SlideShare a Scribd company logo
GOVERNMENT PROPERTY
NOT FOR SALE
ALLOTTED TO
District/ School: _________________________________________
Division _________________________________________________
First Year of Use: _________________________________________
Source of Fund (Year included):__________________________
Basic Education Curriculum
TECHNOLOGY AND LIVELIHOOD
EDUCATION
Information and Communications
Technology
Learner’s Material
Computer Hardware Servicing
ii
Department of Education
Republic of the Philippines
Computer Hardware Servicing –Grade 10
Learner’s Material
First Edition, 2014
ISBN: ___________
Republic Act 8293, section 176states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office wherein the
work is created shall be necessary for exploitation of such work for profit. Such agency or office may,
among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this book are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Published by the Department of Education
Secretary: Br. Armin A. Luistro FSC
Undersecretary: Dina S.Ocampo, Ph.D.
Assistant Secretary: Lorna Dig Dino, Ph.D.
Printed in the Philippines by ____________
Department of Education-Instructional Materials Council Secretariat(DepEd-IMCS)
Office Address: 2nd
Floor Dorm G, Philsports Complex, Meralco Avenue,
Pasig City, Philippines 1600
Telefax: (02) 634-1054, 634-1072
E-mail Address: imcsetd@yahoo.com
Development Team of the Learner’s Material
Authors:
Rosalie P. Lujero
Teacher III / School ICT Coordinator
Dasmariñas East National High School
Ronaldo V. Ramilo
Education Program Specialist
Division of Tanauan
Michael Angelo C. Gatchalian
Teacher III / School ICT Coordinator
Dagupan City National High School
Editors: Joemar A. Garraton
Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas
Illustrator and Layout Artists:
Subject Specialist: Owen M. Milambiling
Management Team: Dr.Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Mariñas,
Dr. Jose D. Tuguinayo, Jr.
iii
TABLE OF CONTENTS
Module 1: PERSONAL ENTREPRENUERIAL COMPETENCIES (PECs)
Introduction ………………….……………………………………. 1
Objectives …………………………………………………………. 2
Pre-Assessment ………………………………………………….. 3
Learning Goals and Target …….………………………………
Reading Resources and Instructional Activities ………………
4
4
What to Know…………………………………………………….. 6
Assessment of PECs vis-à-vis Entrepreneur .………………..
What to Process.……………………………………………..….
6
7
What to Reflect and Understand ……………………………… 9
What to Transfer ………..……………………………………… 12
Module 2: ENVIRONMENT AND MARKET (EM)
Introduction ………………….……………………………………. 14
Objectives …………………………………………………………. 15
Pre-Assessment ………………………………………………….. 15
Learning Goals and Target …….………………………………..
Reading Resources and Instructional Activities ………………
What to Know ……………………………………………………
Product Development ………………………………………
Concept of Developing Product ………………………….
Finding Value ………………………………………………
Innovation ………………………………………………….
Unique Selling Proposition………………………………..
What to Process………………………………………………….
What to Reflect and Understand ………………………………
What to Transfer…………………………………………………
What to Know …..…………………………………………………
18
19
19
19
22
22
23
23
24
25
26
27
iv
Generating Ideas for Business …………………………..
Key Concept of Selecting a business Idea ……………..
Branding ……………………………………………………
What to Process.………………………………………………………….…..
What to Reflect and Understand ...………………………………………..
What to Transfer …………………………………………………………...
27
29
30
31
33
34
Module 3: CONFIGURING COMPUTER SYSTEMS AND NETWORK
Introduction ………………………………………………………
Learning Competencies / Objectives ………………………… -
Pre-Diagnostic / Assessment …………………………………. -
Reading Resources / Instructional Activities ……………….. -
Plan and Prepare for Configuration of Computer
Systems and Networks ……………….. -
What to Know …………………………………………………… -
Safety Procedures…………………………………….. -
General Safety Guidelines ………………………….. -
Fire Safety Guidelines ……………………………….
What to Process ………………………………………………..
Peer to Peer Activity …………………………………
What to reflect / Understand ………………………………….
Research and Investigation …………………………
What to Transfer ………………………………………………..
Role Playing …………………………………………...
What to Know ……………………………………………………
Prepare Tools Used for Configuration …………….
Structure of the Registry …………………………….
What to Process ………………………………………………..
MS Configuration and Command Classification …
Applet Grouping ……………………………………..
36
37
38
43
43
43
43
44
44
44
45
45
46
46
47
47
48
48
53
56
56
57
v
What to Reflect / Understand …………………………………
Research and Explore ……………………………..
What to Transfer ……………………………………………….
Oral Presentation …………………………………….
What to Know …………………………………………………..
Procedure in Using Computer System
Configuration Tools…………………………………..
What to Transfer ………………………………………………..
Windows registry Backup and Recovery……….
Reading Resources / Instructional Activities…………… Configure
What to Know ……………………………………………….
Safety Precautions related to Networks ………
Fiber-Optic Safety ……………………….
Chemical …………………………………
Tools ………………………………………
Glass Shards ……………………………
Harmful Light ……………………………
What to Know ………………………………………………
Networking Devices, Media and Connector ……
Common Network Cables ………………………
Twisted Pair ………………………………………
Category Rating …………………………………
Coaxial Cable …………………………………
Fiber-Optic Cable …………………………………
Creating Ethernet Cable …………………………
What to Process……………………………………………
Criss-Cross Puzzle…………………………….
What to Reflect / Understand ………………………….
What to Transfer…………………………………………
Create Your Own Ethernet Cable…………….
58
59
60
60
61
61
68
68
82
83
83
84
84
84
84
85
85
85
85
86
87
87
88
89
93
93
94
96
96
vi
What to Know……………………………
Internet Protocols……………………….
IP Addressing……………………………..
Subnet Mask……………………
IpConfig……………………
How to Assign IP Address……………
Ping…………………………………….
What to Process………………………………
Protocols……………………………………………..
Identify IP Address Classes………………………..
What to Reflect / Understand………………………
Reflection on the Video Presentation……
What to Transfer……………………
Configure an Ethernet NIC to use DHCP……
Configure Wireless Router………
What to Know…………………………….
Peer to Peer Network……………………………
Peer to Peer Network in Windows XP……………
Peer to Peer Network in Windows 7……………..
Client/ server Network …………………………….
What to Process………………………
What to reflect/understand ………………..
What to Transfer……………………
What to Know………………………………
Network Security…………………………
Security Attacks………………………….
Virus, Worms, and Trojan Horses………………….
Security Procedure…………………………
Data Encryption……………………….
Port Protection………………………
98
98
100
102
102
104
108
111
111
112
112
113
114
114
120
123
123
124
128
134
136
136
140
141
141
142
142
143
144
145
vii
How to Enable Windows 7 Firewall……………..
Wireless Security Techniques…………………
What to Process………………………
Short Quiz…………………………
What to reflect / Understand …………
What to Transfer………………
Configure Windows XP Firewall………….
What to Know……………………………
File Printer Sharing…………………….
Printer Sharing…………………………….
What to Process………………………………………
Essay Writing ………………………
What to Reflect……………………………..
Read and Examine……………………..
What to Transfer…………………………………………
Share Folder, Printer and Set Share Permission…
Reading Resources / Instructional Activities
Inspect and Test Configured Computer System
And Network………………………………………
What to Know………………………………
Safety Precautions…………………………
Accident Reports ……………………….
Hazardous Substances………………………..
Fire Exits…………………………………..
Fire Safety Procedure……………………
Personal Safety While Working with PCs………….
What to Know………………………………..
Guidelines for Testing Configured Computer
System and Network…………………………..
Testing Your Computer Network …………………
147
148
150
150
151
152
152
157
157
159
161
161
161
161
162
162
170
171
171
172
173
173
173
174
174
174
174
viii
Writing a Technical Report on Test Conducted …..
What to Transfer…………………………………………
Test the Wireless NIC……………………………..
Summative Test …………………………………………….
Module 4: MAINTAINING COMPUTER SYSTEMS AND NETWORK
Introduction ………………………………………………….
Learning Competencies / Objectives………………………..
Pre – Diagnostic / Assessment………………………………
Skills Test
Reading Resources / Instructional Activities…………………
Procedure in Planning and Conducting
Maintenance
Preventive Maintenance…………………………….
Maintenance Procedure……………………………
What to Know…………………………………………………..
Diagnosis and Identification of Faulty Computer and
Networks
Preventing Computer System Failure ……………….
Network Problems ………………………………..……
What to Process…………………………………………………..
Slide Show of Computer and Network Errors
What to Reflect / Understand……………………………………
Pictorial Tour
What to Transfer…………………………………………………
Video Demo
What to Know………………………………………………………
Maintain Computer and Network System Some Downloada
What to Process……………………………………………….
176
177
177
182
187
188
190
191
191
192
196
199
203
203
204
204
207
ix
What to Reflect / Understand……………………………………
Investigative Report
What to Transfer………………………………………………..
Magazine Article
What to Know………………………………………………………
Computer Specification
Understanding Computer Specification
What to Process…………………………………………………..
Internet Research
What to Reflect / Understand……………………………………
Making Checklist
What to Transfer…………………………………………………
Computer Specifications
What to Know………………………………………………………
Networking Hardware Requirements
What to Process…………………………………………………..
Network Layout
What to Reflect / Understand……………………………………
Critical review
What to Transfer…………………………………………………
Computer Shop Network Layout
Reading Resources / Instructional Activities
Maintaining Computer System ……………………………….
What to Know………………………………………………………
Maintenance of Computer System……………………
Data Backup………… ………………………………… Wh
Malware Maintenance/Disk Maintenance……………
What to Process…………………………………………………..
Essay activity
What to Reflect / Understand……………………………………
208
208
209
214
215
216
217
220
221
221
223
224
224
225
228
229
230
x
Research and Investigate
What to Transfer…………………………………………………
Demonstration
What to Know………………………………………………………
Diagnosis and Identification of Faulty System
What to Process…………………………………………………
Critical Review
What to Reflect / Understand……………………………….
Slide Show Presentation
What to Transfer…………………………………………………
Video Tutorials
Inspect and Test Conf
What to Know………………………………………………………
Diagnostic Software Tools
Procedure in Cleaning Hardware Components
Cleaning Tools
What to Process…………………………………………………
Ways To Improve Your Computer Performance
To Defragment Your Hard Disk.
How to Defragment Your Computer Hard Drive
Cleaning Windows Registry
Organizing Disk Drive Partition.
What to Reflect / Understand…………………………….…….
Evaluating Your Needs
What to Transfer………………………………………………….
Defragmentation Issue
What to Know………………………………………………………
Understanding Partitions
Making a Disk Image Backup
230
231
238
238
239
240
253
258
258
259
xi
What to Process……………………………………………………………
Duplication – Disk Image backup
What to Reflect / Understand…………………………….…………..….
Critical Review
What to Transfer……………………………………..…………….…….
Online Review
What to Know…………………………………………………….………
How to Scan Disk
What to Process…………………………………………………….……
How to Run Scan Disk in Windows 2000 and Windows XP
How to Run Scan Disk in Windows Vista
Run Scan Disk on Windows 7
Run CHKDSK Using GUI
Run CHKDSK from the DOS Command Prompt
What to Reflect / Understand………………………………….….…….
What to Transfer……………………………………..…………….…….
Concept Mapping
Scan Flash Drive
What to Know……………………………………………………………..
Delete Temporary Files
Unused Software Application
What to Process………………………………………………….………
Temporary Internet Files
Windows Temporary Files
What to Reflect / Understand………………………………….….…….
Computer Terminologies
What to Transfer…………………………………………….…………..
Deleting Temporary Files
What to Know……………………………………………………………..
Disk Cleanup
260
263
264
264
265
267
267
268
269
270
271
271
xii
What to Process…………………………………………….
Remove Unnecessary Startup Programs
What to Reflect / Understand………………………………….….………
Internet Research
What to Transfer…………………………………………….……………..
Activity
Maintain Network Systems ………………………………………………
What to Know………………………………………………………………
Procedure on how to maintain Computer System and Networks
Perform computer maintenance task regularly
General Safety
Electrical Safety
Fire Safety
What to Process………………………………………………..……………
Maintenance Inspection Checklist
What to Reflect / Understand………………………….………….….…….
Video Tutorial
What to Transfer…………………………………..…………….…………..
Weekly Maintenance Checklist
What to Know………………………………………………….…………….
Burn-In Testing
Standard Scripts
What to Process…………………………….……………………………….
Performing Immediate Burn- in Testing
Reading Resources / Instructional Activities
Inspect Computer Systems and Networks……………………….
What to Know……………………………………………………….……..
Maintenance of the Computer System and Networks
What to Process…………………………….……………………………….
Testing Demonstration
272
274
275
277
277
284
284
284
285
286
291
293
294
xiii
What to Reflect / Understand………………………….………….….…….
Network Diagnostics for Windows XP Tool
What to Transfer…………………………………..…………….…………..
Schedule and Techniques in Maintaining Systems
What to Know………………………………………………………………
Network Monitoring
What to Process……………………………………………………………
Testing Network Configuration
What to Reflect / Understand………………………….………….….…….
Practicing TCP/IP Networking Skills
What to Transfer…………………………………..…………….…………..
Network Checking
What to Know………………………………………………………………
Computer Communications
Methods of Connection Commonly Used
How Network Works- Computer in network
What to Process……………………………………………………………
Set Up a DSL or cable connection
What to Reflect / Understand………………………….………….….…….
Video Tutorial
What to Transfer…………………………………..…………….…………..
Network Connection Demo
What to Know……………………………………………….……………….
Identify Safety Procedures and Potential Hazards for Users and
Technician
Preparing Technical Reports
What to Process……………………………………………………………
Simple Technical Reports
What to Reflect / Understand………………………….………….….…….
Computer Item Enumeration
294
294
298
299
301
302
303
305
306
307
308
310
312
xiv
What to Transfer…………………………………..…………….…………..
Computer Hardware- Software Tools Report
Summative Test ……………………………………………………………...
References ……………………………………………………………………
Glossary ……………………………………………………………………….
312
313
317
319
1
Module 1
Personal Entrepreneurial Competencies (PECs)
Content Standards Performance Standards
The learner demonstrates
understanding of one’s PECs in
Computer Hardware Servicing.
The learner independently creates a
plan of action that strengthens
and/or further develops his/her
PECs in Computer Hardware
Servicing.
Quarter I Time Allotment: 4 hours
In this module, you will learn more about entrepreneurship and the
entrepreneurial competencies related to Computer Hardware Servicing. You
will have a first-hand experience in educational activities leading to
assessment of your personal entrepreneurial competencies (PECs) and the
entrepreneurial competencies of a successful computer technician within your
province. You will also have several activities that will align your
competencies with those of successful practitioners. Moreover, this module
will encourage you to think about entrepreneurship and its role in the
business community as well as in the economic and social development of an
individual.
To start with this module, let us first understand entrepreneurs and
entrepreneurship.
Entrepreneurs are those with the skills and capabilities to see and
evaluate business opportunities. They are individuals who can strategically
identify products or services needed by the community, and have the capacity
to deliver them at the right time and at the right place.
Entrepreneurs are agents of economic change; they organize,
manage, and assume risks of a business. Some of the good qualities of
entrepreneurs are: opportunity-seeker, risk-taker, goal-setter, excellent
planner, confident problem-solver, hardworking, persistent and committed.
2
Entrepreneurship, on the other hand, is not just a simple business
activity but a strategic process of innovation and new product creation.
Basically, entrepreneurship is both an art and science of converting business
ideas into marketable products or services to improve the quality of living.
Now that you have background knowledge about entrepreneurs and
entrepreneurship, you can now walk through in assessing your PECs. Always
remember that successful entrepreneurs continuously develop and improve
their PECs.
To begin, let us find out the competencies you will have gained upon
completion of this module.
At the end of this module, you are expected to:
 identify areas for improvement, development, and growth,
 align your PECs according to your business or career choice, and
 create a plan of action that ensures success in your business or career
choice.
Now try to take the first challenge in this module, the pre assessment.
As part of your initial activity, try to assess your prior knowledge and
experience related to personal entrepreneurial competencies. Answer Task 1.
Task 1: Matching Type
Directions: Match the entrepreneurial competencies in column A with their
meaning in column B. Write the letter of the correct answer on the space
provided before each number.
A B
____1. Creative A. makes wise decisions towards the set
objectives
____2. Profit-oriented B. strategic thinking and setting of goals
____3. Disciplined C. trusting in one’s ability
Pre-assessment
assessmentObjectives
3
____4. Sound decision maker D. adoptable to change
____5. Possess people skills E. innovates to have an edge over other
competitors
____6. Excellent Planner F. solid dedication
____7. Confident G. skillful in record keeping
____8. Hardworking H. always sticks to the plan
____9. Ability to accept change I. work diligently
____10. Committed J. effective and efficient communication
skills and relates well to people
K. always looking for an opportunity to
have/earn income.
Task 2: Guide Questions
Directions: The following are guide questions which covers the entire
module. Write your answers on your assignment notebook. Discuss / share
these to the class.
A. Explain why entrepreneurial activities are important to social
development and economy progress.
B. What entrepreneurial activities related to Computer Hardware
Servicing do you know and are capable of doing?
C. If you were given the opportunity to own a business that relates to
Computer Hardware Servicing, do you think you will be confident to
manage it? Explain your answer.
D. What do you think are the most important competencies one must
possess in order to be successful in running a chosen business?
E. Name successful entrepreneurs from your province whose businesses
are related to Computer Hardware Servicing. Make sure you will be
able to share with the class the PECs that made them successful.
4
After all the guide questions are answered, share these with your
classmates. You may also compare your insigths, personal knowledge,
and relevant experiences on the topic to make the sharing more exciting
and engaging.
Learning Goals and Targets
After understanding the objectives of this module, having gone through
pre-assessment, and answering the guide questions, you will be asked to set
your own personal goals and targets. These goals and targets will urge you to
further achieve the ultimate objective of this module. In the end, these
ultimate goals will motivate you to learn more about PECs.
Figure 1: Strategic process to achieve the objectives of this module
Reading Resources and Instructional Activities
After setting your own personal goals and targets in achieving the
objectives of this module, check your inherent knowledge of PECs. Answer
the following guide questions with the help of your classmates.
Task 3: Group Activity
Directions: Answer the following guide questions on a separate sheet of
paper. Share your answers with the class.
1. Explain the importance of assessing one’s PECs before engaging in a
particular entrepreneurial activity.
_________________________________________________________
_________________________________________________________
________________________________________________________.
Goals and
Targets
Learning
Activities
Ultimate Goal
5
2. Are there other strategies or approaches where you can assess your
PECs? Explain how these strategies will become more useful in
selecting a viable business venture.
_________________________________________________________
_________________________________________________________
________________________________________________________.
3. What are the desirable personal characteristics, attributes, lifestyles,
skills, and traits of a prospective entrepreneur? Why are these
important?
_________________________________________________________
_________________________________________________________
________________________________________________________.
4. Why is there a need to assess one’s PECs in terms of characteristics,
attributes, lifestyles, skills, and traits before starting a particular
business?
