CSS 11 - Week 1
CSS 11 - Week 1
Servicing NCII
MODULE 1:
Install and Configure
Computer Systems
Table of Contents
Quarter 1
Learning Outcome 1 Assemble computer hardware
Self-Scheck/ Task Sheet
Learning Outcome 2. Prepare Installer
Self-Scheck/ Task Sheet
Quarter 2
Learning Outcome 3. Install operating system and drivers for
peripherals/ devices
Self-Scheck/ Task Sheet
Learning Outcome 4. Install application software
Self-Scheck/ Task Sheet
Learning Outcome 5. Conduct testing and documentation
Self-Scheck/ Task Sheet
Post-Test ………………………………………………… 70
Key to Answers ………………………………………………… 76
References ………………………………………………… 79
TO THE STUDENT
Greetings!
This module contains training materials and activities for you to finish. You are
required to go through a series of learning activities. If you have questions, don’t
hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills,
behavior and motivations required in Installing and Configuring Computer Systems
that is in line with the industry standards. You need to complete this module before
you can perform the next module.
The unit of competency, “Install and Configure Computer Systems“, is one of the
competencies of Computer Systems Servicing NCII, a course which comprises
knowledge, skills and attitudes required for a trainee to possess.
In this module, you are required to go through a series of learning activities in order
to complete each learning outcome. In each learning outcome are Information Sheets,
Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities
on your own. If you have questions, do not hesitate to ask for assistance from your
teacher.
Remember to:
• Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are
included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there to
support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job.
Make sure you practice your new skills during regular work shifts. This way, you
will improve your speed, memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with
essential Knowledge, Skills, and Attitude in performing the tasks on Computer System
Servicing which will lead you to acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills
and understanding through step-by-step procedures and helpful techniques that will guide
you on how to install and configure computer systems. Furthermore, applications to real
life situations are also included for lifelong learning.
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
4. Is the hardware in a computing device where the operating system (OS), application
programs and data in current use are kept so they can be quickly reached by the
device's processor.
a. RAM
b. Operating system
c. CPU
d. HDD
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
CPU-Central processing unit; the brain of the computer; controls the other elements
of the computer
Disk Drive-A peripheral device that reads and/or writes information on a disk
Hard Drive-A device (usually within the computer case) that reads and writes
information, including the operating system, program files, and data files
Modem-A peripheral device used to connect one computer to another over a phone
line
Monitor-A device used to display information visually
Printer-A peripheral device that converts output from a computer into a printed image
Browser-A program used to view World Wide Web pages, such as Netscape
Navigator or Internet Explorer
Internet-A network of computer networks encompassing the World Wide Web, FTP,
telnet, and many other protocols
URL-Uniform resource locator; the address of a site on the World Wide Web; a
standard way of locating objects on the Internet
Window-A screen in a software program that permits the user to view several programs
at one time
What I Need To Know?
Read Information Sheet No 1.1-1 and find out how much you can
remember. Do Self-Check 1.1-1 to know how much you have learned.
Learning Objectives:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing, installing and
testing of computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the environment.
During installation and initial test, careful planning and preparation are to be done.
To avoid personal injury and damages to wiring due to sharp pins on connectors and
printed circuit assemblies, rough chassis edges and corners, and hot components.
o Before starting the installation, read carefully the documentation and procedures
on any hardware and software settings that may be required.
o Failure to do the proper jumper setting may cause damage to your CPU.
o Without an effective cooling fan, the CPU can overheat and cause damage to both
CPU and the motherboard.
o Each bank must have the same size and type of memory installed in pairs.
o Before adding and removing any other system components, make sure that you
unplug your power supply. Failure to do so may cause damage to your
motherboard and in the system component.
o Test the computer, ensuring that it meets the necessary system requirements
before booting up.
o If the computer does not pass any of the power on self-test (POST), the computer
will receive an irregular power on self-test. An irregular POST is a beep code
which is different from the standard beep which can either be no beeps at all or a
combination of different beeps.
EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact on the
labor force, health risks, and the impact on the environment.
1. Violation of Privacy
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back. Computer users can protect themselves from
these health risks through proper workplace design, good posture while at the computer,
and appropriately spaced work breaks. Another health risk, called computer addiction,
occurs when someone becomes obsessed with using the computer. Once recognized,
computer addiction is a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these
unsuspecting, innocent computer users have fallen victim to crimes committed by
dangerous strangers. Protect yourself and your dependents from these criminals by being
cautious. For example, do not share information that would allow others to identify or
locate you.
5. Impact on Environment
A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the statement
is correct and FALSE if the statement is wrong.
1. Failure to do the proper jumper setting may cause damage to your CPU.
2. After adding and removing any other system components, make sure that
you unplug your power supply.
3. Test the computer, ensuring that it meets the necessary system
requirements before booting up.
4. With an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
5. After starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.
B. MATCHING TYPE
Direction: Select your answer on the choices below that will correspond on the
statement. Write the letter of your answer on the space provided.
A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force