*
d. Remote Access

4. The printer services role provides essential


services for managing files and the way they are
made available and replicated on the network.

True
False*

5. The _______________ is the package that


contains Windows Power Shell commands.

a. Modules*
b. Commands
c. Actions
d. Configuration

6. Client/Server, according to the


Management Information System, is the new
technology that yields solutions to many data
management problems faced by modern
organizations.

True*
False

7. One of the main disadvantages of using


server/client systems is the cost such as:

 Maintenance cost
 Training cost
 Hardware cost
127
UNIT VII - Set-up User Access
LESSON 1: Understanding the "Server" and "Client"
Introduction

Networks, like humans, exist even within computer systems!

To understand this, this module will run you through how computer networks are connected in sharing
information and resources through servers and clients. 

Since you've just learned about networks in the previous module, the computer server will be an example of a
network that you will be working with in the workplace.

This lesson will run you through the client/server network model. You will be able to enumerate the various
functions of the client/server model and as well as discuss their different topologies.

TOPIC 1: Client/Server
Client/Server, according to the Management Information System, is the new technology that yields solutions to
many data management problems faced by modern organizations.

This is a model based on the distribution of functions between two types of independent and autonomous
processes:  Server  and Client.

In simple method definitions;

Client - any process that requests specific services from the Server.

Server - a process which provides requested services for the Client.

Basically, the two processes reside on two or more independent computers on a network. The server gives
services for more than one client. 

The network is the medium in which the server and client connects.


128
TOPIC 2: Client/Server Functions
129
TOPIC 3: Client/Server Topologies
A Client/Server Topology is the physical layout of the Client/Server network. It plots out how the clients and
servers are connected to each other.

The following are the most common designs and strategies:

1. Single client, single server

One client is directly connected to one server in this setup.

2. Multiple clients, single server

Several clients are directly connected to one server.

3. Multiple clients, multiple servers

Several clients are connected to several servers.

TOPIC 4: Advantages and Disadvantages


Advantages

 Performance and reduced workload


 Workstation independence
 System interoperability
 Scalability
 Data integrity
 Data accessibility
 System administration (Centralized management)
130
 Integrated services
 Sharing resources among diverse platforms
 Masked physical data access
 Location independence of data processing
 Reduced operating cost
 Reduced hardware cost
 Communication costs are reduced

Disadvantages

 Maintenance cost
 Training cost
 Hardware cost
 Software cost
 Complexity

LESSON 2: Creating User Folder


Introduction

In this lesson, you will learn how to create a user folder with Network Operating System, or NOS, features.

Basically, a user folder is the storage of files stored by the user to the computer server.

TOPIC 1: Active Directory Domain Services

Before creating a user folder, the administrator of the server should first install the Active Directory Domain
Services (ADDS) and create a user account.

To install the ADDS, the administrator should open command prompt (Ctrl + R then cmd), and type dcpromo to
install ADDS, DNS, and create a forest and domain.

A server that runs ADDS is a domain controller.

The domain controller basically:

 Validates and gives access to all users and computers in a Windows domain type network,
 Appoints and creates security protocols for all computers, and
 Installs and adds software.

Features of ADDS

These are the features of having the Active Directory Domain Services:

1. Security - The data is stored securely. Each of the objects in the Active Directory has an ACL or Access
Control List which consists of the resources that one may access and along with access privileges given to each
resource.

2. Query Capabilities - The ADDS creates a global catalog to give a mechanism to handle queries. A client
which has ADDS can query the catalog to request directory data.

3. Replication - To replicate a directory to all domain controllers means easy access, high availability, and
improved fault tolerance.

4. Extensibility - Having ADDS is extensible. Meaning that new object types can be added to a directory. An
attribute can be added, for example to the user object.
131
Once a user is created, a user folder is also automatically created upon the log-in of the user to the client
computer.

TOPIC 2: Creating a User Folder


This topic will teach you how to create a user folder with network operating system (NOS) features.

You can carefully follow the steps below if you have two computer units (one installed with Windows Server OS
and a Windows 7/8/10 ) connected through a network cable.