_________________________________________________________
_________________________________________________________
________________________________________________________.
5. What is the significance of evaluating PECs of a successful
entrepreneur? What helpful insights can you draw from this activity?
________________________________________________________
________________________________________________________
________________________________________________________.
How was your experience in answering the guide questions with your
classmates? Were you able to benefit from them? What were the insights you
have realized?
This time you’re going to study the different topics that will enrich your
knowledge of PECs. Read all the important details about the succeeding
topic carefully.
6
Assessment of Personal Entrepreneurial Competencies (PECs) and
Skills vis-à-vis a Practicing Entrepreneur in a Province
Entrepreneurial competencies refer to the important characteristics that
should be possessed by an individual in order to perform entrepreneurial
functions effectively. In this module, you will learn some of the most important
characteristics, attributes, lifestyle, skills and traits of a successful
entrepreneur or an employee to be successful in a chosen career.
Below are few important characteristics / traits / attributes of a good
entrepreneur:
 Hardworking: One of the important characteristics of a good
entrepreneur is hardworking. This means working diligently and
being consistent about it. Hardworking people keep improving their
performance to produce good products and/or provide good
services.
 Confident: Entrepreneurs have self-reliance in one’s ability and
judgment. They exhibit self-confidence to cope with the risks of
operating their own business.
 Disciplined: Successful entrepreneurs always stick to the plan
and fight the temptation to do what is unimportant.
 Committed: Good entrepreneurs assume full responsibility over
their business. They give full commitment and solid dedication to
make the business successful.
 Ability to accept change: Nothing is permanent but change.
Change occurs frequently. When you own a business, you should
cope with and thrive on changes. Capitalize on positive changes
to make your business grow.
 Creative: An entrepreneur should be creative and innovative to
stay in the business and in order to have an edge over the other
competitors.
7
 Has the initiative: An entrepreneur takes the initiative. You must
put yourself in a position where you are responsible for the failure
or success of your business.
 Profit-oriented: An entrepreneur enters the world of business to
generate profit or additional income. The business shall become
your bread and butter. Therefore, you must see to it that the
business can generate income.
Listed below are the important skills of a successful entrepreneur:
 Excellent planner: Planning involves strategic thinking and goal
setting to achieve objectives by carefully maximizing all the
available resources. A good entrepreneur develops and follows the
steps in the plans diligently to realize goals. A good entrepreneur
knows that planning is an effective skill only when combined with
action.
 Possesses people skills: This is a very important skill needed to
be successful in any kind of business. People skills refer to
effective and efficient communication and establishing good
relationship to the people working in and out of your business. In
day-to-day business transactions, you need to deal with people. A
well-developed interpersonal skill can make a huge difference
between success and failure of the business.
 Sound decision maker: Successful entrepreneurs have the ability
to think quickly and to make wise decisions towards a
pre-determined set of objectives. No one can deny that the ability
to make wise decisions is an important skill that an entrepreneur
should possess. Sound decisions should be based on given facts
and information and lead towards the pre-determined objectives.
To firm up what you have learned and have a better appreciation of the
different entrepreneurial competencies, read the PECs checklist below, then
answer the same.
8
Task 4: PECs Checklist
Directions: Using the PECs checklist, assess yourself by putting a check
( ) mark in either strengths or development areas column. Interpret the
results by counting the total number of check marks in each of the columns.
After accomplishing the checklist, form a group and share your insights on the
result of the personal assessment.
Table 1: PECs Checklist
Personal Entrepreneurial Competencies
(PECs) of an Entrepreneur
Personal Assessment in terms
of:
Strengths Development
Areas
Hardworking
- Works diligently
Confident
- Self-reliance in one’s ability
Disciplined
- Always stick to the plan
Committed
- Solid dedication
Ability to accept changes
- Adaptable
Creative
- Innovative to have edge over other
competitors
Profit-oriented
- Always looking for an opportunity to
have/earn income
Excellent planner
- Strategic thinking and setting of
goals
9
Possess people skill
- Effective and efficient communication
skills and relates well to people
Sound decision maker
- Makes wise decisions towards the
set objectives
TOTAL
Interpretation or Insight:
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
_________________________________________________.
How was your experience in discovering the strengths and the areas
you need to develop? Did you gain a valuable experience in exchanging
insights with your classmates? To learn more and deepen your understanding
of PECs, do task 5 below.
Task 5: Interview
Directions: In your province, interview a successful computer technician or
entrepreneur whose type of business is related with computer hardware
servicing. Focus your questions on PECs and other business-related
attributes that helped them become successful. Analyze the results of the
interview and reflect on the similarities and/or differences. Write your answer
on a separate sheet of paper.
10
Sample Interview Guide
Name of Proprietor/Practitioner: ____________________________________
Age: _______________ Number of Years in Business: _________________
Business Name: ________________________________________________
Business Address: ______________________________________________
1. What preparations did you make before you engaged in this type of
business or job?
________________________________________________________
________________________________________________________
_______________________________________________________.
2. What special skills and characteristics do you have that are related
with your business or job?
________________________________________________________
________________________________________________________
_______________________________________________________.
3. How did you solve business-related problems during the early years of
your business operation?
________________________________________________________
________________________________________________________
_______________________________________________________.
4. Did you follow the tips from a successful businessman or practitioner
before you engaged in your business?
________________________________________________________
________________________________________________________
_______________________________________________________.
5. What best business practices can you share with aspiring
entrepreneurs?
________________________________________________________
________________________________________________________
_______________________________________________________.
6. What do you think are the salient characteristics, attributes, lifestyle,
skills and traits that made you successful in your business or job?
________________________________________________________
________________________________________________________
______________________________________________________.
11
Directions: Copy the tables below in your notebook or in a separate sheet of
paper. Gather the needed information from the interview to supply answer/s
to row 1 in the table below, after which, fill out the second row with your
PECs.
Personal
Entrepreneurial
Competencies
Characteristics Attributes Lifestyles Skills Traits
Successful
Entrepreneur in
the province
My PECs
Using the information on the table above, analyze and reflect on the
similarities and differences in your answers. Put your reflection on the table
you copied in your notebook or in a separate sheet of paper. Write your
conclusion on the space provided.
Personal
Entrepreneurial
Competencies
Similarities Differences
Characteristics
Attributes
Lifestyles
Skills
Traits
12
Conclusion:
________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
_____________________________________________________________.
After performing the activities on the importance of PECs, let’s
determine how much you have learned. Perform task 6 to determine how well
you have understood the lesson.
Task 6: Preparation of a Plan of Action
Directions: Use in a separate sheet of paper / in your notebook the
information generated from task 5 (Interview) and prepare an action plan that
indicates alignment of your PECs to the PECs of a successful entrepreneur in
computer hardware servicing in your province.
Objective Area Activities Strategies
Time
Frame
Expected
Outcome
To align my
PECs with
the PECs of
a successful
entrepreneur
in Computer
Hardware
Servicing
Characteristics
Skills
Attribute
Traits
13
Task 7: Essential Questions
Directions: Read and study the following questions below. You may use a
separate sheet of paper or your notebook to write your answers.
1. Why is there a need to compare and align one’s PECs with the PECs
of a successful entrepreneur?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
_______________________________________________________.
2. How does your action plan help sustain your strong PECs and/or
address your development areas?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
_______________________________________________________.
3. What plan of action will you utilize to address your development areas?
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________
_______________________________________________________.
14
Module 2
ENVIRONMENT AND MARKET (EM)
Content Standards Performance Standards
The learner demonstrates
understanding of environment and
market in Computer Hardware
Servicing in one’s province.
The learner independently creates a
business vicinity map reflective of
potential market in Computer
Hardware Servicing in a province.
Quarter I Time Allotment: 4 hours
Aspiring entrepreneur need to explore the economic, cultural, and
social conditions prevailing in an area. Needs and wants of the people in a
certain area that are not met may be considered business opportunities.
Identifying the needs of the community, its resources, available raw materials,
skills, and appropriate technology can help a new entrepreneur seize
business opportunities.
To be successful in any kind of business venture, potential
entrepreneurs should look closely at the environment and market. They
should always be watchful of existing opportunities and constraints, and to
take calculated risks. The opportunities in the business environment are
factors that provide possibilities for a business to expand and make more
profit. Constraints, on the other hand, are factors that limit business growth,
hence reduce the chance of generating profit. One of the best ways to
evaluate opportunities and constraints is to conduct a Strengths,
Weaknesses, Opportunities and Threats (SWOT) Analysis.
SWOT Analysis is a managerial tool used to assess the environment. It
is used to gather important information which is then used in strategic
planning. Strengths and weaknesses are internal in an organization. They
relate to resources owned by an organization that you have control over and
also the extent of its marketing.
15
Opportunities and threats exist in the external environment.
Opportunities relate to the market, new technologies, and the external factors
such as government policies, climate, and trends. Threats replace what the
competitors are doing. It also includes legal and other constraints.
Now that you have read some important considerations to explore to
be successful in any business, you are now ready to explore more about the
environment and market.
To begin with, let’s find out the competencies that you will master as
you finish this module.
At the end of this module, you are expected to:
 identify what is of “value” to the customer,
 identify the customer to sell to,
 explain what makes a product unique and competitive,
 apply creativity and innovative techniques to develop marketable
products, and
 employ a unique selling proposition (USP) to a product and/or
service.
Now that you have an idea about the things you will learn, take the first
challenge in this module – the pre-assessment.
Task 1: Multiple Choice
DIRECTIONS: Choose the letter of the best answer. Write your answer on a
separate sheet of paper.
1. It is generated by examining the goods and services sold in the
community.
A. business creation C. business concept
B. business pricing D. business idea
2. It is a process of making new products which will be sold to the
customers.
Objectives
Pre-
16
A. product analysis C. product
development
B. product conceptualization D. product
implementation
3. These are luxuries, advantages and desires that every individual
considers beyond necessary.
A. wants C. requirements
B. desires D. needs
4. It is a factor or consideration presented by a seller as the reason that a
product or service is different from and better than that of the
competition.
A. unique selling plan C. unique pricing
policy
B. unique selling proposition D. finding value-added
5. A stage in which the needs of the target market are identified,
reviewed, and evaluated.
A. concept development C. project development
B. economic analysis D. refine specification
6. It is the introduction of new ideas to make the product and services
more attractive and saleable to the target customers.
A. new idea C. product development
B. creativity D. innovation
7. It is a managerial tool used to assess the environment and to gather
important information that can be used for strategic planning.
A. scanning C. WOTS Analysis
B. SWOT Analysis D. survey analysis
8. It is creating names, symbol, or designs that identifies and
differentiates a product from the other products.
A. product naming C. branding
B. unique selling proposition D. tagline
9. It is a meaningful and unforgettable statement that captures the
essence of the brand.
A. product naming C. branding
B. unique selling proposition D. tagline
10. These are things that people cannot live without.
A. wants C. requirements
B. desires D. needs
17
Task 2: Guide Questions:
Directions: Read and study the guide questions below. Use a separate
sheet of paper to write your answer.
1. How does one determine the product or services to be produced
and/or to be provided to the target customers?
________________________________________________________
________________________________________________________
________________________________________________________
2. How does one select an entrepreneurial activity?
________________________________________________________
________________________________________________________
________________________________________________________
3. When can one say that a certain product has “value?”
________________________________________________________
________________________________________________________
________________________________________________________
4. Does applying creativity to your product or services important? Why?
________________________________________________________
________________________________________________________
________________________________________________________
5. How can one effectively respond to the needs of the target customer?
________________________________________________________
________________________________________________________
________________________________________________________
6. From the viewpoint of business owner, discuss the importance of
scanning the environment and market in generating business ideas.
________________________________________________________
________________________________________________________
________________________________________________________
18
7. Using self-assessment, explain the level of your confidence in
formulating a business idea.
________________________________________________________
________________________________________________________
________________________________________________________
After all the guide questions are answered and skills have been
mastered, share insights/ideas with your classmates. Discuss your insights,
personal knowledge, and relevant experiences on the topic to make it more
exciting and engaging.
Learning Goals and Target
After reading and understanding the objectives of this module and
having gone through the pre-assessment and guide questions, you will be
asked to set your own personal goals. These goals will urge you to further
achieve the ultimate objective of this module. In the end, these goals will
motivate you to learn more about environment and market.
Figure 2: Strategic process to reach the objectives of this module
Goals and
Targets
Learning
Activities
Ultimate Goal
19
After setting your own personal goals and targets in achieving the
objectives of this module, you will have the opportunity to read and learn
more about environment and market. You will also be given a chance to do
practical exercises and activities to deepen your understanding of the topic.
Product Development
When we talk of product development, we are referring to a process of
making a new product to be sold by a business or enterprise to its customers.
Product development may involve modification of an existing product or
its presentation, or formulation of an entirely new product that satisfies a
newly-defined customer’s needs, wants and/or a market place.
The term development in this module refers collectively to the entire
process of identifying a market opportunity, creating a product to appeal to
the identified market, and testing, modifying, and refining the product until it
becomes ready for production.
There are basic, yet vital questions that you can ask yourself about
product development. When you find acceptable answers to them, you may
now say that you are ready to develop a product and/or render services.
These questions include the following:
1. For whom are the product/services aimed at?
2. What benefit will the customers expect from product/service?
3. How will the product/service differ from the existing brand? From
its competitor?
In addition, needs and wants of the people within an area should also
be taken into big consideration. Everyone has his/her own needs and wants.
However, each person has different concepts of needs and wants. Needs in
business are the important things that an individual cannot live without in a
society. These include:
1. basic commodities for consumption,
2. clothing and other personal belongings,
3. shelter, sanitation and health, and
4. education.
20
Basic needs are essential to an individual to live with dignity and pride
in a community. These needs can obviously help you generate business
ideas and subsequently to product development.
Wants are desires, luxury and extravagance that signify wealth and
expensive way of living. Wants or desires are considered above all the basic
necessities of life. Some examples of wants or desires are: fashion
accessories, expensive shoes and clothes, travels, eating in an expensive
restaurant, watching movies, concerts, having luxurious cars, wearing
expensive jewelry and perfume, living in impressive homes, among others.
Needs and wants of people are the basic indicators of the kind of
business that you may engage in because it can serve as the measure of
your success. Some other points that might be considered in business
undertakings are the kind of people, their needs, wants, lifestyle, culture and
tradition, and their social orientation.
To summarize, product development entirely depends on the needs
and wants of the customers. Another important issue to deal with is the key
concepts of developing a product. The succeeding topic shall enlighten you
about the procedure in coming up with a product.
Concepts of Developing a Product
Concept development is a critical phase in the development of a
product. In this stage, the needs of the target market are identified, and
competitive products are reviewed before the product specifications are
defined. The product concept is selected along with an economic analysis to
come up with an outline of how a product is being developed. Figure 3 shows
the stages of concept development of a product.
21
Figure 3: Stages of Concept Development
The process of product development follows the following stages:
1. Identify customer needs: Using survey forms, interviews, researches,
focus group discussions, and observations, an entrepreneur can easily
identify customers’ needs and wants. In this stage, the information that
can be possibly gathered are product specifications (performance, taste,
size, color, shape, life span of the product, etc.). This stage is very
important because it would determine the product to be produced or
provided.
2. Establish target specifications: Based on customers' needs and
reviews of competitive products, you can now establish target
specifications of the prospective new product and/or services. A target
specification is essentially a wish-list.
3. Analyze competitive products: It is imperative to analyze existing
competitive products to provide important information in establishing
product or service specifications. Other products may exhibit successful
design attributes that should be emulated or improved upon in the new
product or service.
4. Generate product concepts: After having gone through with the
previous processes, you may now develop a number of product
Concept
Development
Identify
Customer
Needs
Plan
Remaining
Development
Project
Establish
Target
Specifications
Generate
Product
Concepts
Select a
Product
Concept
Analyze
Competitive
Products
Refine
Specifications
Perform
Economic
Analysis
22
concepts to illustrate the types of products or services that are
technically feasible and will best meet the requirements of the target
specifications.
5. Select a product concept: Through the process of evaluation between
attributes, a final concept is selected. After the final selection, additional
market research can be applied to obtain feedback from certain key
customers.
6. Refine product specifications: In this stage, product or services
specifications are refined on the basis of input from the foregoing
activities. Final specifications are the result of extensive study, expected
service life, projected selling price among others are being considered in
this stage.
7. Perform economic analysis: Throughout the process of product
development, it is very important to always review and estimate the
economic implications regarding development expenses, manufacturing
costs, and selling price of the product or services to be offered or
provided.
8. Plan the remaining development project: In this final stage of concept
development, you can prepare a detailed development plan which
includes list of activities, necessary resources and expenses, and
development schedule with milestones for tracking progress.
Finding Value
People buy for a reason. There should be something in your product or
service that would give consumers a good reason to go back and buy more.
There must be something that will make you the best option for target
customers; otherwise, they have no reason to buy what you are selling. This
implies further, that you offer something to your customers that will make
them value your product or service.
The value you incorporate in your product is called value proposition.
Value proposition is a believable collection of the most persuasive reasons
why people should notice you and take the action you’re asking for. It is what
gets people moving, what makes people spend for your product or service.
23
Innovation
Innovation is the introduction of something new in your product or
service. This may be a new idea, a new method, or a new device. If you want
to increase your sales and profit, you must innovate. Some of the possible
innovations for your products are change of packaging, improvement of taste,
color, size, shape, and perhaps price. Some of the possible innovations in
providing services are application of new and improved methods, additional
featured services, and possibly freebies.
Unique Selling Proposition (USP)
Unique Selling Proposition is the factor or consideration presented by a
seller as the reason that one product or service is different from and better
than that of the competition. Before you can begin to sell your product or
service to your target customers, you have to sell yourself in it. This is
especially important when your product or service is similar to your
competitors.
USP requires careful analysis of other businesses' ads and marketing
messages. If you analyze what they say or what they sell, not just their
product or service characteristics, you can learn a great deal about how
companies distinguish themselves from competitors.
Here's how to discover your USP and how to use it to increase your sales and
profit:
 Use empathy: Put yourself in the shoes of your customers. Always
focus on the needs of the target customers and forget falling in love
with your own product or service. Always remember, you are
making/providing this product not for yourself but for the target
customers to eventually increase sales and earn profit. Essential
question such as what could make them come back and ignore
competition, should be asked to oneself. Most possible answers may
be focused on quality, availability, convenience, cleanliness, and
reliability of the product or service.
 Identify customer’s desires. It is very important for you to understand
and find out what drives and motivates your customers to buy your
product or service. Make some effort to find out, analyze and utilize the
information that motivates the customers in their decision to purchase
the product or service.
24
 Discover customer’s genuine reasons for buying the product.
Information is very important in decision making. A competitive
entrepreneur always improve their products or services to provide
satisfaction and of course retention of customers. As your business
grows, you should always consider the process of asking your
customers important information and questions that you can use to
improve your product or service.
To enhance your understanding of the topic previously presented, you
will be tasked to form a group and arrange an interview with a successful
entrepreneur or practitioner. You have to document this interview and present
this to the whole class for reflection and appreciation.