1. On the server computer create a shared folder on drive C: or drive D:


2. On server manager, select Features, Group Policy Management, Forest, Domains, (Domain name), Right
click on Policy, Edit
3. Chooser User Configuration, Choose Policies
4. Choose Windows Setting
5. Choose Folder Redirection
6. Choose your directory to be redirect, press right click on your mouse and select properties
7. Target Setting: Choose Basic
8. Under Root Path, type the share name of your folder
9. Click OK
10. Log-in to the client computer to automatically create User folder

Set Static IP Address


Follow the step-by-step procedures on how to set a static IP address.
\
132
133
134
135

This is a crucial step when configuring the server as this is required for the server computer itself.
 
Configuring the Active Directory Domain Services

Follow the step-by-step procedures on how to configure the ADDS (Active Directory Domain Services).
136
137
138
139
140
This is important since this is where all the information on resources are centered on.
.
Adding Roles

Follow the step-by-step procedures on how to add roles in the ADDS. 


141
142
143
144

Creating an Organizational Unit & User

Follow the step-by-step procedures on how to create an organizational unit and a user. 
145
146
147
LESSON 3: Configure User Access
Introduction

In the workplace, computers are not used by an individual for personal use. Computers are usually accessed by
more than one person. System administrators are able to log on locally if these accounts are in the domain. 

A computer is able to identify between one person/people to another through a security device called the  user
account object.

Each user in the network has a unique user account which contains the contact details of the users as well as
what his/her rights and restrictions in accessing resources/folders, etc.

148
TOPIC 1: Features of a User Account
The following are the features of a domain-based user account in Windows Server 2008 r2 (which we will be
using throughout this module).

Password Security

Each user account is protected by a password to provide authorization and access to the system.
Permissions

These are access privileges granted to a user account (e.g. group memberships, user-specific settings to access
resources, etc.)
Identification

Having a user account means easily identifying the person to the computer system and network.

User Rights

Having user rights is a high-level privilege given to users or groups to define their action on a computer system.

Roaming

The administrator may define user accounts in a way that a user is able to log on to any system which is a
member of a domain using a domain user account, a Remote Access Service (RAS), or gateway.

Environment Layout

Profiles are user-specific and able to store information about the layout, desktop, and user environment in
general. They are specifically restricted through the use of mandatory profiles.

Auditing

The server can track access and use by domain user accounts.

TOPIC 2: Configuring User Access


This topic will teach you how to configure user access level based on NOS features and established network
policies and end-user requirements.

You can carefully follow the steps below if you have two computer units (one installed with Windows Server OS
and a Windows 7/8/10 ) connected through a network cable.

1. To get to Active Directory Users and Computers, choose Start> All Programs > Administrative Tools >
Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization unit to which you want to
assign this new account.
3. In the details pane, right click the group and then choose Properties.
4. On the Members tab, Click Add.
5. Fill in the following information.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by retyping it.
8. Configure the password setting using the options described.
9. Click the Next button when you’re finished marking your selections.
10. Click the Finish button if everything is correct.

149
2. The Server is the process which provides
UNIT TEST VII requested services for the Client.
1. Before creating a user folder, the True*
administrator of the server should first install False
the Active Directory Domain Services (ADDS)
and create a user account. 3. One of the main disadvantages of using
server/client systems is the cost such as:
True*
False  Maintenance cost
 Training cost
 Hardware cost
 Software cost 10. It is any process that requests specific
services from the Server.
True*
False a. Network
b. Server
4. The following are client/server topologies c. Client*
EXCEPT FOR d. Boss

a. Multiple clients, no server*


b. Multiple clients, single server
c. Multiple clients, multiple servers
d. Single client, single server

5. A server that runs ADDS is a client


controller.

True
False*

6. The network is the medium in which the


server and client connects.

True*
False

7. It is the storage of files stored by the user


to the computer server.

a. Random Access Memory


b. ADDS
c. User folder*
d. Memory

8. The following are the functions of the


server EXCEPT FOR

a. Ensures that integrity constraints are not


violated
b. Managing the user interface*
c. Checks authorization
d. Performs query / update processing and
transmits responses to client

9. Client/Server, according to the


Management Information System, is the new
technology that yields solutions to many data
management problems faced by modern
organizations.

True*
False
150
UNIT VIII - Configure Network Services
LESSON 1: Checking Normal Functions
Introduction

In this lesson, you will be able to identify various boot processes. This is important because a startup failure
might occur. To successfully boot the server operating system is the first step in handling the server.
Some issues may be easily diagnosed and corrected however, take note that not all server errors occur only
during booting. It can also occur when it is running or even when the server is shutting down.