Task 3: Interview
Directions: Select a successful entrepreneur or practitioner. Conduct an
interview using the set of questions below. Document the interview and
present it to the class. Use a separate sheet of paper.
1. How did you identify your customers?
________________________________________________________
________________________________________________________
________________________________________________________
2. What were your considerations in selecting your customers?
________________________________________________________
________________________________________________________
________________________________________________________
3. Explain how your product or service became unique to other products.
________________________________________________________
________________________________________________________
________________________________________________________
4. Did you consult somebody before you engaged in this business?
Cite / give sample insights that you gained from the consultation.
________________________________________________________
________________________________________________________
________________________________________________________
25
5. What were your preparations before you started the actual business?
________________________________________________________
________________________________________________________
________________________________________________________
6. What creative and innovative techniques did you adapt in the
development of your product or service? What was the effect of the
innovative techniques to the sales and profits of your business?
________________________________________________________
________________________________________________________
________________________________________________________
7. What strategy did you consider to create a unique selling proposition to
your product or service?
________________________________________________________
________________________________________________________
________________________________________________________
Task 4: Browsing the Internet
Directions: To deepen your understanding of the lesson, perform the
following tasks:
1. Browse the internet and view the topics related to:
a. customers’ needs and wants
b. techniques in identifying customers’ needs and wants
c. creativity or innovations in products and services
d. unique selling proposition
e. product development
2. Prepare a short narrative report about these topics and discuss it to the
class. You can highlight the aspect that intensifies your knowledge of
product development.
26
Task 5: Product Conceptualization
Directions: In a separate sheet of paper or in your notebook. Develop your
own concept of your product or service by using the figures on this page. Use
bullets in every stage of product conceptualization in listing important key
ideas.
1. Identify
Customers Need
-
-
-
2. Target
Specifications
-
-
-
-
-
-
-
-
3. Analyze a
Competitive
Product
-
-
-
-
-
-
-
4. Generate Product
Concept
-
-
-
-
5. Select A product
Concept
-
-
-
-
-
-
6. Refine Product
Specification
-
-
-
-
-
7. Prepare a
Development Plan
-
-
-
-
-
-
-
-
27
Generating Ideas for Business
The process of developing and generating a business idea is not a
simple process. Some people come up with a bunch of business ideas that
are not really feasible. There are two problems that arise; first is the
excessive generation of ideas that can forever remain as a dreaming stage
and the second is when they don’t have ideas and don’t want to become
entrepreneurs.
The most optimal way is to have a systematic approach in generating
and selecting a business idea that can be transformed into a real business.
Here are some basic yet very important considerations that can be used to
generate possible ideas for business:
1. Examine existing goods and services. Are you satisfied with the
product? What do other people who use the product say about it? How
can it be improved? There are many ways of improving a product from the
way it is made to the way it is packed and sold. You can also improve the
materials used in crafting the product. In addition, you can introduce new
ways of using the product, making it more useful and adaptable to the
customers’ many needs. When you are improving the product or
enhancing it, you are doing an innovation. You can also do an invention
by introducing an entirely new product to replace the old one.
Business ideas may also be generated by examining what goods and
services are sold outside the community. Very often, these products are
sold in a form that can still be enhanced or improved.
2. Examine the present and future needs. Look and listen to what the
customers, institutions, and communities are missing in terms of goods
and services. Sometimes, these needs are already obvious and identified
right away. Other needs are not that obvious because they can only be
identified later on, in the event of certain development in the community.
For example, a province will have its electrification facility in the next six
months. Only by that time will the entrepreneur could think of electrically-
28
powered or generated business such as photo copying, computer service,
digital printing, etc.
3. Examine how the needs are being satisfied. Needs for the products
and services are referred to as market demand. To satisfy these needs is
to supply the products and services that meet the demands of the market.
The term market refers to whoever will use or buy the products or
services, and these may be people or institutions such as other
businesses, establishments, organizations, or government agencies.
There is a very good business opportunity when there is absolutely no
supply to a pressing market demand.
Businesses or industries in the locality also have needs for goods and
services. Their needs for raw materials, maintenance, and other services
such as selling and distribution are good sources of ideas for business.
4. Examine the available resources. Observe what materials or skills are
available in abundance in your area. A business can be started out of
available raw materials by selling them in raw form and by processing and
manufacturing them into finished products. For example, in a copra-
producing town, there will be many coconut husks and shells available as
“waste” products. These can be collected and made into coco rags or
doormats and charcoal bricks and sold profitably outside the community.
A group of people in your neighborhood may have some special skills that
can be harnessed for business. For example, women in the Mountain
Province possess loom weaving skills that have been passed on from one
generation to another. Some communities set up weaving businesses to
produce blankets, decorative, and various souvenir items for sale to
tourists and lowlanders.
Business ideas can come from your own skills. The work and experience
you may have in agricultural arts, industrial arts, home economics, or ICT
classes will provide you with business opportunities to acquire the needed
skills which will earn you extra income should you decide to engage in
income-generating activities. With your skills, you may also tinker around
with various things in your spare time. Many products are invented this
way.
29
5. Read magazines, news articles, and other publications on new
products and techniques or advances in technology. You can pick up
new business ideas from magazines such as Newsweek, Reader’s Digest,
Business Magazines, “Go Negosyo”, Know About Business (KAB)
materials, and Small-Industry Journal. The Internet also serves as a
library where you may browse and surf on possible businesses. It will also
guide you on how to put the right product in the right place, at the right
price, and at the right time.
Key Concepts of Selecting a Business Idea
Once you have identified business opportunities, you will eventually
see that there are many possibilities available for you. It is very unlikely that
you will have enough resources to pursue all of them at once.
You have to select the most promising one among hundreds of ideas.
It will be good to do this in stages. In the first stage, you screen your ideas to
narrow them down to about few choices. In the next stage, trim down the
choices to two options. In the final stage, choose between the two and
decide which business idea is worth pursuing.
In screening your ideas, examine each one in terms of the following
guide questions:
1. How much capital is needed to put up the business?
2. Where should the business be located?
3. How big is the demand for the product? Do many people need
this product and will continue to need it for a long time?
4. How is the demand met? Who are processing the products to
meet the needs (competition or demand)? How much of the need
is now being met (supply)?
5. Do you have the background and experiences needed to run this
particular business?
6. Will the business be legal and not against any existing or
foreseeable government regulation?
7. Is the business in line with your interest and expertise?
Your answers to these questions will be helpful in screening which
ones among your many ideas are worth examining further and worth
pursuing.
30
Branding
Branding is a marketing practice of creating a name, a symbol or
design that identifies and differentiates product or services from the rest. It is
also a promise to your customers. It tells them what they can expect from
your product or service and it differentiates your offerings from other
competitors. Your brand is derived from who you are, who you want to be and
what people perceive you to be.
Branding is one of the most important aspects in any business. An
effective brand strategy gives you a major edge in increasingly competitive
markets.
A good product can:
- deliver message clearly,
- confirm credibility,
- connect to target prospect,
- motivate buyers, and
- concretize user loyalty.
Here are simple tips to publicize your brand:
 Develop a tagline. Write a statement that is meaningful,
impressive, and easy to remember to capture the essence of your
brand.
 Design a logo. Create a logo symbolic of your business and
consistent with your tagline and displace it strategically.
 Write a brand message. Select a key message to communicate
about your brand.
 Sustain a brand quality. Deliver a promise of quality through
your brand.
 Practice consistency. Be reliable and consistent to what your
brand means in your business.
31
In generating a business idea, you should first identify the type of
business suited to your business idea. You should analyze and scan the
potential environment, study the marketing practices and strategies of your
competitors, analyze strengths, weaknesses, opportunities, and threats in
your environment to ensure that the products or services you are planning to
offer will be patronized and within easy reach of target consumers.
How to conduct SWOT Analysis:
 Be realistic about the strengths and weaknesses of your business
when conducting SWOT Analysis.
 SWOT Analysis should distinguish between where your business is
today, and where it can be in the future.
 SWOT Analysis should always be specific. Avoid any gray areas.
 Always apply SWOT Analysis in relation to your competition,
i.e. better than or worse than your competition.
 Keep your SWOT Analysis short and simple. Avoid complexity and
over analysis.
 SWOT Analysis is subjective.
32
Task 6: SWOT Analysis
Directions: In a separate sheet of paper or in your notebook list down all your
observations for your business idea. Categorize your observations according
to strengths, weakness, opportunities and treats. After carefully listing them
down, use the stated strategies to come up with a sound analysis, activities
and best business idea.
Strategies:
 SW - Maximize on the Strengths to overcome the internal Weakness.
 OW - Capitalize on the Opportunities to eliminate the internal
Weakness.
 ST - Maximize on your Strengths to eliminate the external Threats.
 OT - Take advantage of the available Opportunities to eliminate the
external Threats.
Analysis:
__________________________________________________________________________________
__________________________________________________________________________________
Strength (S) Weaknesses (W)
-
-
-
-
-
-
-
-
-
-
-
-
Opportunities (O) Threats (T)
-
-
-
-
-
-
-
-
-
-
-
-
33
__________________________________________________________________________________
__________________________________________________________________________________
Activities:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
My Best Business Idea:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
To deepen your understanding of the topics previously discussed, you
will be asked to perform the following activities:
Task 7: Extra Reading and Video Viewing
Reading books and watching videos have been considered as some of
the most effective educational activities that can help learners broaden their
understanding on a certain topic. In this particular task, you will be asked to
conduct extra reading and video viewing on the Internet with the following
topics:
A. Steps in selecting a business idea
B. Criteria of a viable business idea
C. Benefits of a good brand
D. Ways on developing a brand
After successfully performing the assigned task, make a narrative
report about it and share it with the class.
34
Task 8: Designing a Logo
Directions: In a separate sheet of paper or in your notebook draw a logo that
you will use in your business. Provide a simple statement to describe your
logo.
Tagline
Logo
35
Task 9: Making My Own Vicinity Map
Directions: In a separate sheet of paper or in your notebook draw a vicinity
map reflective of potential market in Computer Hardware Servicing in your
province. Provide a simple statement to describe your map.
Vicinity Map
36
MODULE 3:
CONFIGURING COMPUTER SYSTEMS AND NETWORKS
Content Standard Performance Standard
The learner demonstrates
understanding of the underlying
concepts and principles on
configuring computer systems and
networks.
The learner independently
demonstrates skills in configuring
computer systems and networks as
prescribed by TESDA Training
Regulations.
Number of Sessions (Time Allotment): 72 Hours (2 Quarters)
Welcome to the next level of your modular training in Computer
Hardware Servicing (CHS) under the Information and Communications
Technology (ICT) Course. In this module, you will have a great deal of
understanding of Configuring Computer Systems and Networks.
At the end of this module you will be able to apply the knowledge and
skills on planning and preparing for configuration, configure computer
systems and networks and inspecting configured computer systems and
networks. Those skills are essential for you to pass the National Certification
II in Computer Hardware Servicing.
In this module, topics will be introduced progressively for easy
understanding. After carefully answering the pre assessment exercises,
reading all the lessons, answering all the guide questions, skilfully performing
all the activities, showing evidences of learning and finally answering the
summative test you will gain a considerable knowledge and skills in
configuring computer systems and networks essential to be successful in
computer hardware servicing as one of the career option in ICT.
Reminder! Just follow the instructions given in this module. Now let us
start exploring new things in this module.
37
There are three learning objectives (LO) in this module: (1) plan and
prepare for configuration; (2) configure computer systems and networks; and
(3) inspect and test configured computer systems and networks. These three
learning objectives (LO) contain sub-topics that discuss the details on
configuring computer systems and networks. This module has four essential
parts, namely: what to KNOW, what to PROCESS, what to REFLECT and
UNDERSTAND and finally, what to TRANSFER.
The competencies for this module are the following:
LO 1. Plan and Prepare for Configuration of Computer Systems and
Networks
 Follow Occupational Health and Safety (OHS) procedures in planning
and preparing for configuration of computer systems and networks;
 Prepare computer systems tools, devices, equipment and materials;
 Check computer systems and networks configuration against specified
requirements; and
 Identify the procedures in using the tools and equipment.
LO 2. Configure Computer Systems and Networks
 Follow OHS procedures in configuring computer systems and
networks;
 Inspect networking devices, media and connectors;
 Create cross-over and straight-through cables;
 Assign IP address to clients and servers;
 Configure the assigned IP address to clients and servers;
 Enable network security to the computer systems; and
 Configure file and printer sharing.
LO 3. Inspect and Test Configured Computer Systems and Networks
 Follow OHS procedures in testing systems and networks;
 Test computer systems and networks in accordance with the job
requirements; and
 Accomplish technical reports on the tests conducted.
38
Before you proceed to the core of this module, challenge yourself first
and dig deep into your mind in order to answer the pre assessment exercises
prepared for you. Take time to answer it!
A. Paper and Pencil Test
General Directions: Read the items very carefully. Write your answer in a
clean sheet of paper.
Test I. True or False
Directions: Write TRUE if the statement is correct and FALSE if otherwise.
_______1. A safe workplace is clean, organized and well-lit.
_______2. One must unplug the power from the source before opening a
case and performing services.
_______3. It is a best practice that a fire extinguisher and first aid kit be
available in the workplace.
_______4. You are allowed to open the power supply or a monitor.
_______5. You can bring food and drinks inside the laboratory.
_______6.The key to a well-tuned computer system is the proper
configuration.
_______7. Boot log stores all information from the boot process.
_______8. Registry is a collection of database of configuration of database of
configuration in Windows Operating System.
_______9. The shortcut of Microsoft Configuration is Ipconfig.
_______10. Configuration is the way a system is set up.
In order to master the listed competencies, you must gain
knowledge of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional tasks under what to
REFLECT and UNDERSTAND and finally show some evidences of your
learning by transferring what you have learned to a different context under
what to TRANSFER.
Pre Assessment
39
Test II. Multiple Choice
Directions: Write the letter of the correct answer in a clean sheet of paper.
1. What boot configuration utility allows setting the programs that will run
at startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Appearance and Themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
5. Which of the following applets does not belong to performance and
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following is a wizard used to configure MS Windows for
vision, hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. Which of the following tab in direct X Diagnostic tool displays your
current audio settings?
a. Input c. Sound
b. Music d. System
8. Which of the following networking cable category is the most
commonly used?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What copper-cored cable is surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10.What Ethernet cable is used to connect two devices directly?
a. cross- over c. both A and B
b. straight-through d. none of the options
11.Which of the following is a number used to identify a device on a
network?
40
a. Default gateway c. IP address
b. DNS Server d. Subnet mask
12.In which of the following IP address classes does 192.168.1.105
belong to?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13.What command is used to test the ability of the source computer to
reach a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14.What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. Client server c. Peer to client
b. Peer to peer d. None of the options
15.Which of the following is an example of a Class A subnet mask?
a. 255.0.0.0 c. 255.255.255.0
b. 255.255.0.0 d. 255.255.255.255
Test III. Matching Type
Directions: Match Column A with Column B. Write the letter of your answer in
a separate paper.
A B
1. Copper cabling used for
telephone communication
2. Standard Ethernet cable
3. Cable that has a very thin core
4. Cable that has a thicker core
5. Tool used for crimping RJ45
6. Connector for Cat 5e cable
7. Set of rules
8. Indicates the network portion
of an IP address
9. Command used find out the IP
address
10.Glass or plastic conductor
a. Crimping tool
b. Cross-over
c. Fiber-optic
d. Ipconfig
e. Multi-mode
f. Ping
g. Protocol
h. RJ45
i. Single-mode
j. Straight-through
k. Subnet mask
l. Twisted pair
41
Test IV. ACRONYMS
Directions: Give the complete meaning of the following acronyms. Write your
answer in a separate sheet of paper.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10.DHCP
11.DNS
12.TTL
13.LAN
14.VPN
15.NIC
B. Skills Checklist
Configuration Skills
Directions: Below is a matrix containing the most important skills that one
must have to configure computer systems and networks successfully. Check
(∕) the appropriate column which describes the level of your confidence in
performing the given tasks.
Competencies
I can do it
confidently
3
I can do it
confidently
but with
assistance
2
I am not
confident
1
1. I can use the different
tools for configuration.
2. I can inspect networking
devices and connectors.
3. I can create a cross-over
and straight-through
Ethernet cable.
4. I can test the functionality
of an Ethernet cable.
5. I can assign and
42
configure IP address.
6. I can execute the
IPconfig command
properly.
7. I can manage to create a
peer-to-peer networking.
8. I can configure Network
Interface Card using
DHCP.
9. I can enable a firewall.
10.I can configure file and
printer sharing.
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the table below to
determine your initial competency on configuration of computer systems and
networks.
Numerical and Verbal interpretation
Numerical Value Verbal Interpretation
2.51 – 3.00 Confident
1.76- 2.50 Confident but needs assistance
1.00 – 1.75 Not yet Confident
Don’t feel bad if you got a “not yet confident” in all of the
competencies. Bear in mind that this is just a pre assessment of
the knowledge and skills on the lessons to be presented. Also, it
will guide and inspire you to study harder as you go along with the
lessons.
43
Lesson 1. Plan and Prepare for Configuration
This lesson is intended to develop your skills in planning and preparing
for configuration of computer system and networks. At the end of this lesson
you are expected to:
 Familiarize, follow and apply OHS in configuring computer systems
and networks;
 Prepare materials and tools for configuration;
 Check and adhere to the standard operating procedures and
requirements in computer system and network configuration; and
 Identify the procedures in using the tools for configuration.
Safety Procedures
It is essential to maintain safe working conditions to prevent accidents
and injury to any person or damage to any object in a work area. New staff
and visitors must be informed of the appropriate safety procedures. Any
transgression of the procedures must be reported.
As an aspiring computer technician, you should be aware of all
possible dangers in the workplace. It is a must to follow proper procedures for
handling computer equipment. Failure to follow the prescribed safety
procedures could result in fines, criminal convictions, and damage to
equipment, claims for damage from the owner of the property and data, injury,
or death.
The following topics familiarize you with the tasks involved
in planning and preparing for configuration of computer systems
and networks. All you need to do is to carefully read all the topics
and apply the skills you have gained through the distinct activities
provided in this module. Good luck and have fun while learning!
44
A safe work space is clean, organized, and well-lit. The disposal or
recycling of hazardous computer components must be done properly. Make
sure to follow regulations that govern how to dispose specific items. When an
organization violates these regulations, there can be legal consequences.
To keep you safe, this module provides the general and fire safety
guidelines that protects the technician and the equipment.
General Safety Guidelines
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first aid kit are available in case of fire or injury. Here are
some general safety guidelines:
 Remove your watch or any other jewelry and secure loose clothing.
 Turn off the power and unplug equipment before opening the case and
performing service.
 Cover any sharp edges inside the computer case with tape.
 Never open a power supply or a monitor.
 Do not touch areas in printers that are hot or those which use high
voltage.
 Know where the fire extinguisher is located and learn how to use it.
 Know where the first aid kit is located.
 Keep food and drinks out of your workspace.
 Keep your workspace clean and free of clutter.
 Lift heavy objects with sturdy leg support to avoid back injury.
Fire Safety Guidelines
Follow fire safety guidelines to protect equipment and lives. Turn off
and unplug the computer before beginning a repair to avoid damage to the
computer or electric shock to the technician. Fire can spread rapidly and be
very costly. Proper use of a fire extinguisher can prevent a small fire from
getting out of control. When working with computer components, always
consider the possibility of an accidental fire and prepare how to react. If there
is a fire, you should follow these safety procedures:
 Always have a planned fire escape route before beginning any work.
 Never fight a fire that is out of control or not contained.
 Get out of the building quickly in case of an out-of-control fire.
 Contact emergency services immediately for help.
45
Peer-to-Peer Activity
General Directions: Get a partner to perform the next activity. Identify
whether each statement is true or false. Gather picture evidences that make it
true or false. On the third column, show the effects of not following the safety
precautions through a picture presentation.
Example:
Turn off the power and unplug equipment before opening the case and
performing service.
Answer Picture Presentation
True
Evidence Effect
TRUE OR
FALSE
EVIDENCE Effect
1. A safe workplace is
clean, organized
and well-lit.
2. Before opening the
case and performing
services, one must
unplug the power
from the source.
3. It is a best practice
that a fire
extinguisher and first
aid kit be available
in the workplace.
4. You are allowed to
open the power
supply or a monitor.
5. You can eat inside
the laboratory.
46
Research and Investigate
Directions: Form a group of five members and research on the different
safety precautions used in computer laboratory. Interview/Observe a
practitioner while lending a quality service in computer hardware servicing.
Use a video camera to record the event stressing the safety guidelines and
procedures in the laboratory. You will be rated according to the following
rubrics:
Video Documentation of Computer Laboratory Safety Precautions
Criteria Poor (70-75) Good (76-85)
Excellent (86-
100)
Content/Information
(50%)
 Technically sound
information
 Coherence of
information
The provided
information was
not necessary or
not sufficient to
the computer
laboratory safety
precautions.
The provided
information was,
for the most
part, necessary
and sufficient to
the computer
laboratory safety
precautions.
The provided
information was
necessary and
sufficient to the
computer
laboratory safety
precautions.
Quality of Video
(30%)
 Clarity and
cohesiveness of
the video
 Organization and
coherence of
ideas
It lacks clarity
and/or does not
present ideas in
a coherent way.
Most part is well
organized, clear
and presents
ideas in a
coherent way.
The video was
well organized,
clear and
presents ideas
in a coherent
way.
Interview on
practitioner (20%)
 Congruency of
questions to the
topic
 Clarity of
questions
Questions were
not congruent
with the topic
and were not
delivered
clearly.
Most of the
questions were
congruent with
the topic and
delivered
clearly.
All of the
questions were
congruent with
the topic and
delivered
clearly.
47
Application of Safety Procedures While Accomplishing a Task
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a role playing. You will be rated
based on the Rubrics written below:
Rubrics for Role Playing
Criteria Excellent
4
Good
3
Fair
2
Weak
1
Content (40%)
-Conveys full
understanding of
the content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays
interesting purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
48
Prepare Materials and Tools Used for Configuration
A key to a well-tuned, trouble-free system is proper configuration. In order to
accomplish this, you must start by understanding its configuration. It can be difficult
to figure out all the devices in your system and the resources they are using.
To assist in this, several software tools have been created. These are
typically called diagnostic utilities or programs. Some of them are built-in to
your operating system and others are available either for free download or
commercial purchase.
Some of the built-in tools used in Microsoft system configuration
involves Microsoft System Configuration, Register Edit, Direct X and Control
Panel Applets.
1. Microsoft System Configuration: This boot configuration utility allows you
to set the programs that will run at startup and to edit configuration files. It
also offers simplified control over Windows Services.
System Configuration Utility consists of five functional tabs such as
General, Boot, Services, StartUp and Tools. The succeeding table
describes the use and functionality of each tab:
Table 1. General Tab of System Config Utility
Tab Function and Description
General
The general tab is the default tab in the System
configuration and shows how the computer will start, by
default Normal startup should be selected.
List of choices for startup configuration:
 Normal Startup. Starts Windows in the usual manner.
Use this mode to start Windows after you are done
using the other two modes to troubleshoot the
problem.
 Diagnostic Startup. Starts Windows with basic
services and drivers only. This mode can help rule out
basic Windows files as the problem.
 Selective Settings. Starts Windows with basic services
and drivers and the other services and startup
programs that you select.
49
Figure 4. General Tab
Table 2. Boot Tab of System Config Utility
Tab Function and Description
Boot
This tab allows you to make the same adjustments you
can make in the Windows boot.ini file without having to edit
the file. It shows configuration options for the operating
system and advanced debugging settings, including the
following:
 Safe boot (Minimal): Boots the Windows graphics user
interface in safe mode running only critical system
services. Networking is disabled.
 Safe Boot (Alternate Shell): Boots the Windows
Command Prompt in safe mode running only critical
system services. Networking and the graphical user
interface are disabled.
 Safe Boot (Active Directory Repair): Boots the
Windows graphical user interface in safe mode
running critical system services and Active Directory.
 Safe boot (Network): Boots the Windows graphical
user interface in safe mode running only critical
system services. Networking is enabled.
 No GUI boot. Does not display Windows splash screen
when booting.
50
 Boot Log. Stores all information from the boot process
in the file %SystemRoot% Ntbtlog.txt.
 Base Video. Boots to the Windows graphical user
interface in minimal VGA mode. This loads standard
VGA drivers instead of display drivers specific to the
video hardware on the computer.
 OS boot information. Shows driver names as drivers
are being loaded during the boot process.
 Make all boot settings permanent. Does not track
changes made in System Configuration. Options can
be changed later using System Configuration, but
must be changed manually. When this option is
selected, you cannot roll back your changes by
selecting Normal startup on the General tab.
Figure 5. Boot Tab
Table 3. Services Tab of System Config Utility
Tab Function and Description
Services
The Services tab allows you to enable or disable any
of the Microsoft Windows services or other program services
running on the computer. It lists all the services that start
when the computer boots, along with their status (Running or
Stopped). By checking the "Hide all Microsoft services" box
at the bottom of the window, you can see all non-Windows
51
services such as driver services and program services that
are often the cause of startup problems. Unchecking a box
will disable the service from starting.
Warning:
Disabling services that normally run at boot time
might cause some programs to malfunction or result in
system instability. Do not disable services in this list unless
you know they are not essential to your computer’s
operation. Selecting Disable all will not disable some secure
Microsoft services required for the operating system to start.
Figure 6. Services Tab
Table 4. Start Up Tab of System Config Utility
Tab Function and Description
Startup
The Startup tab is one of the most frequent reasons
most Windows users enter the System Configuration utility.
In the Startup tab, you will be able to see the list of
applications that run when the computer boots, along with
the name of their publisher, the path to the executable file,
and the location of the registry key or shortcut that causes
the application to run. These startup programs are often one
of the biggest causes for a computer to startup and run slow.
You can clear the check box for a startup item to disable it on
your next boot. If you have chosen Selective startup on the
General Tab, you must either choose Normal startup on the
52
General tab or select the startup item’s check box to start it
again at boot time. If you suspect an application has been
compromised, examine the Command column to review the
path to the executable file.
Windows 8 Microsoft has removed this Startup
feature in the System Configuration utility and moved it into
the Windows 8 Task Manager. Uncheck any program that
you want to disable from starting up each time.
Note:
Disabling applications that normally run at boot time might
result in related applications starting more slowly or not
running as expected.
Figure 7. Startup Tab
Table 5. Tools Tab of System Config Utility
Tab Function and Description
Tools
This Provides a convenient list of diagnostic tools and
other advanced tools that you can run.
53
Figure 8. Tools Tab
2. Register edit: This application allows you to edit the registry.
The Windows Registry, usually referred to as "the registry," is a
collection of databases of configuration settings in Microsoft
Windows operating systems.
In Windows 2000 and Windows XP, the Registry is stored in several
Hives, located in the following path: windowssystem32config and
Documents and Settings {username} folders.
Structure of the Registry
1. The Registry has a hierarchical structure, like the directories on your
hard disk. Each branch (denoted by a folder icon in the Registry Editor,
see below) is called a key. Each key can contain other keys, as well as
Values. Each value contains the actual information stored in the Registry.
There are three types of values: String, Binary, and DWORD - the use of
these depends upon the context.
2. There are six main branches (five in Windows 2000 and Windows XP),
each containing a specific portion of the information stored in the Registry.
They are as follows:
o HKEY_CLASSES_ROOT - this branch contains all of your file
types as well as OLE information for all your OLE-aware
applications.
54
o HKEY_CURRENT_USER - this branch points to the part of
HKEY_USERS appropriate for the current user.
o HKEY_LOCAL_MACHINE - this branch contains information
about all of the hardware and software installed in your
computer. Since you can specify multiple hardware
configurations, the current hardware configuration is specified in
HKEY_CURRENT_CONFIG.
o HKEY_USERS - this branch contains certain preferences (such
as colors and control panel settings) for each of the users of the
computer. In Windows 95/98/Me, the default branch here
contains the currently-logged in user. In Windows 2000/XP, the
default branch here contains a template to be used for newly-
added users.
o HKEY_CURRENT_CONFIG - this branch points to the part of
HKEY_LOCAL_MACHINE appropriate for the current hardware
configuration.
o HKEY_DYN_DATA (Windows 95/98/Me only) - this branch
points to the part of HKEY_LOCAL_MACHINE, for use with
Windows' Plug-&-Play subsystem.
3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides
you with information about the DirectX API components and drivers on
your system. It enables you to test sound and graphics output and
Microsoft DirectPlay service providers. You can use the diagnostic tool
to gather information about your system to use for diagnostic
purposes.
If you are experiencing problems when running
Microsoft DirectX applications, the DirectX Diagnostic Tool can help
you find the source of the trouble such as incorrect versions of DirectX
components, lack of hardware acceleration, devices that are not
connected and unsigned drivers.
55
Figure 9. DX Diagnostic Tool
4. Control Panel applets
The names of various applets in the Control Panel differ slightly
depending on the version of Windows installed. In Windows XP, the
icons are grouped into categories:
 Appearance and Themes: Applets that control the look of
windows:
 Display
 Taskbar and Start menu
 Folder options
 Network and Internet Connections: Applets that configure all the
connection types:
 Internet options
 Network connections
 Add or Remove Programs: An applet to add or remove programs
and windows components safely
 Sounds, Speech, and Audio Devices: Applets that control all the
settings for sound:
 Sounds and audio devices
 Speech
 Portable media devices
 Performance and Maintenance: Applets to find information about
your computer or perform maintenance:
 Administrative tools
 Power options
 Scheduled tasks
 System
56
 Printers and Other Hardware: Applets to configure devices
connected to your computer:
 Game controllers
 Keyboard
 Mouse
 Phone and modem options
 Printers and faxes
 Scanners and cameras
 User Accounts: Applets to configure options for users and their e-
mail:
 E-mail
 User accounts
 Date, Time, Language, and Regional Options: Applets to change
settings based on your location and language:
 Date and time
 Regional and language options
 Accessibility Options: A wizard used to configure windows for
vision, hearing, and mobility needs
 Security Center: Applet used to configure security settings for:
 Internet options
 Automatic updates
 Windows firewall
I. MS Configuration Command Classification
Directions: There are five functional tabs in MS Configuration utility, namely
General, Boot, Services, Startup and Tools. Classify the following items
according to the tabs they belong to. Write your answer on a separate paper.
1. Event Viewer
2. Safe Boot
3. List of services that start
when computer boots
4. Make all boot settings
permanent
5. Normal startup
6. No GUI Boot
7. OS Boot information
8. Hide All Microsoft Services
9. Convenient List of
Diagnostic Tools
10.Base Video
57
II. Applet Grouping
Directions: Complete the diagram of various Control Panel Applets with the
components included in their category.
58
Research and Explore
Directions: Conduct a research that identifies other available tools used for
computer system and network configuration. Use some other resources like
the World Wide Web and interview a practitioner (preferably an IT specialist
or a computer technician) to find out the different tools they use for
configuration. Your research will be rated according to the following criteria:
Rubrics for Term or Research Paper
Qualities & Criteria Poor (70-74) Good (75-79)
Very Good
(80-89)
Excellent
(90-100)
Format/Layout
(15%)
 Presentation of the
text
 Structuring of text
 Requirements of
length, font and
style followed
Followed
poorly the
requirements
related to
format and
layout.
Some format
and layout
related
requirements
were met.
Most format
and layout
related
requirements
were met.
All the
requirements
related to
format and
layout were
strictly
followed.
Content/Information
(50%)
 All elements of the
topics are
addressed
 The information is
technically sound
 Information based
on careful
research
 Coherence of
information
The research
was not
objective and
poorly
addresses
the issues
referred in
the proposed
topic.
The provided
information
was not
necessary or
not sufficient
to discuss
these issues.
The research
was objective
and for some
part
addresses an
in-depth
analysis
The provided
information
was, for some
part,
necessary
and sufficient
to discuss
these issues.
The research
was objective
and for the
most part
addresses an
in-depth
analysis of
most issues
referred in
the proposed
topic.
The provided
information
was, for the
most part,
necessary
and sufficient
The research
was objective
and
addresses
with an in-
depth
analysis all
the issues
referred in
the proposed
topic.
The provided
information
was
necessary
and sufficient
to discuss
59
to discuss
these issues.
these issues.
Quality of Writing
(25%)
 Clarity and
cohesiveness of
sentences and
paragraphs
 No errors in
spelling, grammar
and use of English
 Organization and
coherence of
ideas
The essay
was not well
written, and
contains
many spelling
errors, and/or
grammar
errors and/or
use of
English
errors.
It lacks clarity
and/or does
not present
ideas in a
coherent
way.
The essay
was well
written for
some part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for some part
well
organized,
clear and
presents
ideas in a
coherent
way.
The essay
was well
written for the
most part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for the most
part well
organized,
clear and
presents
ideas in a
coherent
way.
The essay
was well
written from
start to finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
References (10%)
 Soundness of
references
References
were not
appropriately
used and
cited.
Some of the
references
were
appropriately
used and
cited.
Most of the
references
were
appropriately
used and
cited.
All of the
references
were
appropriately
used and
cited.
60
Oral Presentation
Directions: After the thorough research and exploration, you have to present
your work individually in an oral presentation. Your performance will be rated
based on the rubrics provided in this section.
Rubrics for Oral Presentation
CRITERIA
B
(70- 74)
D
(75-79)
AP
(80-84)
P
(85-89)
A
(90-100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
a logical manner
4. Used complete sentence
5. Offered a concluding
statement
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained good and
proper posture
9. Utilized audio-visual
materials
10. Answered questions
sufficiently and received
comments openly
Total
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
61
Procedures in Using Computer System Configuration Tools
As a future computer technician you must be diligent and eager to
know the different procedures in using the tools for computer system
configuration. This will help and guide you to carry out a particular job in a
proper manner. Once you already identify them, you must also acquire the
necessary and appropriate skills to apply them in actual situations.
This part of the module present some of the required procedures in
computer system configuration. Take note that you need to exert extra effort
in finding out some procedures which are not in this module. This is your
chance to explore and learn through your own experience.
The subsequent sections below present the various procedures in
using Computer System Configuration Tools:
1. Accessing and using Microsoft System Configuration
 Click on Start Button
 In the Search Box, type Run
 In the Run window, type msconfig, and press Enter.
Figure 10. General Tab of Microsoft system configuration
62
2. Accessing and using Regedit:
 Click on Start Button
 In the search box, or Run window, type the following:
regedit and then press Enter.
Figure11. Registry Editor Window
Using the Registry Editor
The Registry Editor (regedit.exe) is included in Windows to enable you
to view and edit the contents of the Registry. When you open the Registry
Editor, you will see a window divided into two panes. The left side shows a
tree with folders (see Structure of the Registry above), and the right side
shows the contents (values) of the currently selected folder (key).
 To expand a certain branch, click on the little plus sign [+] on the left of
any folder, or just double-click on the folder.
 To display the contents of a key (folder), just click the desired key, and
look at the values listed on the right side.
 You can add a new key or value by selecting New from the Edit menu.
 You can rename any value and almost any key with the same method
used to rename files; right-click on an object and click rename, or click
on it twice (slowly), or just press F2 on the keyboard.
63
 Lastly, you can delete a key or value by clicking on it, and pressing
Delete on the keyboard, or by right-clicking on it, and choosing Delete.
3. Accessing and Using Direct X Diagnostic
You can test Microsoft DirectDraw and Direct3D on each monitor
attached to your system. You can also test DirectSound on each wave output
device, and DirectMusic on each music port.
To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of
Windows XP differs from Windows 7 but it does the same function):
 Click on Start Button, type Run on the search box.
 On the Run window, Type in dxdiag and click Ok or press
Enter, as shown in Figure 9, Run Dialog Box.
.
Figure12. Run Dialog Box
 Next you will see a new window with various tabs.
Caution: Using regedt32.exe or regedit.exe incorrectly might cause
configuration problems that may require you to reinstall the operating
system.
64
Figure13. System Tab of DX Diagnostic Tool
 The System tab shows information about your computer and displays
the version of DirectX installed on your computer.
 The DirectX Files tab shows the file name and the version number for
each DirectX file installed on your computer. It also shows the file
names and the version numbers of other files that are used by games
that are running under DirectX.
 The Display tab lists your current display settings, and allows you to
disable DirectDraw, Direct3D, and AGP Texture Acceleration. You can
also test DirectDraw and Direct3D from the Display tab which will
indicate that the DirectX Graphics runtime files are installed and
operating correctly. It will also display your device's available memory
and can tell you if your video driver has passed Microsoft's Windows
Hardware Quality Labs testing standard. The DirectX Diagnostic Tool,
however, cannot report memory that is in use at the time that it starts
and you may see less memory reported than your video card actually
has.
65
Figure14. Display Tab of DX Diagnostic Tool
 The Sound tab displays your current audio settings and allows you to
test DirectSound. It will tell you if the audio driver are signed, meaning
that it has passed Microsoft's Windows Hardware Quality Labs testing
standard. The Hardware Sound Acceleration Level slider is used to
correct audio glitches that might be caused by some audio drivers. You
can adjust the slider settings and see if it provides better results in your
application. Be sure not to lower it too much or you may disable some
audio features of your system. If the tool detects a problem with your
sound settings, a warning message is displayed in the Notes box.
 The Music tab displays your current MIDI settings, and allows you to
test the DirectMusic component of DirectX. Click on the Test
DirectMusic button to perform the test. If the DirectX Diagnostic Tool
detects a problem with DirectMusic, a warning message is displayed in
the Notes box.
66
Figure15. Sound Tab of DX Diagnostic Tool
 The Input tab lists the input devices connected to your computer such as
USB and PS2 devices. It also displays the input drivers installed on your
computer. If the DirectX Diagnostic Tool detects a problem with an input
device or an input device driver, a warning message is displayed in the
Notes box.