TOPIC 1: Boot Process


The boot process has five major stages: 

 Pre-boot
 Boot
 Load
 Initialization
 Log-on

In each stage, there are steps that should be followed in loading and using files. In each of these stages, observe
how the process works, how the particular files are utilized, and what is seen on screen.

Pre-boot

Pre-boot is basically the BIOS startup process. 

By turning on or resetting the computer, you should perform the Power-On Self-Test  or POST routine discussed
in the previous modules.

The BIOS shall execute the Initial Program Load where the boot devices are read and prioritized.
The partition information is seen as well as the boot sector and the Windows Boot Manager. You will also see
the memory check, hardware, and boot device search.

The following are common causes of error during this stage:

 Corrupt MBR - This is caused by many viruses in the Master Boot Record which corrupted it.
 Improperly configured hardware - This happens when the hard drive is not recognized. This error can
happen even if the device is fine and the configuration is unchanged.
 No partition is marked as active - This may happen if the Fdisk utility is recently used and no partition
is made from all the free space available.
 Corrupt or missing Ntldr file - This may happen when the Ntldr file is corrupted or deleted by a virus.
 Boot - Windows Boot Manager reads the boot configuration data (BCD). But in the case of having more
than one boot partition, it prompts the user to choose a partition and its operating system. 

If a choice is not made before the time clocks out, the default partition and operating system will be loaded. If
you are booting a Windows Server operating system, the Windows Boot Loader (Winload.exe) is started. 

151
The following are common causes of error during this stage:

 Missing or corrupt files - If Ntldr, Boot.ini, Bootsect.dos, Ntdetect.com, or Ntoskrnl.exe is corrupt or


missing either by a virus or by some malicious intent, the boot sequence will not succeed. An error
message will indicate which file is missing or corrupt.
 Improperly configured Boot.ini file - This may happen when you manually edit Boot.ini or if you have
made any changes to the disk configuration.
 Unrecognizable improperly configured hardware - If the error that appears is due to Ntdetect.com,
the issue comes from the hardware.

Load, Initialization, and Logon


Load

By this time, the Windows Server 2008 “splash” screen comes up.

While this happens, the Windows Boot Loader loads the operating system kernel, the hardware abstraction layer
that provides the interface between the operating system and a particular set of hardware, the Registry file, and
the drivers for basic hardware devices, such as the monitor, mouse, and keyboard.

Initialization

The OS kernel is initialized and takes over from the Windows Boot Loader, bringing up the graphical display
and filling the Registry with HKEY_LOCAL_ MACHINE\HARDWARE key, and
HKEY_LOCAL_MACHINE\SYSTEM\SELECT subkey (called the “Clone Control Set”) and loads the
remainder of the device drivers.

Logon

The Windows Server OS graphic user interface (GUI) comes up and the logon screen will show.

After a successful logon, the necessary services are prompted, the Last Known Good control set is written on
the basis of the Clone Control Set, and the start-up programs are started.

Possible errors during logon stage.

1. If logon errors occur, they are usually due to an incorrect username or password or to the unavailability of a
DNS server or a domain controller to authenticate the request (if the computer is a part of a domain).

2. Errors can also occur if a service cannot be loaded. If a service fails to load, you will see a message in the
System Log of Event Viewer.

LESSON 2: Installing Modules and Add-ons


Introduction

One must be able to load modules and add-ons so that you can access their functions. Modules will contain
other modules. But however, modules are independent and can be used without the other depending on the
needs of the server.

This lesson will briefly go through the different modules and add-ons that you may utilize for the server.

TOPIC 1: Using Modules


The module is the package that contains Windows Power Shell commands. Examples of these are ascmdlets,
providers, functions, workflows, variables, and aliases.

152

You are able to write commands with these modules to organize commands and share with others.

Those who will receive modules can add commands in the modules to their Windows Power Shell sessions to
use them like built-in commands.

List of Modules/Add-ons

The following are modules which support different functions and features in the Windows Server OS.