67
Figure16. Input Tab of DX Diagnostic Tool
 The Network tab lists the registered DirectPlay Service Providers. These
are the connection methods that DirectPlay will operate across. A registry
problem here can normally be resolved by reinstalling DirectX. A registry
error here can normally be resolved by removing and reinstalling that
application. If the DirectX Diagnostic Tool detects a problem with a
DirectPlay Service Provider or Application, a warning message is
displayed in the Notes box.
 The More Help tab allows you to further troubleshoot problems that the
other tabs could not resolve. Features include the DirectX
troubleshooter, sound troubleshooter, system information tool and the
override tool which will override DirectDraw’s refresh rate.
68
Windows Registry Backup and Recovery
Directions: In this activity you will back up a computer registry. You will also
perform a recovery of a computer registry. The registry is also called System
State data. You will be given 1 hour to accomplish this activity.
Recommended Equipment:
A computer system running Windows XP is required for this exercise.
Procedures:
Step 1
 Log on to the computer as yourself.
 Click Start > Run.
 Type ntbackup and then click OK. The “Backup or Restore
Wizard” window appears.
Figure 17. Backup or Restore Wizard
Step 2
 Click Advanced Mode.
 The Backup Utility window appears.
69
Figure 18. Backup Utility Window
Step 3
 Click Backup Wizard.
 The “Welcome to the Backup Wizard” window appears.
Figure 19. Backup Restore Wizard Window
Step 4
 Click Next.
 Click the Only back up the System State data radio button.
70
Figure 20. Choose “Only backup system state data”
Step 5
 Click Next.
 The “Backup Type, Destination, and Name” window appears.
Figure 21. Backup Type Destination, and Name” Window
Step 6
 Click Browse.
71
 If you are asked to insert a disk into the floppy disk drive, click
Cancel.
 The “Save As” dialog box appears.
Figure 22. Save As Dialog Box
Step 7
 Click the My Documents icon on the left side of the “Save As”
dialog box.
 Click Save.
 The “Backup Type, Destination, and Name” window re-appears.
Step 8
 Click Next.
 The “Completing the Backup Wizard” appears.
72
Figure 23. Completing the Backup Wizard Window
Step 9
 Click Advanced.
 The “Type of Backup” window appears.
Figure 24. Type of Backup Window
 The default backup type is “Normal”. If available, make sure that
“Backup Migrated Remote Storage Data” is not checked.
Step 10
 Click Next.
 The “How to Backup” window appears.
73
Figure 25. How to Backup Window
Step 11
 Click the Verify Data After Backup check box, and then click
Next.
 The “Backup Options” window appears.
Figure 26. Backup Options Window
Step 12
 Click Replace the existing backups, and then click Next.
 The “When to Back Up” window appears.
74
Figure 27. When to Backup Window
Step 13
 At the “When To Back Up” window, click Now and then click Next.
 The “Completing the Backup Wizard” window appears.
Figure 28. Completing the Backup Window
Step 14
 Click Finish.
 The “Backup Progress” window appears.
75
Figure 29. Backup Progress Window
 The “Backup Progress” window indicates that the backup is
complete.
Step 15
 Click Report.
 The Notepad application window appears containing the report.
76
Figure30. Notepad Application Window
 Close Notepad.
 In the Backup Progress dialog box, click Close.
 Close the Backup Utility.
Step 16
 Click Start >Run.
 Type regedit in the “open” field. The Registry Editor window
appears.
Figure 31. RegEdit Window
77
Step 17
 Expand the HKEY_CURRENT_USER Registry Key.
 Expand the Control Panel Registry Key.
 Expand the PowerCfg Registry Key.
 Right-Click the Screen Saver. Stars Registry Key.
 Click Delete.
 Click File > Exit in the Registry Editor window.
 Browse to the “My Documents” folder and locate the “backup.bkf”
file.
 Double-click the backup file to bring up the Backup Utility Wizard.
 Click Next.
Step 18
 Click the Restore files and settings radio button and then click
Next.
 The “What to Restore” window appears.
Figure 32. What to Restore Window
Step 19
 Expand the file.
 Expand the backup.bkf file.
 Click the System State check box.
78
Figure 33. Click System State Check box
Step 20
 Click Next.
 The “Completing the Backup or Restore Wizard” window appears.
Figure 34. Completing the Backup or Restore Wizard Window
Step 21
 Click Advanced.
 The “Where to Restore” window appears.
79
Figure 35. Where to Restore Window
Step 22
 The default restoration location is “Original location”.
 Click Next.
 The “Restoring System State will always overwrite current System
State unless restoring to an alternate location.” Warning window
appears.
 Click OK.
Figure 36. “Restoring System State will always overwrite current
System State unless restoring to an alternate location” Warning
Window
Step 23
 Click the Replace existing files if they are older than the backup
files radio button.
80
Figure 37. How to Restore Window
Step 24
 Click Next.
 The “Advanced Restore Options” window appears
Figure 38. Advanced Restore Options Window
81
 Be sure that all three check boxes are selected, and then click
Next.
 Click Finish.
 The system recovery begins by copying the files back to the
computer.
 When prompted to restart the computer, click Yes. The computer
will restart.
Step 25
 Click start > Run.
 Type regedit in the “Open” field.
 Click OK.
 You should see the “Screen Saver Stars” Registry key in the
Registry Editor application window.
 Click File > Exit.
Finish
Performance Rubrics for
Windows Registry Backup and Recovery
CRITERIA Excellent
4
Good
3
Fair
2
Poor
1
Safety Procedures
(15%)
-Applied / manifested
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Utilized organized
materials and tools
while accomplishing the
task and exhibited time
management
Quality of work (40%)
-the windows registry
was fully backed up
82
Lesson 2. Configure Computer System and Network
System Configuration is the way a system is set up, it is the collection
of components that make up the system. Configuration can refer to
either hardware or software, or the combination of both. For instance, a
typical configuration for a PC consists of 32MB (megabytes) main memory, a
floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and
the Windows Operating System.
Many software products require that the computer has a certain
minimum configuration. For example, the software might require a
graphics display monitor and a video adapter, a particular microprocessor,
and a minimum amount of main memory capacity.
When you install a new device or program, you sometimes need
to configure it, which means that you need to set various switches
and jumpers (for hardware) and to define values of parameters (for software).
For example, the device or program may need to know what type of video
adapter you have and what type of printer is connected to the computer.
Thanks to technological advancements, such as plug-and-play, much of this
configuration is now performed automatically.
After dealing with the preparations for configuration, you
can now proceed with the next section of this module which is
Configuring Computer System and Network.
This lesson is designed to give you the proper procedures
used in configuring computer systems and networks. At the end of
this lesson you should be able to:
 Inspect networking devices and connectors;
 Create a cross-over and straight-through Ethernet
cables;
 Assign and configure IP address to clients and
servers;
 Create a peer-to-peer network;
 Enable network security; and
 Configure file and printer sharing.
83
Safety Precautions Related to Networks
Installing network cables, whether copper or fiber-optic, can be
dangerous. Often, cables must be pulled through ceilings and walls where
there are obstacles or toxic materials. You should wear clothing such as long
pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to
protect you from those toxic materials. Most importantly, wear safety glasses.
If possible, ask building management, or someone responsible for the
building, if there are any dangerous materials or obstacles that you need to
be aware of before entering the ceiling area.
Safety precautions when using a ladder:
 Read the labels on the ladder, and follow any safety instructions
written on it.
 Never stand on the top rung of the ladder. You could easily lose your
balance and fall.
 Make sure that people in the area know you will be working there.
 Cordon off the area with caution tape or safety cones.
 When you are using a ladder that leans up against a wall, follow the
instructions written on the ladder, and have someone hold the ladder to
help keep it steady.
Safety rules when working with cables:
The tools required to install copper and fiber-optic cable may cause
danger through improper use. When working with cables, strictly follow these
safety rules:
 Make sure that the tools you are using are in good working condition.
 Watch what you are doing, and take your time. Make sure that you do
not cut yourself or place anyone in danger.
 Always wear safety glasses when cutting, stripping, or splicing cables
of any kind. Tiny fragments can injure your eyes.
 Wear gloves whenever possible, and dispose any waste properly.
Use common sense when installing cables and fixing network
problems. Call for assistance for tasks that you cannot do on your own.
84
Fiber-Optic Safety
Fiber-optic cables are useful for communications, but they have certain
hazards:
 Dangerous chemicals
 Tools with sharp edges
 Light which you cannot see that can burn your eyes
 Glass shards produced by cutting fiber-optic cable that can cause
bodily harm
Specific types of tools and chemicals are used when working with
fiber-optic cable. These materials must be handled with care.
Chemicals
The solvents and glues used with fiber optics are dangerous. You
should handle them with extreme care. Read the instructions on the label,
and follow them carefully. Also, read the material safety data sheet (MSDS)
that accompanies the chemicals to know how to treat someone in case of
emergency.
Tools
When working with any tool, safety should always be your first priority.
Any compromise in safety could result in serious injury or even death. The
tools used for working with fiber optics have sharp cutting surfaces that are
used to scribe glass. Other tools pinch cables with high pressure to fasten
connectors to them. These tools can produce shards of glass that can splinter
and fly into the air. You must avoid getting them on your skin and in your
mouth or eyes.
Glass Shards
The process of cutting and trimming the strands of fiber-optic cables
can produce tiny fragments of glass or plastic that can penetrate your eyes or
skin and cause severe irritation. The fibers can be extremely difficult to see on
your skin because they are clear and small. When you work with fiber-optic
cabling, the working surface should be a dark mat so that you can see the tiny
glass or plastic fragments. The mat should also be resistant to chemical spills.
You should keep the work area clean and neat. Never pick up fiber-
optic fragments with your fingers. Use tape to pick up small fragments, and
dispose them off properly. Use a disposable container, such as a plastic
bottle with a screw-on lid, to store fiber fragments. Close the lid tightly before
disposing the container.
85
Harmful Light
Protect your eyes from the harmful light that may be in the fiber-optic
strands. The light is a color that humans cannot see. It can damage your eyes
before you can feel it. When you use a magnifier to inspect fiber-optic cable
and connectors, the light emitted from the fiber could be directed into your
eyes. When working with fiber, be sure to disconnect the light source. Use
special detectors to help you tell if a fiber is energized.
Networking Devices, Media and Connector
To make data transmission more extensible and efficient than a simple
peer-to-peer network, network designers use specialized network devices
such as hubs, switches, routers, and wireless access points to send data
between devices. You have already discussed in your Grade 9 CHS class the
different devices used in networking and which provides you the knowledge
on the common networking cables that are essential in putting up a network.
Common Network Cables
Until recently, cables were the only medium used to connect devices
on networks. A wide variety of networking cables are available. Coaxial and
twisted-pair cables use copper to transmit data. Fiber-optic cables use glass
or plastic to transmit data. These cables differ in bandwidth, size, and cost.
You need to know what type of cable to use based on the job requirements.
You also need to be able to troubleshoot and repair problems along the way.
Caution:
Obtain proper training before you attempt to cut, strip, or splice
fiber-optic cable. An experienced technician should supervise you until
you become adequately skilled.
86
Twisted Pair
Twisted pair is a type of copper cabling that is used for telephone
communications and most Ethernet networks. A pair of wires forms a circuit
that transmits data. The pair is twisted to provide protection against crosstalk,
the noise generated by adjacent pairs of wires in the cable. Pairs of copper
wires are encased in color-coded plastic insulation and are twisted together.
An outer jacket protects the bundles of twisted pairs.
Source: www.lanshack.com
Figure 39. UTP and STP Cable
When electricity flows through a copper wire, a magnetic field is
created around the wire. A circuit has two wires, and in a circuit, the two wires
have oppositely-charged magnetic fields. When the two wires of the circuit
are next to each other, the magnetic fields cancel each other out. This is
called the cancellation effect. Without the cancellation effect, your network
communications become slow because of the interference caused by the
magnetic fields.
The two basic types of twisted-pair cables are as follows:
 Unshielded twisted pair (UTP) is the cable that has two or four pairs
of wires. This type of cable relies solely on the cancellation effect
produced by the twisted-wire pairs that limits signal degradation
caused by electromagnetic interface (EMI) and radio frequency
interference (RFI). UTP is the most commonly used cabling in
networks. UTP cables have a range of 328 feet (100 m).
 With shielded twisted pair (STP), each pair of wire is wrapped in
metallic foil to better shield the wires from noise. Four pairs of wires
are then wrapped in an overall metallic braid or foil. STP reduces
electrical noise from within the cable. It also reduces EMI and RFI from
87
outside the cable. Although STP prevents interference better than
UTP, STP is more expensive because of the extra shielding. It is also
more difficult to install because of the thickness. In addition, the
metallic shielding must be grounded at both ends. If it is improperly
grounded, the shield acts like an antenna, picking up unwanted
signals.
Category Rating
UTP comes in several categories that are based on two factors:
 The number of wires in the cable
 The number of twists in those wires
1. Category 3 is the wiring used for telephone systems and Ethernet
LAN at 10 Mega byte per second (Mbps).
2. Category 3 has four pairs of wires.
3. Category 5 and Category 5e have four pairs of wires with a
transmission rate of 100 Mbps.
4. Category 5 and Category 5e is the most common network cables
used.
5. Category 5e has more twists per foot than Category 5 wiring.
These extra twists further prevent interference from outside sources
and from the other wires within the cable.
Some Category 6 cables use a plastic divider to separate the pairs of
wires, which prevents interference. The pairs also have more twists than
Category 5e cable.
Coaxial Cable
Coaxial cable is a copper-cored cable surrounded by a heavy
shielding. Coaxial cable is used to connect the computers to the rest of the
network.
Source: www.phoneam.com
Figure 40. Coaxial Cable
88
Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet Neill-
Concelman” connectors, at the ends of the cables to make the connection.
Several types of coaxial cable exist:
 Thicknet (10BASE5) is a coaxial cable used in networks operating at
10 Mbps, with a maximum length of 500 meters.
 Thinnet (10BASE2) is a coaxial cable used in networks operating at
10 Mbps, with a maximum length of 185 meters.
 RG-59 is most commonly used for cable television in the U.S.
 RG-6 is higher-quality cable than RG-59, with more bandwidth and
less susceptibility to interference.
Fiber-Optic Cable
An optical fiber is a glass or plastic conductor that transmits
information using light. Fiber optic cable has one or more optical fibers
enclosed in a sheath or jacket. Because it is made of glass, fiber-optic cable
is not affected by EMI or RFI. All signals are converted to light pulses to enter
the cable and are converted back into electrical signals when they leave it.
This means that fiber-optic cable can deliver signals that are clearer, and can
go farther, without compromising the clarity of signals.
Source: www.picstopin.com
Figure 41. Fiber Optic Cable
Fiber-optic cable can reach distances of several miles or kilometers
before the signal needs to be regenerated. Fiber-optic cable usually is more
expensive to use than copper cable, and the connectors are more costly and
harder to assemble. Common connectors for fiber-optic networks are SC, ST,
and LC. These three types of fiber-optic connectors are half-duplex, which
allows data to flow in only one direction. Therefore, two cables are needed.
89
These are the two types of glass fiber-optic cable:
 Multimode is the cable that has a thicker core than single-mode cable.
It is easier to make, can use simpler light sources such as Light
Emitting Diodes (LEDs), and works well over distances of a few
kilometers or less.
 Single-mode is the cable that has a very thin core. It is harder to
make, uses lasers as a light source, and can transmit signals dozens
of kilometers with ease.
Creating Ethernet Cable
Ethernet cabling has been the standard in networking installation for
years. It is the fastest way of connecting PC to a peer or to your router or a
central switch. This section of the module will bring you back to the
procedures in creating an Ethernet cable specifically straight-through and
cross-over. Try to recall the procedures as you go on with the lesson.
Fabricating an Ethernet Cross-over and Straight-through Cable
In an Ethernet networking environment – like in a home or an office
with multiple PCs that are wired – the computers need to be connected to a
central router to allow data transfer. The router takes all the bits being sent
out by the computers and relays them onto the other devices on the network.
The straight-through Ethernet cable is used in local area network to
connect a PC to a network hub and router. This is the standard cable used for
almost all purposes.
A cross-over cable, on the other hand, can be used to connect two
network devices directly, without the need for a router in the middle. It simply
reverses some of the pins so that the output on one computer is being sent to
the input of another.
Bear in mind that safety precautions must always be applied and
observed during the fabrication of the said cables. Also, materials and tools to
be used must always be complete and functional to save time, money and
effort.
The following items are the materials and tools used for making
Ethernet cables:
 Ethernet Cable Category 5e or Cat5e- standard wire for cabling;
 RJ45 crimpable connectors for Cat5e;
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable tester.
90
Cable Fabrication Procedures
The picture below will serve as your guide in making the two important
Ethernet cables.
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
Cross-Over Straight-Through
Figure 42. Cross-Over and Straight-Through Color Coding
Figure 43. Step 1
Figure 44. Step 2
91
3. Pinch the wires between your fingers and straighten them out as
shown. The color order is important to do this correctly.
4. Use wire cutter to make a straight cut across the wires 1/2 inch from
the cut sleeve to the end of the wires.
5. Push the wires into the connector. Each wire fits into a slot in the RJ45
connector. Note the position of the blue plastic shielding. Also note
how the wires go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There
should be no short wires.
Figure 45. Step 3
Figure 46. Step 5
Figure 47. Step 6
92
7. Crimping the Cable – carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
8. For a standard "Straight-Through" cable, repeat all steps and wire
color order on the other end of cable. For a cross-over cable - the other
end will have a different color order as shown by the crossover picture
on page 84.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
Figure 48. Step 7
Figure 49. Step 9
93
Criss-Cross Puzzle
Directions: Complete the criss-cross puzzle and familiarize yourself of the
cables being described. Write your answer in a clean sheet of paper.
CABLES
Across
1. each pair of wires is wrapped in metallic foil
3. one or more optical fibers enclosed in a sheath or jacket
5. used to connect two devices directly
6. cable that has two or four pairs of wires
7. the standard cable used for almost all purposes
Down
1. cable that has a very thin core
2. cable that has a thicker core
4. used for telephone communications and Ethernet networks
5. copper-cored cable
94
Now that you are equipped with the knowledge on the different cables
used in networking, you also need to know that fiber technologies and
connectors have changed through the years. In these videos, you will learn
about the different fiber connectors, copper connectors and their
characteristics. To watch the video presentations just type in the following
URL:
1) http://www.professormesser.com/n10-005/copper-connectors/
2)http://www.professormesser.com/n10-005/copper-connectors/
3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
95
Here are the questions:
1. What are the different types of fiber connectors? Cite their
advantages and disadvantages.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________.
2. List down the different types of connectors.
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
3. What are the characteristics of UTP, STP and coaxial cable?
_____________________________________________________
_____________________________________________________
_____________________________________________________
_____________________________________________________
I hope you learned a lot from the video presentations. After
watching the videos, answer the following guide questions and submit
it to your teacher. Write your answer in a clean sheet of paper. Good
Luck!
96
Create your own Ethernet Cable
Directions: Prepare the following tools and materials in fabricating your own
cross-over and straight-through cables.
Materials:
 6 meters Ethernet Cable Category 5e or Cat5e-standard wire for
cabling;
 RJ45 crimpable connectors for Cat5e;
Tools:
 RJ45 Crimping tool;
 Wire cutter, stripper or pliers; and
 Ethernet cable Tester / LAN Tester
Reminder / Caution: Be careful when using the tools.
Follow the procedures cited in this module and apply the safety
precautions to avoid injury or any unwanted incident. You will be given 30
minutes to complete the task. You will be rated using the performance rubrics
found on the next page.
Procedures:
1. Cut into the plastic sheath 1 inch from the end of the cut cable. The
crimping tool has a razor blade that will do the trick with practice.
2. Unwind and pair the similar colors.
3. Pinch the wires between your fingers and straighten them out as
shown on page 90. The color order is important to do this correctly.
4. Use scissors to make a straight cut across the wires 1/2 inch from the
cut sleeve to the end of the wires.
5. Push the wires into the connector. Note the position of the blue plastic
shielding. Also note how the wires go all the way to the end.
6. Take view from the top. Make sure the wires are all the way in. There
should be no short wires.
7. In crimping the cable – carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing
tabs on the connector will pierce into each of the eight wires. There is
also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from the crimper, that end
is ready to use.
97
8. For a standard straight-through cable, repeat all steps and wire color
order on the other end of cable. For a cross-over cable, the other end
will have a different color order as shown in the cross-over picture on
page 89.
9. Make sure to test the cables before installing them. An inexpensive
Ethernet cable tester does this quite well.
Performance Rubrics for
Creating a Cross-Over and Straight-Through Ethernet Cables
CRITERIA Excellent
4
Good
3
Fair
2
Poor
1
Safety Procedures
(15%)
-Applied / manifested
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Organized materials
and tools while
accomplishing the task
and has time
management
Quality of Product
(40%)
-Produced a fully
functional Ethernet
Cable
98
Internet Protocols
A protocol is a set of rules. A letter sent through the postal system also
uses protocols. Part of the protocol specifies where on the envelope the
delivery address needs to be written. If the delivery address is written in the
wrong place, the letter cannot be delivered. Internet protocol works in a
similar way. Internet protocols are sets of rules governing communication
within and between computers on a network. Protocol specifications define
the format of the messages to be exchanged.
Timing is crucial to network operation. Protocols require messages to
arrive within a certain amount of time so that computers do not wait
indefinitely for messages that may have been lost. Therefore, systems
maintain one or more times during transmission of data. Protocols also initiate
alternative actions if the network does not meet the timing rules. Many
protocols consist of a suite of other protocols that are stacked in layers.
These layers depend on the operation of the other layers in the suite to
function properly.
To understand how networks and the Internet work, you must be
familiar with the commonly used protocols. These protocols are used to
browse the web, send and receive e-mail, and transfer data files. You will
encounter other protocols as your experience in IT grows, but they are not
used as often as the common protocols described here:
 TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP)
suite of protocols has become the dominant standard for
internetworking. TCP/IP represents a set of public standards that
specify how packets of information are exchanged between computers
over one or more networks.
The main functions of protocols are:
 Identifying errors
 Compressing the data
 Deciding how the data should be sent
 Addressing the data
 Deciding how to announce sent and received data
99
 IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange
is the protocol suite originally employed by Novell Corporation’s
network operating system, NetWare. It delivers functions similar to
those included in TCP/IP. Novell in its current releases supports the
TCP/IP suite. A large installed base of NetWare networks continues to
use IPX/SPX.
 NetBEUI: NetBIOS Extended User Interface is a protocol used
primarily on small Windows NT networks. NetBEUI cannot be routed or
used by routers to talk to each other on a large network. NetBEUI is
suitable for small peer-to-peer networks, involving a few computers
directly connected to each other. It can be used in conjunction with
another routable protocol such as TCP/IP. This gives the network
administrator the advantages of the high performance of NetBEUI
within the local network and the ability to communicate beyond the
LAN over TCP/IP.
Figure 50. Commonly Used Internet Protocol
100
 AppleTalk: AppleTalk is a protocol suite used to network Macintosh
computers. It is composed of a comprehensive set of protocols that
span the seven layers of the Open Systems Interconnection (OSI)
reference model. The AppleTalk protocol was designed to run over
LocalTalk, which is the Apple LAN physical topology. This protocol is
also designed to run over major LAN types, notably Ethernet and
Token Ring.
 HTTP: Hypertext Transfer Protocol governs how files such as text,
graphics, sound, and video are exchanged on the World Wide Web
(WWW). The Internet Engineering Task Force (IETF) developed the
standards for HTTP.
 FTP: File Transfer Protocol provides services for file transfer and
manipulation. FTP allows multiple simultaneous connections to remote
file systems.
 SSH: Secure Shell is used to securely connect to a remote computer.
 Telnet: It is an application used to connect to a remote computer that
lacks security features.
 POP3: Post Office Protocol is used to download e-mail from a remote
mail server.
 IMAP: Internet Message Access Protocol is also used to download
e-mail from a remote mail server.
 SMTP: Simple Mail Transfer Protocol is used to send e-mail to a
remote e-mail server.
The more you understand about each of these protocols, the more you
will understand how networks and the Internet work.
IP Addressing
An IP address is a number that is used to identify a device on the
network. Each device on a network must have a unique IP address to
communicate with other network devices. Network devices are those that
move data across the network, including hubs, switches, and routers. On a
LAN, each host (device that sends or receives information on the network)
and network device must have an IP address within the same network to be
able to communicate with each other.
A person’s name and fingerprints usually do not change. They provide
a label or address for the person’s physical aspect—the body. A person’s
mailing address, on the other hand, relates to where the person lives or picks
up mail. This address can change. On a host, the Media Access Control
101
(MAC) address is assigned to the host Network Interface Card (NIC) and is
known as the physical address. The physical address remains the same
regardless of where the host is placed on the network in the same way that
fingerprints remain with someone regardless of where he or she goes.
An IP address consists of a series of 32 binary bits (1s and 0s). It is
very difficult for humans to read a binary IP address. For this reason, the 32
bits are grouped into four 8-bit bytes called octets. An IP address, even in this
grouped format, is hard for humans to read, write, and remember. Therefore,
each octet is presented as its decimal value, separated by a decimal point or
period. This format is called dotted-decimal notation. When a host is
configured with an IP address, it is entered as a dotted-decimal number, such
as 192.168.1.5.
Table 6. Five Classes of IP Address
IP Classes Purpose
Class A Used for large networks, implemented by large companies and
some countries
Class B Used for medium-sized networks, implemented by universities
Class C Used for small networks, implemented by ISPs for customer
subscriptions
Class D Used for special use for multicasting
Class E Used for experimental testing
Imagine if you had to enter the 32-bit binary equivalent of this:
11000000101010000000000100000101. If you mistyped just 1 bit, the
address would be different, and the host may not be able to communicate
on the network. The logical 32-bit IP address is hierarchical and is
composed of two parts. The first part identifies the network, and the
second part identifies a host on that network. Both parts are required in an
IP address. For example, if a host has an IP address of 192.168.18.57,
the first three octets, 192.168.18, identify the network portion of the
address, and the last octet, 57, identifies the host. This is called
hierarchical addressing, because the network portion indicates the
network on which each unique host address is located. Routers only need
to know how to reach each network, not the location of each individual
host.
102
Subnet Mask
The subnet mask indicates the network portion of an IP address. Like
the IP address, the subnet mask is a dotted-decimal number. Usually all hosts
within a LAN use the same subnet mask. Table 3 shows default subnet
masks for usable IP addresses that are mapped to the first three classes of IP
addresses:
 255.0.0.0: Class A, which indicates that the first octet of the IP address
is the network portion
 255.255.0.0: Class B, which indicates that the first two octets of the IP
address are the network portion
 255.255.255.0: Class C, which indicates that the first three octets of
the IP address are the network portion
Table 7. Default Subnet Masks for Usable IP Addresses
Class A Network Host
Octet 1 2 3 4
Class B Network Host
Octet 1 2 3 4
Class C Network Host
Octet 1 2 3 4
Class D addresses are used for multicast groups. There is no need to
allocate octet or bits to separate network and host addresses. Class E
addresses are reserved for research use only.
IpConfig
Ipconfig is a command used to find out the IP address of a certain
network you are connected to.
How to use the ipconfig command?
1) Click on Start Button, then type cmd (command prompt) on the
search box.
2) A black screen will appear as shown in the figure below.
103
3) Type ipconfig and press enter. The figure below shows the IP
configuration window using the ipconfig command. The information
from this window will be useful because it shows the IP address,
subnet mask and default gateway of a network you are connected
to.
Figure 51. Command Prompt Window
Figure 52. IP Configuration in CMD Window
104
Assigning a static IP Address
In a home network with several computers and devices, it is ideal to
assign each of them a specific address. This is for the purpose of avoiding
problems when you do troubleshooting which requires figuring out the IP
address of each of them. It is also a means to prevent address conflicts
between the devices. You can also manage them with ease if you have
assigned their own addresses.
Here are the procedures in assigning an IP Address on a windows
base computer system:
1. Open the Control Panel’s Network Connections icon.
2. Open the icon representing your computer’s network connection.
3. Click the Properties button in the Status dialog box.
4. From the list of items, choose Internet Protocol (TCP/IP).
5. Click the Properties button. The Internet Protocol (TCP/IP) Properties
dialog box appears.
Figure 53. Wireless Network Connections Properties Dialog Box
105
6. Type the IP address for your computer. Enter the appropriate IP
Address in the IP address section.
7. Type a subnet mask. The value used on a local network is
commonly 255.255.255.0, but it can be different, such as
255.255.255.127.
8. Type the default gateway address. The default gateway is the router,
so type the router’s address. Figure 54 shows an example of assigning
an IP Address, Subnet mask and default gateway.
Figure 54. TCP / IPV4 Dialog Box
Figure 55. Assigning an IP Address
106
9. Type the address for the preferred DNS server. The address should be
obtained from your Internet Service Protocol. It is used to help your
computer find web pages and other addresses on the internet.
10.Type the address for the alternate DNS server.
The alternate Domain Name System (DNS) server’s IP address is
something that your ISP provides.
11.Click OK to confirm the settings.
12.Close all other open dialog boxes and windows.
Assigning a Dynamic IP Address
If more than a few computers comprise the LAN, manually configuring
IP addresses for every host on the network can be time-consuming and prone
to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP)
server would automatically assign IP addresses and greatly simplify the
addressing process.
Dynamic Host Configuration Protocol (DHCP) is a software utility
used to dynamically assign IP addresses to network devices. This dynamic
process eliminates the need to manually assign IP addresses. A DHCP
server can be set up and the hosts can be configured to automatically obtain
Figure 56. Assigning a Dynamic IP Address
107
an IP address. When a computer is set to obtain an IP address automatically,
the other entire IP addressing configuration boxes are dimmed or disabled.
The server maintains a list of IP addresses to assign, and it manages the
process so that every device on the network receives a unique IP address.
Each address is held for a predetermined amount of time. When the time
expires, the DHCP server can use this address for any computer that joins
the network.
These are the IP address information that a DHCP server can assign to
hosts:
 IP address
 Subnet mask
 Default gateway
 Optional values, such as a Domain Name System (DNS) server
address
The DHCP server receives a request from a host. The server then
selects IP address information from a set of predefined addresses that are
stored in a database. After the IP address information is selected, the DHCP
server offers these values to the requesting host on the network. If the host
accepts the offer, the DHCP server leases the IP address for a specific period
of time.
Using a DHCP server simplifies the administration of a network
because the software keeps track of IP addresses. Automatically configuring
TCP/IP also reduces the possibility of assigning duplicate or invalid IP
addresses. Before a computer on the network can take advantage of the
DHCP server services, the computer must be able to identify the server on
the local network. You can configure a computer to accept an IP address from
a DHCP server by clicking the Obtain an IP address automatically option in
the NIC configuration window, as shown in Figure 56.
If your computer cannot communicate with the DHCP server to obtain
an IP address, the Windows operating system automatically assigns a private
IP address. If your computer is assigned an IP address in the range of
169.254.0.0 to 169.254.255.255, it can communicate with only other
computers in the same range. An example of when these private addresses
would be useful is in a classroom lab where you want to prevent access
outside to your network. This operating system feature is called Automatic
Private IP Addressing (APIPA). APIPA continually requests an IP address
from a DHCP server for your computer.
108
Ping
The ping is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The ping
command is usually used as a simple way to verify that a computer can
communicate over the network with another computer or network device.
The ping command operates by sending Internet Control Message
Protocol (ICMP) Echo Request messages to the destination computer and
waiting for a response. How many of those responses are returned, and how
long it takes for them to return, are the two major pieces of information that
the ping command provides.
Table 8. Ping Command Syntax
Syntax Description
-t Using this option will ping the target until you force it to stop
using Ctrl-C.
-a - This ping command option will resolve, if possible,
the hostname of an IP address target.
-n count This option sets the number of ICMP Echo Request messages
to send. If you execute the ping command without this option,
four requests will be sent.
-l size Use this option to set the size, in bytes, of the echo request
packet from 32 to 65,527. The ping command will send a 32
byte echo request if you do not use the -l option.
-f Use this ping command option to prevent ICMP Echo Requests
from being fragmented by routers between you and the target.
The -f option is most often used to troubleshoot Path Maximum
Transmission Unit (PMTU) issues.
-i TTL This option sets the Time to Live (TTL) value, the maximum of
which is 255.
-v TOS This option allows you to set a Type of Service (TOS) value.
Beginning in Windows 7, this option no longer functions but still
exists for compatibility reasons.
-r count Use this ping command option to specify the number
of hops between the computer and the target computer or
device that you would like to be recorded and displayed. The
maximum value for count is 9 so use the tracert
command instead. If you are interested in viewing all hops
between two devices.
-s count Use this option to report the time, in Internet Timestamp
format, that each echo request is received and echo reply is
sent. The maximum value for count is 4 which means that only
109
the first four hops can be time stamped.
-w timeout Specifying a timeout value when executing the ping command
adjusts the amount of time, in milliseconds, that ping waits for
each reply. If you do not use the -w option, the default timeout
value is used which is 4000, or 4 seconds.
-R This option tells the ping command to trace the round trip path.
-S srcaddr Use this option to specify the source address.
-4 This forces the ping command to use IPv4 only but is only
necessary if target is a hostname and not an IP address.
-6 This forces the ping command to use IPv6 only but as with
the -4 option, is only necessary when pinging a hostname.
target This is the destination you wish to ping, which is either an IP
address or a hostname.
/? Use the help switch with the ping command to show detailed
help about the command's several options.
Using the ping Command
Ping is one of your most important tools in troubleshooting Internet
problems. It shows you whether the Domain Name Server is working, whether
the computer you are trying to talk to is reachable, and how long it takes to
get there. It does this at a very low level — only the most basic Internet
functions have to be up and running.
1) Click on Start Button, then type cmd (command prompt) on the
search box.
2) A black screen will appear as shown in the figure below.
3) Type ping followed by the IP address you desire to verify. The
figure below shows the screen of the ping command and its output.
110
This output shows several things:
 Decoding names to network addresses — A domain name server
(DNS) resolves machine names to numeric addresses. A single
machine can have many names, all of which resolve to the same
Internet address. In the example just given, the name www.google.com
resolves to the Internet address 122.2.152.23.
 Round-trip response time — The parts of the replies that say things
like time=105ms show you how long it took from the time the client
machine sent out the ping message until a reply came back (1 ms is 1
millisecond, or one thousandth of a second). The variability in the times
Figure 57. Step 3
Figure 58. Pinging
111
you see reflects that networks do not always respond identically.
Differing amounts of traffic on the communication lines or differing
loads on the server are common causes. You will see very different
response times depending on the access equipment you use.
 Routing hop count — The part of the replies that says TTL=50 tells
you about the route the message took from one point to another. The
acronym TTL stands for Time to Live, which is a measure of how many
rerouting from one point to another the packet has to go through before
IP declares it undeliverable. The number following TTL (called the hop
count) is a number that usually starts at 255 and counts down by one
every time the message gets rerouted through an intermediary
computer.
I. Protocols
Directions: In this worksheet, write the name of the protocol and the default
port(s) for each protocol definition in the table. Do this on your notebook.
Be prepared to discuss your answers in front of the class.
Protocol Definition Protocol Default
Port(s)
Provides connections to computers over a
TCP/IP network
Sends e-mail over a TCP/IP network
Translates URLs to IP address
Transports Web pages over a TCP/IP network
Automates assignment of IP address on a
network
Securely transports Web pages over a TCP/IP
network
Transports files over a TCP/IP network
112
II. Identifying IP Address Classes
Directions: In this worksheet, your teacher will write several IP addresses
with their appropriate subnet masks. You will copy the IP address and Subnet
Mask. You will write which IP Address Class is appropriate in the IP Address
Class column in the chart below. An example has been provided for you.
Be prepared to discuss the IP Address Class you select.
IP Address Subnet Mask IP Address Class
10.0.0.0 255.0.0.0 A
To deepen your understanding with regard to the Internet
Protocols, IP Address and subneting, utilize the Internet and the
website www.professormesser.com, watch and learn from the video
presentations. Use the URLs below:
1. http://www.professormesser.com/n10-005/binary-math-2/
2. http://www.professormesser.com/n10-005/ip-classes/
113
3. http://www.professormesser.com/n10-005/networkingprotocols/
4. http://www.professormesser.com/n10-005/subnetting/
Reflection on the video presentations
Directions: Answer the essential questions below based on the video
presentations you had watched. Write your answer in a clean sheet of paper.
1. What are the procedures involved in calculating IP address and the
procedures in converting IP address to binary and vice versa?
________________________________________________________
________________________________________________________
________________________________________________________
What are the different IP Classes? Discuss each briefly and give
examples.
________________________________________________________
________________________________________________________
________________________________________________________
2. What are the distinguished Internet Protocols? Describe each.
________________________________________________________
________________________________________________________
________________________________________________________
3. What are the necessary procedures in calculating subnet mask or
simply subneting? Show an example solution for the calculation.
________________________________________________________
________________________________________________________
________________________________________________________
114
Configure an Ethernet NIC to use DHCP
Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address.
You need to follow the procedures given below and apply safety precautions
in accomplishing this task. While doing the activity, you have to answer
activity questions written after every step. Write your answer in a clean sheet
of paper. Your performance will be rated based on the performance rubrics.
Rubrics for Configuration
Criteria B
(70-74)
D
(75-79)
AP
(80-84)
P
(85-89)
A
(90-100)
Total
(=score x %)
Proper
Configuration (30
%)
(The configured
hardware was
properly configured
according to job
specification.)
Adherence to the
Procedures (30%)
(The specified job
was done by
following the
procedures. Safety
measures were
observed during the
activity.)
Quality of Work
(30%)
(The device was
configured properly.)
Comprehension
(10%)
(Interview / Guide
questions were
answered correctly
according to the job
requirements.)
Grand Total
115
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
Recommended Equipment
 Linksys 300N router
 A computer running Window XP Professional
 Ethernet patch cable
Procedures:
Step 1
 Plug one end of the Ethernet patch cable into “Port 1” at the back of
the router.