1. Active Directory module


2. Active Directory Rights Management Services module 
3. Active Directory Rights Management Services Administration module
4. Application ID Policy Management module
5. Best Practice Analyzer module
6. Background Intelligent Transfer Service (BITS)
7. Failover Clusters module 
8. Group Policy module
9. Network Load Balancing Clusters module
10. Remote Desktop Services module
11. Server Manager module
12. Server Migration module
13. Internet Information Services (IIS) module

TOPIC 2: Installing Modules/Add-ons


The following are the steps you should follow in installing modules/add-ons.

Procedure:

Step 1: Find all “Module” commands


In the Power Shell window, type the following command and press ENTER:
Get-Command –Noun Module

Step 2: List all modules that are available


In the Power Shell window, type the following command and press ENTER:
Get-Module –List Available

Step 3: Load the Server Manager module into the current session
In the Power Shell window, type the following command and press ENTER:
Get-Help Import-Module

In the Power Shell window, type the following command and press ENTER:
Import-Module Server Manager

LESSON 3: Performing Network Services


Introduction

When you are managing a NOS or Network Operating System, you should know there are different network
services that are available. 

These services need to be configured so that communication will flow easily within the network.
You are expected to learn most of these network services and configure them. 

There are seven basic network services that you need to be familiar with: remote access, domain controller, web
services, database services, proxy server, file services, and printer services.
We will go through each of these through this lesson.

153

TOPIC 1: Remote Access


Remote access technology enables one to login to a system as an authorized user without being physically
present at the keyboard. This is common in corporate computer networks.

One of the most common form of remote access is the remote desktop. This basically allows a server computer
can control with the actual desktop user interface of another computer.

To setup a remote desktop, both the host and target (controlling computer and remote computer to be accessed)
need to be installed certain software.
TOPIC 2: Domain Controller
This service is one of the most used on a Windows network. It enables one to realistically assess operational
requirements and server performance for each computer.
It responds to security authentication requests and the like that need verification from the host for many security
and validation doors across the network.

TOPIC 3: Web Services


Having a web server enables hosting among websites and web-based applications. Both static and dynamic
content can be hosted on a Web server.

Several web applications that have many roles and functions can also be hosted using ASP.NET and .NET
Framework 3.0, among others.

TOPIC 4: Database Services


A database server is a computer program that offers database services to other computer programs or
computers, as seen in the client–server model. 

The term may also refer to a computer dedicated to running such a program. Database management systems
frequently provide database server functionality.

TOPIC 5: Proxy Server


In computer networks, a proxy server is a server (a computer system or an application) that acts as a middle-
ground for requests from clients seeking resources from other servers.

A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other
resource available from a different server and the proxy server evaluates the request as a way to simplify and
control its complexity. 

Proxies were created to add structure and encapsulation to distributed systems. 

TOPIC 6: File Services


The file services role provides essential services for managing files and the way they are made available and
replicated on the network. 

A number of server roles require some type of file service. 

Includes these role services and subservices: File Server, Distributed File System, DFS Namespace, DFS
Replication, File Server Resource Manager, Services for Network File System (NFS), Windows Search Service,
Windows Server 2003 File Services, File Replication Service (FRS), and Indexing Service.

154
TOPIC 7: Print Services
For print servers, this resource type provides for high availability of network-attached print devices.

Printers connected directly to print servers cannot be included because there is no way to fail over control to a
different server. 

If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in the process of spooling
are discarded and must be re-spooled or reprinted to the Print Spooler resource.
TOPIC 8: Performing basic network service configuration
You will be needing a computer installed with Windows Server 2008 R2 operating system to perform the
following procedures.

Steps/Procedure:

Task 1: Install DHCP and File Services


 In Server Manager, select Role; then select Add Role in the right pane
 Follow the series of steps provided in the wizard
a. Tick “DHCP Server” and “Files Services”
b. Read the installation guide and follow the steps carefully
c. Note: Always validate the IP Address; set the IP range after the installation

Task 2: Make a Group Policy Management


• Go to “Features”, Group Policy Management, Forest, Domain
• Right click on Domains and choose Create a GPO in this domain
• Write a GPO name and click OK
• Unchecked Link Enabled
• On Security Filtering, click Add and Insert Everyone
• Close the Server Manager to refresh

Task 3: Create DHCP (IP Scope)