 Plug the other end of the Ethernet patch cable into the network port on
the NIC in your computer.
 Plug in the power cable of the router if it is not already plugged in.
 Turn on your computer and log on to Windows as an administrator.
 Click Start.
 Right-click My Network Places, and then choose Properties.
 The “Network Connections” window appears.
Figure 59. My Network Places
116
Step 2
 Right-click Local Area Connection, and then choose Properties.
 The “Local Area Connection Properties” window appears.
Activity Questions:
1. What is the name and model number of the NIC in the “Connect
using:” field?
2. What are the items listed in the “This connection uses the
following items:” field?
Step 3
 Choose Internet Protocol (TCP/IP).
 Click Properties.
 The “Internet Protocol (TCP/IP) Properties” window appears.
Figure 60. Local Area Connection Properties
117
Activity Question:
3. What is the IP address, Subnet mask, and Default gateway
listed in the fields of the “Use the following IP address:” area?
Answers may vary. If the computer is configured to obtain an IP
address automatically, there will be no information in the fields.
 Click the Obtain an IP address automatically radio button.
 Click OK. The “Internet Protocol (TCP/IP) Properties” window closes.
Figure 61. Internet Protocol (TCP/IP) Properties
118
 Click OK.
 Restart your computer.
Step 4
 Log on to Windows as an administrator.
 Check the lights at the back of the NIC. These lights will blink when
there is network activity.
 Choose Start > Run.
 Type cmd and click OK.
 Type ipconfig/all, and then press the Enter key.
Figure 62. Local Area Connection Properties Window
Figure 63. Run Window
119
Activity Questions:
1. What is the IP address and subnet mask of the “Ethernet Adapter
Local Area Network Connection”?
2. What is the IP address of the DHCP server?
3. On what date was the Lease obtained?
4. On what date will the Lease expire?
Figure 64. ipconfig all window
120
Task 2
Configure Wireless Router
Directions: Configure and test the wireless settings on the
LinksysWRT300N.
Recommended Equipment
 A computer with Windows XP Professional / Windows 7
 A Wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Ethernet patch cable
Step 1
 Connect the computer to one of the Ethernet ports on the wireless router
with an Ethernet patch cable.
 Plug in the power of the wireless router. Boot the computer and log in as
an administrator.
Step 2
 Choose start > Run, and type “cmd”. Press the Return key.
 Type ipconfig.
 What is the default gateway for the computer?
Step 3
 Open your browser. Type “192.168.1.1” in the “Address” field, and then
press Return.
 The “Connect to 192.168.1.1” window appears.
Figure 65. Browser Window
121
 Type “admin” in the “Password” field.
 The Setup screen appears.
Step 4
 Click the “Wireless” tab.
 Choose “Mixed” in the “Network Mode” drop-down box.
 Type “CHS#” in the “Network Name (SSID)” field, where # is the number
assigned by your instructor.
Figure 66. Connect to 192.168.1.1 Window
Figure 67. Wireless Tab Window
122
 Click Save Settings.
 The “Settings are successful” screen appears.
 Click Continue, and then close the browser window.
Step 4
 Unplug the Ethernet patch cable from the rear of the computer.
 Choose Start, and then right-click My Network Places. Choose
Properties.
 Double-click the wireless adapter, and then select View Wireless
Networks.
 Choose CHS, and then click the Connect button.
 Open Internet Explorer, and then connect to the wireless router.
 Log in to the wireless router.
 Close Internet Explorer.
Figure 67. Settings are Successful Window
123
Peer-to-Peer Network
In a peer-to-peer network, devices are connected directly to each
other without any additional networking devices between them, as shown in
Figure 68. In this type of network, each device has equivalent capabilities and
responsibilities. Individual users are responsible for their own resources and
can decide which data and devices to share. Because of that, the network
has no central point of control or administration.
It allows certain files and folders to be shared with everyone or with
selected users. Peer-to-peer networks are quite common in small offices that
do not use a dedicated file server. Files and folders can be configured to
allow network users to copy them, but not alter them in their original location,
which is a common safety precaution. However, files and folders can also be
assigned a "read/write" status that allows either selected users or all users on
the network to change them.
Figure 68. Peer-to-Peer Network
124
Peer-to-peer networking differs from client-server networking, where
certain devices have responsibility for providing or "serving" data and other
devices consume or otherwise act as "clients" of those servers.
Setting up a peer-to-peer network in Windows XP
The steps described below are provided as a general guide that will
work for most home networking situations. However, it may not work for all
scenarios.
Do the following steps to set up your own inclusive home network:
1. Make sure both systems have Network Interface Cards (NICs) installed
and are using the proper cables.
2. For PCs with Windows XP, the home networking wizard can be used to
set up Windows for your network.
a. Click Start, and then Control Panel.
b. Select Network and internet connections.
c. Double-click Network setup wizard and follow the on-screen
instructions.
.
3. Click Start, Control Panel, Network and Internet Connections, and
then Network Connections. At Network Connection Windows, you will see
the Local Area Connection Icon, Right click it and select Properties.
Local Area Connection window appears.
NOTE: For a direct network cable connection between two PCs (not
with a hub, switch or router), you need to have a cross-over cable.
NOTE: If the Network setup wizard is unsuccessful, continue with the
steps below.
125
4. Click on the General tab.
Figure 69. Network Connection Window
Figure 70. LAN Properties General Tab
126
5. A device name should appear under "connect using." If not, there is a
hardware issue and Windows is not recognizing the network hardware. This
issue must be fixed before continuing.
a. At the General Tab, Put a check mark at the following:
- Client for Microsoft Network
- File and Printer Sharing for Microsoft Network
- Internet Protocol (TCP/IP)
b. Put a check mark saying Show icon in notification area when
connected.
c. Select the Internet Protocol (TCP/IP) and click the Properties
button
NOTE: If any of the above component is not installed, install them by
selecting Add or Install, and then selecting the missing component, and
clicking Add.
Figure 71. TCP/IP- Properties
127
d. At the IP Address tab, select Specify IP Address.
e. Enter 192.168.0.1 as the unique IP Address for the first
machine. For each other PC add one to the last number in the
IP address. For example,
 KIDSPC1 = 192.168.0.1 ,
 MOMSPC2 = 192.168.0.2 ,
 and WORKPC3 = 192.168.0.3 .
NOTE: 192.168.0.x is an IP Address reserved for private networks
and is not routable to the Internet.
Figure 72. Assigning IP Address and Subnet Mask
128
6. In the Subnet mask field enter: 255.255.255.0
All PCs on the same network use the same subnet mask. Click the Ok
button to finish configuration and to close the Local Area Connection
Properties windows.
Click Start, right-click My Computer, and then select Properties.
7. Click the Computer Name tab and click the Change button.
8. Enter a name that describes the PC in the Computer Description field.
For example, KIDSPC1, MOMSPC2, or WORKPC3.
9. Enter the workgroup name for your network. Use the same workgroup
name for all PCs on the network. Spelling is important in this step.
10.Repeat these steps for each PC on the network.
11.Wait two minutes after Windows opens on all PCs, and then double-click
the Network Neighborhood icon on the desktop. If all went well, you
should see all the PC names on the network when files and folders are
being shared. If you do not see them, press F5 to refresh the screen.
12.If after refreshing the network window, the other PCs still do not appear,
check the firewall settings that may be interfering with the
communication.
Note: The Domain Name System (DNS) is optional. If you have a DNS
system and your connected to ISP you can input an IP address which
came from the DNS server.
129
Setting up a Peer-to-Peer network in Windows 7
If you are going to work with Windows 7 operating system, the
following procedures are used to set up a peer-to-peer network:
1. On Desktop ==> Select My Computer ==> Right Click ==> Select
properties.
2. Select Change Setting (administrative permission will be required in
this procedure).
Figure 73. Step 1
Figure 74. Step 2
130
3. Click or select Change.
4. Change computer name and workgroup name. Then, click OK.
Figure 76. Step 4
Figure 75. Step 3
131
5. Save the change (A Reboot will be required).
6. After Reboot ==> Right Click on My Network Place ==> Properties.
7. Turn on Network discovery, File sharing, Printer Sharing.
Figure 77. Step 5
Figure 78. Step 6
Figure 79. Step 7
132
8. Click on Manage network connections.
9. Select Local Area Connection ==> Properties
10.Select Internet Protocol version 4 (TCP/IPv4) ==> properties.
Figure 80. Step 8
Figure 81. Step 9
133
11.Now enter the assigned IP address and then click OK.
Figure 82. Step 10
Figure 83. Step 11
134
12. Now open My network place ==> Click to change then Select Turn on
network discovery and file sharing.
13.If you could see all computers in My Network place, you have
successfully configured a workgroup.
Figure 84. Step 12
Figure 85. Step 13
135
Client-Server Network
In a client/server network, the server provides the requested
information or service to the client. Servers on a client/server network
commonly perform some of the processing work for client machines, such as
sorting through a database before delivering only the records requested by
the client.
One example of a client/server network is a corporate environment in
which employees use a company e-mail server to send, receive, and store e-
mail. The e-mail client on an employee computer issues a request to the e-
mail server for any unread e-mail. The server responds by sending the
requested e-mail to the client.
In a client/server model, the servers are maintained by network
administrators. Data backups and security measures are implemented by the
network administrator. The network administrator also controls user access to
Figure 86. Client/Server Network
136
the network resources. All the data on the network is stored on a centralized
file server. Shared printers on the network are managed by a centralized print
server. Network users with the proper permissions can access both the data
and shared printers. Each user must provide an authorized username and
password to gain access to network resources that he or she is permitted to
use. For data protection, an administrator performs a routine backup of all the
files on the servers. If a computer crashes, or data is lost, the administrator
can easily recover the data from a recent backup.
Comparison
Directions: Using the table below, cite the features of peer-to-peer and client
/server network.
Peer-to-peer Network Client/Server Network
1.
2.
3.
4.
5.
Peer-to-peer study
Directions: Have a partner. Using different references available such as
articles, books, internet and publications, investigate and search for the
advantages and disadvantages of peer-to-peer network. You will present your
output in front of the class and you will be rated according to the rubrics for
research and rubrics for oral presentation.
137
Rubrics for Research Study
Qualities & Criteria Poor (0-74) Good (75-79)
Very Good
(80-89)
Excellent
(90-100)
Format/Layout
(15%)
 Presentation of the
text
 Structuring of text
 Requirements of
length, font and
style followed
Followed
poorly the
requirements
related to
format and
layout.
Some format
and layout
related
requirements
were met.
Most format
and layout
related
requirements
were met.
All the
requirements
related to
format and
layout were
strictly
followed.
Content/Information
(50%)
 All elements of the
topics are
addressed
 The information is
technically sound
 Information based
on careful
research
 Coherence of
information
The research
was not
objective and
poorly
addresses
the issues
referred in
the proposed
topic.
The provided
information
was not
necessary or
not sufficient
to discuss
these issues.
The research
was objective
and for some
part
addresses an
in depth
analysis
The provided
information
was, for some
part,
necessary
and sufficient
to discuss
these issues.
The research
was objective
and for the
most part
addresses an
in-depth
analysis of
most issues
referred in
the proposed
topic.
The provided
information
was, for the
most part,
necessary
and sufficient
to discuss
these issues.
The research
was objective
and
addresses
with an in-
depth
analysis all
the issues
referred in
the proposed
topic.
The provided
information
was
necessary
and sufficient
to discuss
these issues.
138
Quality of Writing
(25%)
 Clarity and
cohesiveness of
sentences and
paragraphs
 No errors in
spelling, grammar
and use of English
 Organization and
coherence of
ideas
The essay
was not well
written, and
contains
many spelling
errors, and/or
grammar
errors and/or
use of
English
errors.
It lacks clarity
and/or does
not present
ideas in a
coherent
way.
The essay
was well
written for
some part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for some part
well
organized,
clear and
presents
ideas in a
coherent
way.
The essay
was well
written for the
most part,
without
spelling,
grammar or
use of
English
errors.
The essay is
for the most
part well
organized,
clear and
presents
ideas in a
coherent
way.
The essay
was well
written from
start to finish,
without
spelling,
grammar or
use of
English
errors.
The essay
was well
organized,
clear and
presents
ideas in a
coherent
way.
References (10%)
 Soundness of
references
References
were not
appropriately
used and
cited.
Some of the
references
were
appropriately
used and
cited.
Most of the
references
were
appropriately
used and
cited.
All of the
references
were
appropriately
used and
cited.
139
Rubrics for Oral Presentation
CRITERIA
B
(70- 74)
D
(75-79)
AP
(80-84)
P
(85-89)
A
(90-100)
1. Gave an interesting
introduction
2. Presented clear
explanation of topic
3. Presented information in
logical manner
4. Used complete sentence
5. Offered a concluding
summary
6. Spoke clearly, correctly,
distinctly, and confidently
7. Maintained eye contact
8. Maintained acceptable
posture.
9. Utilized audio-visual aids
10. Handled questions and
comments confidently
Total
Grand Total
Legend:
B- Beginner
D- Developing
AP- Approaching Proficiency
P- Proficient
A- Advance
140
Hands-on Activity
Directions: Follow and perform the prescribed procedures in setting up a
peer-to-peer and client/server network for Windows XP and Windows 7. You
will be rated base on the performance indicators below:
Performance Indicators for Setting- up a peer-to-peer and client/server
network
Indicators Poor
(70- 74)
Fair
(75-79)
Good
(80-84)
Very
Good
(85-89)
Excellent
(90-100)
Total
(score
x
%)
Safety
Procedures
(15%)
-Applied /
manifested safety
precautions while
working
Adherence to the
Procedures
(30%)
-Followed the
procedures
systematically
Workmanship
(15%)
-Organized
materials and
tools while
accomplishing the
task and has time
management
Quality of
Service (40%)
-Had set-up a fully
functional peer-to-
peer and
client/server
network.
Grand Total
141
Network Security
As a future Computer Technician you need to understand computer
and network security. Failure to implement proper security procedures can
affect users, computers, and the general public. Private information, company
secrets, financial data, computer equipment, and items about national
security are placed at risk if proper security procedures are not followed.
The Importance of Security in Computer System and Networks
Computer and network security help keep data and equipment safe by
giving only the appropriate people access. Everyone in an organization
should give high priority to security, because everyone can be affected by a
lapse in security.
Theft, loss, network intrusion, and physical damage are some of the
ways a network or computer can be harmed. Damage or loss of equipment
can mean a loss of productivity. Repairing and replacing equipment can cost
the company time and money. Unauthorized use of a network can expose
confidential information and reduce network resources.
An attack that intentionally degrades the performance of a computer or
network can also harm an organization’s production. Poorly implemented
security measures that allow unauthorized access to wireless network
devices demonstrate that physical connectivity is not necessary for security
breaches by intruders.
A technician’s primary responsibilities include data and network
security. A customer or an organization may depend on you to ensure that
their data and computer equipment are secure. You will perform tasks that
are more sensitive than those assigned to the average employee. You may
have to repair, adjust, and install equipment. You need to know how to
configure settings to keep the network secure, but still keep it available to
those who need to access it. You will ensure that software patches and
updates are applied, antivirus software is installed, and antispyware software
is used. You may also be asked to instruct users on how to maintain good
security practices with computer equipment.
142
Security Attacks
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security:
 Physical: Events or attacks that steal, damage, or destroy such
equipment as servers, switches, and wiring.
 Data: Events or attacks that remove, corrupt, deny access to, allow
access to, or steal information.
Threats to security can come from inside or outside an organization,
and the level of potential damage can vary greatly. Potential threats include
the following:
 Internal: Employees who have access to data, equipment, and the
network. Internal attacks can be characterized as follows:
 Malicious threats are when an employee intends to cause
damage.
 Accidental threats are when the user damages data or equipment
unintentionally.
 External: Users outside an organization who do not have authorized
access to the network or resources. External attacks can be
characterized as follows:
 Unstructured attacks, which use available resources, such as
passwords or scripts, to gain access to and run programs designed
to vandalize.
 Structured attacks, which use code to access operating systems
and software.
Physical loss or damage to equipment can be expensive, and data loss
can be detrimental to your business and reputation. Threats against data are
constantly changing as attackers find new ways to gain entry and commit
their crimes.
Viruses, Worms, and Trojan Horses
Computer viruses are created with malicious intent and sent by
attackers. A virus is attached to small pieces of computer code, software, or
document. The virus executes when the software is run on a computer. If the
virus spreads to other computers, those computers could continue to spread
the virus.
A virus is transferred to another computer through e-mail, file transfers,
and instant messaging. The virus hides by attaching itself to a file on the
computer. When the file is accessed, the virus executes and infects the
computer. A virus has the potential to corrupt or even delete files on your
143
computer, use your e-mail to spread itself to other computers, or even erase
your hard drive. Some viruses can be
exceptionally dangerous. The most damaging
type of virus is used to record keystrokes.
Attackers can use these viruses to harvest
sensitive information, such as passwords and
credit card numbers. Viruses may even alter or
destroy information on a computer. Stealth
viruses can infect a computer and lay dormant
until summoned by the attacker.
A worm is a self-replicating program that is harmful to networks. A
worm uses the network to duplicate its code to the hosts on a network, often
without any user intervention. It is different from a virus because a worm does
not need to attach to a program to infect a host. Even if the worm does not
damage data or applications on the hosts it infects, it harms networks
because it consumes bandwidth.
A Trojan horse technically is a worm. It does not need to be attached
to other software. Instead, a Trojan threat is hidden in software that appears
to do one thing, and yet behind the scenes it does another. Trojans often are
disguised as useful software. The Trojan program can reproduce or replicate
like a virus and spread to other computers. Computer data damage and
production loss could be significant. A technician may be needed to perform
the repairs, and employees may lose or have to replace data. An infected
computer could be sending critical data to competitors while at the same time
infecting other computers on the network.
Security Procedures
You should use a security plan to determine what will be done in a
critical situation. Security plan policies should be constantly updated to reflect
the latest threats to a network.
A security plan with clear security procedures is the basis for a
technician to follow. Security plans should be reviewed each year. Part of the
process of ensuring security is conducting tests to determine areas where
security is weak. Testing should be done on a regular basis. New threats are
released daily.
Regular testing provides details of any possible weaknesses in the
current security plan that should be addressed. A network has multiple layers
of security, including physical, wireless, and data. Each layer is subject to
144
security attacks. The technician needs to understand how to implement
security procedures to protect equipment and data.
Virus protection software, known as antivirus software, is software
designed to detect, disable, and remove viruses, worms, and Trojans before
they infect a computer. Antivirus software becomes outdated quickly,
however. The technician is responsible for applying the most recent updates,
patches, and virus definitions as part of a regular maintenance schedule.
Many organizations establish a written security policy stating that
employees are not permitted to install any software that is not provided by the
company. Organizations also make employees aware of the dangers of
opening e-mail attachments that may contain a virus or worm.
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. It may not be possible to decipher captured data in
Source: www.computerflu.com
Figure 87. Most Commonly Known Anti Virus Software
145
time to make any use of it. A security alert may inform you that you are using
an encrypted connection.