• Select Roles, DHCP Server, (domain), right-click on IPv4 and select New Scope
• Write a new scope name
• Set your IP Address range
• Skip on IP add Exclusions
• Set Lease Duration
• Choose YES for Configure DHCP Options
• Skip on the next procedures
• Activate the scope now

Task 4: Create Folder Redirection


• Select “Features”, Group Policy Management, Forest, Domains, (Domain name), right-click on Policy,
choose Edit
• Choose User Configuration
• Choose Policies
• Choose Window Settings
• Choose Folder Redirection
• Choose your directory to be directed, right-click and select Properties
• Target Settings: Choose Basic
• Under Root Path, type the share name of your folder
• Click OK

Folder Sharing

Follow the step-by-step procedures on how to configure folder sharing where folders across a network are
shared to all connected devices. 

155
156
157
158
159
160
Folder Redirection

Follow the step-by-step procedures on how to redirect folders across a network.


161
162
163
164
165
166
167
168
Remote Desktop Configuration
Follow the step-by-step procedures on how to configure a remote desktop.

169
170
171
172
6. It is a server (a computer system or an
UNIT TEST VIII application) that acts as a middle ground for
requests from clients seeking resources from
1. The _______________ is the package that other servers. These are created to add structure
contains Windows PowerShell commands. and encapsulation to distributed systems.
a. Commands a. Simple Server
b. Actions b. Proxy Server*
c. Modules* c. Windows Server 2008
d. Configuration d. Domain Controller
2. To successfully boot the server operating 7. There are five basic network services that
system is the first step in handling the server. you need to be familiar with: remote access,
domain controller, database services, file
True* services, and printer services.
False
True
3. The Windows Boot Manager reads the False*
boot configuration data (BCD).
8. One of the most common form of remote
True* access is the _________________________.
False
This basically allows a server computer can
4. The printer services role provides control with the actual desktop user interface of
essential services for managing files and the way another computer.
they are made available and replicated on the
network. a. Remote Desktop*
b. Control from Remote
True c. Automated Computing
False* d. Airplane Mode
5. This service is one of the most used on a 9. Those who will receive modules can add
Windows network. It enables one to realistically commands in the modules to their Windows
assess operational requirements and server PowerShell sessions to use them like built-in
performance for each computer. commands.
a. Domain Controller* True*
b. Web Services False
c. File Services
d. Remote Access 10. The boot process has four major stages:
1. Pre-boot
2. Boot
3. Load
4. Initialization

True
False*

173
d. Check cable issues
Pre - Test
5. ____________________ is the copy of data
1. The following are purposes of preventive on a computer or hard drive that is saved to an
maintenance EXCEPT FOR: external media such as a DVD, CD, or flash
drive.
a. Organize electrical-related circuit In an organization, it is routinely done—may it
maintenance* be daily, weekly, or on a monthly basis. This is to
b. Upgrading certain hardware or software for ensure that the organization’s data are protected
security and reliability and are readily available.
c. Reduces the probability of hardware or
software problems a. Emptying the recycle bin
d. Ensures minimal system failure b. Defragmentation
c. Backup*
2. The following are ways to maintain your d. Preventive Maintenance
computer EXCEPT FOR:
6. The two methods to eliminate a virus is
a. Search and delete spyware and viruses from through (1) removing the virus and (2)
the device quarantine.
b. Clean browsers
c. Uninstall programs that are no longer used True*
d. Install more programs* False
e. Defragment the hard drive routinely to keep
the device running smoothly 7. Regular cleaning of components makes
the computer at risk to overheating.
3. Which of the following are the benefits of
conducting maintenance? True
False*
a. Increased data protection
b. Extended device life 8. Troubleshooting is not honed over time.
c. Increased equipment stability Every time an issue is resolved, this should
d. Reduced repair costs follow guidelines on textbooks and manuals
e. All of the above* strictly. Through troubleshooting experience,
one should know the steps needed to resolve an
4. The following are the techniques and issue quickly.
strategies that you may perform when you are
trying to solve hardware issues EXCEPT FOR: True
False*
a. Run Cleaner*
b. Trial and Error 9. Before backup, make sure to verify the
c. Document computer issues following with the customer first:
•Date of last backup
•Content of backup
•Data integrity of the backup
•Availability of backup media for data
restoration

True*
False

10. A properly maintained computer gives


higher speeds, may it be via RAM or on the
Internet, regardless of hardware set-up and
configurations.

True*
False

174

UNIT IX - Planning and Preparing to Maintain Computer


Systems and Networks
LESSON 1: Planning and Preparing for Maintenance

Introduction

Troubleshooting is an approach to locate the cause of faults in a computer system. Not all
troubleshooting experiences are the same since technicians acquire this skill based on their
knowledge and personal experience.

That is why as a computer technician, you must be knowledgeable in the fundamentals of the


computer concepts since your approach to solving a problem may rely heavily on your own
knowledge.

TOPIC 1: Preventive Maintenance


Preventive maintenance is the regular and systematic inspection, cleaning, and replacement of worn
parts, materials, and systems. 

It is done to prevent failure of parts, materials, and systems by regularly checking whether all parts
are in good working order.

Purpose of Preventive Maintenance

Preventive maintenance reduces the probability of hardware or software problems by


systematically and periodically checking hardware and software to ensure proper operation. 
Regular preventive maintenance ensures minimal system failure. When there are fewer failures,
less troubleshooting will be done, thus, saving an organization time and money. Preventive
maintenance can also be done by upgrading certain hardware or software such as a hard drive that
is making a noise, upgrading insufficient memory, and installing new software updates for security
and reliability.

TOPIC 2: Conducting Maintenance


First and foremost, maintenance is important in reducing hardware and software issues. With this,
computer downtime and repair costs are reduced.

Preventive maintenance depends on the needs and specifications of the equipment. For example, a
device exposed to a dusty environment such as a construction site would need more maintenance as
compare to an office environment. 

High traffic networks such as those used in schools would require more extensive scanning and
removal of malicious software and unwanted files.

Do take note that it is important to create documentation for any type of preventive maintenance, so
that you can also check how often do certain hardware and software issues occur.

175
Besides these, here are more reasons why maintenance should be conducted:

Increased data protection


Extended device life
Increased equipment stability
Reduced repair costs
Reduced equipment failure
Hardware Maintenance
Maintenance for computer hardware can be done by regularly checking cables, components, and
peripherals.
Regular cleaning of components should also be done to reduce overheating. Replacement of
damaged components due to excessive wear should also be conducted. 
The following is a guide on conducting hardware maintenance:
Remove dust from fans.
Remove dust from the power supply.
Remove dust from components inside the computer.
Clean the mouse and the keyboard.
Check cables.
Software Maintenance
Software maintenance can be done by making sure that updates are current. Follow the policies
when installing programs, operating system, and security updates. 
Testing is done to ensure that minimal problems will be encountered when updating the software
and hardware. 
Here are some simple tasks when conducting software maintenance:
Review and check security updates.
Review and check software updates.
Review and check driver updates.
Update anti-virus files.
Scan for viruses and malware.
Remove unused and unwanted programs.
Scan hard drives.
Defragment hard drives.
TOPIC 3: Troubleshooting
Although troubleshooting varies and can be modified depending on case and experience, it requires
an organized and logical approach when handling computers and components. Doing so will
ensure that the process is in systematic order. 
Make sure to ask the right questions, test the right hardware, and examine the correct data in order
to detect the issues and resolve them.
Troubleshooting is honed over time. Every time an issue is resolved, skills on troubleshooting are
also improved. Through troubleshooting experience, one would be able to know the steps needed to
resolve an issue quickly.
The following is a simple process guideline which can also be modified depending on the situation:
Explain the purpose of data protection.
Identify the root of the problem.
List probable causes of the issue.
Test the theory to determine the exact cause.
Plan the course of action to resolve the issue.
Implement the solution.
Check the system functionality.
If applicable, implement preventive measures.
Create documentation of findings, action, and outcomes.
TOPIC 4: Data Protection
Before troubleshooting, follow the necessary precautions in order to handle computer hardware and
software properly. 
Repairs such as hard drive replacement and operating system installation are very delicate and may
put computer data at risk. 
Make sure to prevent data loss when attempting repairs.
Practicing Caution
Data protection is one of the first steps of troubleshooting. 
Computer data must first be protected before starting any work on a client or customer’s computer. 
A technician can be blamed or held liable if data loss occurs because of improper data handling.
Backing Up Data
Backup is the copy of data on a computer or hard drive that is saved to an external media such as a
DVD, CD, or flash drive. 
In an organization, back-ups are routinely done—may it be daily, weekly, or on a monthly basis.
This is to ensure that the organization’s data are protected and are readily available.
If unsure whether a backup has been done, do not conduct troubleshooting activities on a client’s
computer. 
Make sure to verify the following with the customer first:
Date of last backup
Content of backup
Data integrity of the backup – Data integrity is the maintenance of the accuracy and consistency of
the data. It is making sure that the data can be properly retrieved or restored in its optimum quality.
Availability of backup media for data restoration
LESSON 2: Maintaining Computer Systems and Networks
Introduction
A properly maintained computer gives higher speeds, may it be via RAM or on the Internet,
regardless of hardware set-up and configurations. This lesson will give some tips on how to
maintain computer systems and networks over time.
TOPIC 1: Routine Maintenance
Clean browsers.
Use the computer’s Disk Cleanup Utility included in the Windows System. In the same way, you
can also download third party, freeware programs such as CCleaner to do the clean-up for you.
Search and delete spyware and viruses from the device.
Third party softwares like AVG Anti Virus can be used for maintenance. Or use the Windows
Security built in on Windows 10 devices.
Defragment the hard drive routinely to keep the device running smoothly. 

Uninstall programs that are no longer used. 


Delete files that are no longer needed. The freer space a computer has, the faster it will perform.
The computer’s performace will increase.
Remove startup programs.
Use the msconfig command in the RUN command prompt to open up a window that will allow you
to uncheck startup programs that are no longer used. 
Doing this will improve start up and boot down times a lot. Third party softwares such as CCleaner
can also be used for this purpose. 

Use your computer’s disk management systems.  


For Windows, select Performace and Maintenance. Choose “Rearrance items on your hard disk…”
and “Free up space on your hard disk.” Or simply run Disk Cleanup.

Maintenance Basics
How to Perform Disk Clean Up:
1. Start Menu > Programs > Accessories > System Tools > Disk Clean Up
2. Select Drive to Clean Up > Click Ok
3. Check all items that need to be removed > Click Ok

How to Clear Internet History


1. Start Menu > Settings > Control Panel > Click Internet Options
2. Click "Clear History"
3. Click Ok

How to Clear Internet "Temporary Internet" Files


1. Start Menu > Settings > Control Panel > Click Internet Options
2. Click "Delete Files"
3. Check "Delete All Offline Content"
4. Click Ok

How to Run Scan disk and Disk Defragmenter without Interruption:


1. Start Menu > Run > In Run, type "MSCONFIG", then click Ok MSCONFIG will appear.
2. Select "Selective Startup"
3. Uncheck "Load Startup Group Items". Click Ok.
4. Click Yes to Restart Computer Upon Restart.
5. Start Menu > Settings > Control Panel > Click Display
6. Select the "Screen Saver" tab.
7. Change the Screen Saver Drop menu to "None". Click Ok.
Then Perform Scan Disk,
Start Menu > Programs > Accessories > System Tools > Scan Disk
After Scan Disk, Perform Disk Defragmenter
Start Menu > Programs > Accessories > System Tools > Disk Defragmenter > Select which disk to
Defragment. Click Ok.
After Disk Defragmenter
Start Menu > Run > In Run, type "MSCONFIG", click Ok. MSCONFIG will appear. Select
"Normal Start Up', click Ok. Click Yes to Restart Computer Upon Restart
Start Menu > Settings > Control Panel > Click Display
Select the "Screen Saver" tab.
Change the Screen Saver Drop menu to "None". Click Ok.
TOPIC 2: Tips on Maintaining Hardware
(1) Always run your computer on an Uninterruptible Power Supply (UPS). 
It is an electrical apparatus that gives emergency power when a computer’s main power fails. This
will help protect the device from electric surges. Phone lines for modems and cat 5 or cat 6 network
lines also need surge suppression as they can and will take out your network card or modem in an
electric storm.

(2) Open up your computer.

Dust can accumulate in your computer in less than a year, depending on how dusty your house.
Check every few months. 
Make sure to follow proper computer assembly and disassembly.
(3) Be careful when plugging peripherals to the computer.

Ports can be easily damaged when mishandled. These repairs can be quite costly.

You might also like