A virtual private network (VPN) is an encryption system that protects
data as though it resides on a private network. The data actually travels over
the Internet or another unsecured public network.
Port Protection
Every communication using TCP/IP is associated with a port number.
HTTPS, for instance, by default uses port 443. A firewall is a way of
protecting a computer from intrusion through the ports.
With port protection, the user can control the type of data sent to a
computer by selecting which ports will be open and which will be secured.
Data being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
The proceeding section provides the procedures for enabling windows
XP firewall:
1. Click Start Button then choose Control Panel.
2. Click the "Network and Internet Connections" option.
Figure 88. Control Panel
Figure 89. Control Panel Window
146
3. Then click the "Network Connections" option.
4. Double click the icon labeled "Local Area Connection". The icon may
have a number after it, for example "Local Area Connection 5". Click on
Properties button.
5. On the "Advanced" tab, select "Protect my computer and network by
limiting or preventing access to this computer from the Internet".
Figure 90. Network and Internet Connections
Figure 91. Local Area Network Connection Properties Window
Properties Button
147
6. Click Settings, then on the ICMP tab select "Allow Incoming echo request".
Enabling Windows 7 Firewall
1. Open Windows Firewall by clicking
the Start button , and then
clicking Control Panel. In the search
box, type firewall, and then
click Windows Firewall.
Figure 92. Local Area Network Connection Advance Tab
Figure 93. ICMP Tab
Figure 94. Windows 7 Control Panel
148
2. In the left pane, click Turn Windows Firewall on or off. If you're
prompted for an administrator password or confirmation, type the
password or provide confirmation. Turn Windows Firewall on or off link
in Windows Firewall.
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
If you want the firewall to prevent all programs from communicating,
including programs that you have previously allowed to communicate through
the firewall, select the Block all incoming connections, including those in
the list of allowed programs check box.
Wireless Security Techniques
Traffic flows through radio waves in wireless networks, so it is easy for
attackers to monitor and attack data without having to connect to a network
physically. Attackers gain access to a network by being within range of an
unprotected wireless network. A technician needs to know how to configure
access points and wireless network interface cards (WNIC) to an appropriate
level of security.
When installing wireless services, you should apply the following
wireless security techniques immediately to prevent unwanted access to the
network:
 Wired Equivalent Privacy (WEP) was the first-generation security
standard for wireless network. Attackers quickly discovered that 64-bit
WEP encryption was easy to break. Monitoring programs could detect
the encryption keys used to encode the messages. After the keys were
obtained, messages could be easily decoded. In an attempt to
overcome this weakness, most users employ a 128-bit key for WEP.
 Change the default administration password.
 Disable the broadcasting of the Service Set Identifier (SSID) to hide it
from other users.
 Use MAC filtering to protect the network from other users.
 Change the default values of the SSID by entering the setup program
for the access point and renaming the SSID.
 Update to the latest available firmware.
 Install or activate a firewall, and adjust the settings to eliminate all
traffic except the desired network settings.
 Update to the latest available firmware.
149
 Install or activate a firewall, and adjust the settings to eliminate all
traffic except the desired network settings.
An attacker can access data as it travels over the radio signal.
However, you can use a wireless encryption system to encode data and
thereby prevent unwanted capture and use of the data. Both ends of every
link must use the same encryption standard. The following list describes the
different levels of wireless security, from most secure to least secure:
 Lightweight Extensible Authentication Protocol (LEAP): Also
called EAP-Cisco, LEAP is a wireless security protocol created by
Cisco to address the weaknesses in WEP and WPA. LEAP is a
good choice when using Cisco equipment in conjunction with
operating systems such as Windows and Linux.
 Wi-Fi Protected Access (WPA): An improved version of WEP. It
was created as a temporary solution until 802.11i (a security layer
for wireless systems) was fully implemented. Now that 802.11i has
been ratified, WPA2 has been released. It covers the entire 802.11i
standard.
 WEP 128: An enhanced encryption protocol combining a 104-bit
key and a 24-bit initialization vector.
 WEP 64: The first-generation security standard for wireless
network. It could be exploited because of an encryption key that
was vulnerable to decoding.
 No security: Although you can elect to implement no security
whatsoever, you leave your wireless network completely vulnerable
to attack.
In addition, Wireless Transport Layer Security (WTLS) is a security
layer used in mobile devices that employ the Wireless Applications Protocol
(WAP). Mobile devices do not have a great deal of spare bandwidth to devote
to security protocols. WTLS was designed to provide security for WAP
devices in a bandwidth-efficient manner.
To manually create a network profile using WEP shared key
authentication:
1. Open Network and Sharing Center by clicking the Start button , and
then clicking Control Panel. In the search box, type network, and then
click Network and Sharing Center.
2. Click Set up a new connection or network.
150
3. Click Manually connect to a wireless network, and then click Next.
4. On the Enter information for the wireless network you want to
add page, under Security type, select WEP.
5. Complete the rest of the page, and then click Next.
6. Click Change connection settings.
7. Click the Security tab, and then, under Security type, click Shared.
8. Click OK, and then click Close.
Short Quiz
Test I. Modified true or false
Directions: Write SECURITY if the underlined word on the subsequent
statement makes it true and VIRUS if it is makes the statement a false one
then write the correct term/word to correct it. (2 points each). Write your
answer in a separate sheet of paper.
1. Computer and network security help keep data and equipment safe.
2. A technician’s secondary responsibilities include data and network
security.
3. Threats to security can come from inside and outside the organization.
4. Computer viruses are created and sent by attackers who have malicious
intent.
5. A virus is transferred to another computer through e-mail, file transfer and
instant messaging.
Test II. Matching Type
Directions: Match column A with column B in order to identify the term / word
being described.
A B
1. when an employee intends to
cause damage
2. when user damages data or
equipment unintentionally
3. attached to small pieces of
computer code, software and
documents
4. a self-replicating program that is
harmful to network
5. it is technically a worm
a. Accidental threats
b. Antivirus software
c. Data encryption
d. Firewall
e. Malicious threats
f. Traffic
g. Trojan horse
h. Virus
i. VPN
j. WPA
151
6. software designed to detect,
disable and remove viruses
7. it involves using codes and ciphers
8. a way of protecting a computer
from intrusion through the ports
9. an encryption system that protects
data
10. data being transported on a
network
k. WEP
l. Worm
Test IV. Acrostic
Direction: Give the meaning of the acronyms given below:
1. VPN- ____________________________________________
2. SSID- ___________________________________________
3. WEP- ___________________________________________
4. WPA- ___________________________________________
5. WTLS- __________________________________________
Research Firewalls
Directions: In this activity, you will use the Internet, newspaper, or a local
store to gather information about hardware and software firewalls.
1. Using the Internet, research two different hardware firewalls. Based on
your research, complete the table below.
2. Which hardware firewall would you purchase? List reasons for your
choice.
3. Using the Internet, research two different software firewalls. Based on
your research, complete the table below.
Company/Hardware
Name
Website
URL
Cost Subscription Length
(Month/Year/Lifetime)
Hardware
Features
Company/Software
Name
Website
URL
Cost Subscription Length
(Month/Year/Lifetime)
Software
Features
152
4. Which software firewall would you purchase? List reasons for your
choice.
Configure Windows XP Firewall
Directions: In this hands-on activity you will explore the Windows XP Firewall
and configure some advanced settings. There are essential questions that
you need to answer while performing the activity.
Step 1
 Navigate to the Windows XP Firewall:
 Start > Control Panel > Security Center
 The Firewall indicator shows the status of the firewall. The normal
setting is “ON”.
 Access the controller for the firewall by clicking Windows Firewall at
the bottom of the window.
Figure 96. Windows Security Center
153
Step 2
Essential Questions:
In the space below, state why turning off the Windows Firewall is
not advised.
Step 3
 From the Windows Firewall control menu select the Exceptions tab.
Programs and services that Windows Firewall is not blocking will be
listed with a checkmark.
Figure 97. Windows Firewall General Tab Window
154
 You can add applications to this list. This may be necessary if your
customer has an application that requires outside communications but
for some reason the Windows Firewall cannot perform the
configuration automatically. You must be logged on to this computer as
an administrator to complete this procedure.
Essential Question:
Creating too many exceptions in your Programs and Services file
can have negative consequences. Describe a negative consequence of
having too many exceptions.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Step 4
 From the Windows Firewall control menu select the Advanced tab to
view the Network Connection Settings. Network Connection
Settings displays the different connections configured for your
computer.
Figure 98. Windows Firewall Exceptions Tab Window
155
 Click the Settings button in the Network Connection Settings area.
The Advanced Settings window has two tabs: Services and ICMP.
Click the Services tab.
Essential Question:
In the space below, list the services that are available.
___________________________________________________________
___________________________________________________________
___________________________________________________________
Step 5
 There are many applications that users do not normally see that also
need to get through the Windows Firewall to access your computer.
These are the network level commands that direct traffic on the
network and the Internet.
 Under the ICMP heading, click the Settings button. You will see the
menu where ICMP exceptions are configured.
Figure 99. Windows Firewall Advance Tab Window
156
 In the example here, allowing incoming echo requests is what allows
network users to “ping” your computer to determine if it is present on
the network and how fast information travels to and from it.
Essential Question:
In the space below, list the requests for information that your computer will
respond to.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Figure 100. ICMP Settings Window
157
File and Printer Sharing
File Sharing is sharing of or offering access to digital information or
resources, including documents, multimedia (audio/video), graphics,
computer programs, images and e-books. It is the private or public distribution
of data or resources in a network with different levels of sharing privileges.
File sharing can be done using several methods. The most common
techniques include the following:
 Removable storage devices
 Centralized file hosting server installations on networks
 World Wide Web-oriented hyperlinked documents
 Distributed peer-to-peer networks
Sharing Resources and Accessing Shared Resources
1. Open My Computer, double-click the C: drive, and create a new folder
on the C: drive. Name it Shared. Right-click the Shared folder and select
Properties.
2. In the Shared Properties dialog box, select the Sharing tab.
 Notice that the Select the Share This Folder button.
 Type the Share Name. Click Apply and the computer you are linked to
should be able to view your Shared folder.
3. Right-click My Network Places, which should be located on your desktop.
Select Properties.
4. Right-click your connection
(look for a name like Local Area
Connection) and again select
Properties.
5. In your Local Area Connection
Properties dialog box, select
File and Print Sharing for
Microsoft Networks and click
OK. If you don’t see an option
for File and Print Sharing, click
Install and select a service and
then click Add. Now select the
File and Print Sharing option.
Figure 101. My Computer
158
6. Open My Network Places- double-click the icon- and select the Entire
Network option under Other Places at the left of the window. In the main
(right-hand) pane, you should see one or more options. Double-click the
Microsoft Windows Network icon.
Local Disk (C:PC 1)
Figure 102. Shared Document Properties
Window
Figure 103. Microsoft Windows Network
Window
159
7. You’re now at the main network screen, where you should see what’s
called a workgroup. A workgroup is a basic group of computers connected
to the same Ethernet network. Double-click the workgroup to see all the
computers connected to your Ethernet network.
At this point, you can access any of the other computers and see what
folders they have shared. If you don’t see any computer but your own, just
wait a few minutes and refresh your screen. If you don’t see other computers,
then it’s time to troubleshoot the network problems.
Printer Sharing
One of the primary reasons that networks were developed was to allow
groups of computer users to share peripheral devices such as printer. Sharing
a single printer among a group of users costs much less than buying a printer
for each computer.
Low-cost printers usually require a separate print server to allow
network connectivity because these printers do not have built-in network
interfaces. The computer that is connected to the printer can serve as the
print server. Most personal computer operating systems have built-in printer
sharing capability.
Figure 104. Shared Documents Window
160
Setting up printer sharing is simple with Windows XP. The following
steps enable a computer to share a printer:
Step 1. Choose Start > Printers and Faxes.
Step 2. Right-click the printer, and choose Properties.
Step 3. Click the Sharing tab.
Step 4. Click the Share this printer radio button.
Step 5. Keep or change the share name.
Step 6. Click Apply.
All the computers that use the shared printer must have the correct
drivers installed. Drivers for other operating systems can be installed on the
print server.
To connect to the printer from another computer on the network,
choose Start > Printers and Faxes > Add Printer. The Add Printer Wizard
appears. Follow the steps using the wizard.
161
Essay Writing
Directions: Give an explanation on how you understand the subject. Provide
at least 5 sentence response per item.
1. Cite the importance of file sharing and give an example scenario where its
worth was proven.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
2. Cite the advantages and disadvantages of printer sharing.
Advantages Disadvantages
Example Situation Example Situation
Read and Examine
Directions: Use other reference to understand more about printer sharing.
Present your answer to the class.
1. What is a print server?
2. What are the functions of a print server?
3. What are the different types of print servers? Describe each.
162
Share a Folder, Share a Printer, and Set Share Permissions
Directions: In this activity, you will create and share a folder, share a printer,
and set permissions for the shares. You will be given 30 minutes to complete
the task. You will be rated based on the performance criteria provided below.
Recommended Equipment
 Two computers running Windows XP Professional that are directly
connected to each other or through a switch or hub.
 A printer installed on one of the two computers.
Procedures:
Step 1
 Choose My Computer > Tools > Folder Options
 Click the View tab.
 Uncheck the “Use Simple File Sharing (Recommended)” checkbox,
and then click OK.
Step 2
 Right-click the desktop, and then choose New > Folder.
 Type Example, and then press the Return key.
Figure 105. Folder Options Window
163
 Open WordPad. Type “This is an example document”.
 Save the file in the “Example” folder with the name “Brief.doc”, and then
close WordPad.
Step 3
 Right-click the Example folder, and then choose Sharing and
Security.
 Click the Share this folder radio button, and then click OK.
 What is the icon of the “Example” folder?
 On the computer with the shared folder, right-click My Computer, and
then click the Computer Name tab.
Step 4
 On the other computer, choose Start > Run…
 Type computernameExample, where computer name is the name
of the computer with the “Example” folder, and then press the Enter
key.
 Open the “Brief.doc” file.
 Delete the text in the “Brief.doc” file, and then choose File > Save.
Figure 106. Sharing Tab Window
164
 Click OK. Close WordPad, and then choose NO when prompted to
save changes to the file.
Step 5
 Return to the computer with the shared folder.
 Right-click Example folder > Sharing and Security, and then click
Permissions.
Step 6
 Open the Control Panel on the computer with the attached printer.
 Choose Printers and Other Hardware > Printers and Faxes.
 Right-click the icon of the installed printer, and then choose Sharing….
 Click the Share this printer radio button, and then click OK.
Step 7
 Return to the computer that is not directly connected to a printer.
 Open the Control Panel. Choose Printers and Other Hardware >
Printers and Faxes.
 Choose File > Add Printer on the screen below.
Figure 107. Sharing Printer Tab Window
165
 The “Add Printer Wizard” window appears.
 Click Next.
 The Local or Network Printer of the Add Printer Wizard window
appears. Click the A network printer, or a printer attached to
another computer radio button, and then click Next.
Figure 108. Printer and Faxes Window
Figure 109. Add Printer Wizard Window
166
 The “Specify a Printer” window appears.
 Click the Connect to this printer radio button, and then click Next.
 The Browse for a Printer window appears.
Figure 110. Local or Network Printer Option Window
Figure 111. Specify a Printer Window
167
 Expand “Shared printers”.
 Choose the printer from the list, and then click Next.
 The “Default Printer” screen of the “Add Printer Wizard” appears.
Click Next.
 The “Completing the Add Printer Wizard” window appears.
Figure 112. Browse for Printer Window
Figure 113. Default Printer Screen
168
 Click Finish.
Step 8
 Choose Start > Printers and Faxes.
 Right-click the printer you installed, and then choose Properties.
 The “Printer Properties” window appears.
 Choose the General Tab, and then click Print Test Page.
Figure 114. Completing the Add Printer Wizard Screen
Figure 115. Printers and Faxes General Tab
169
 Click OK in the confirmation dialog box, and then click OK to close the
printer properties window.
Step 9
 To test the functionality of file and printer sharing, you must be able to
print a document or try the sample print feature of a printer.
Performance Rubrics for Sharing Files and Printer
CRITERIA Excellent
4
Good
3
Fair
2
Poor
1
Safety Procedures
(15%)
-Applied/Observed
safety precautions while
working
Adherence to the
Procedures (30%)
-Followed the
procedures
systematically
Workmanship (15%)
-Had organized
materials and tools
while accomplishing the
task and has time
management
Functionality (40%)
-Had set up a functional
file and printer sharing
system and was able to
come up with a printed
hard copy through it
170
Lesson 3. Inspect and Test Configured
Computer System and Network
In general, testing is finding out how well something works. For human
beings, testing tells what level of knowledge or skill has been acquired. In
computer hardware and software development, testing is used at key
checkpoints in the overall process to determine whether objectives are being
met. For example, in software development, product objectives are
sometimes tested by product user representatives. When the design is
complete, coding follows and when finished, this is then tested at the unit or
module level by each programmer; at the component level by the group of
programmers involved; and at the system level when all components are
combined together. At early or late stages, a product or service may also be
tested for usability.
After having completed the configuration phase, you are now
ready to face final chapter of configuration which is inspecting and
testing configured computer system and networks. The lessons in this
segment will focus on the guidelines and methods on inspecting and
testing of computer system and networks. So at the end of this lesson
you should be able to:
 follow OHS procedures in testing configured computer
system and networks;
 testing configured computer system and networks; and
 accomplish a technical report.
171
Safety Precautions
Occupational Health and Safety (OHS) Policy – An Information and
Communication technology (ICT) student should know how to behave when
working in the computer laboratory, and to accomplish task safely. Safety
practices should be learned early and always adheres in working with any
electrical and electronic device, including personal computers and its
peripherals. This is for your protection as well as to the people working with
you, and for the devices that you are using.
Occupational safety and health (OSH) is a planned system of
working to prevent illness and injury where you work by recognizing and
identifying hazards and risks. Health and safety procedure is the responsibility
of all persons in the computer and technology industries. You must identify
the hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environment.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other
people from harm.
4. If the hazard can be easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. After clearing the hazard, fill out the correct documentation to assist
in identifying improved practice to reduce further incidence of hazards.
172
All hazards must be reported using an Accidental Report form. This
enables us to track the kinds of hazards we have in our workplace, and take
action when necessary to make it safer for all student and clients.
Accident Reports
Forms are used to give specific details with regards to accidents that
happened in the laboratory during experiments.
Accident reports contain the following details:
 Name of the person injured
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents
Accident Report Sample Form
Form No: Accident Report Form
Date:
Rm. No:
Name: Yr/Sec:
Type of Injury Cause of Injury Remedy
173
Hazardous substances
If the workplace hazard appears to be dangerous to staff and clients
and professional assistance is required:
A. Call the supervisor or manager and advise them of the problem and
the urgency of the matter.
B. Depending on the risk, an evacuation may be called.
C. Follow the evacuation procedure.
D. The supervisor or manager will call in the fire brigade or specialized
personnel who will deal with the spill.
Fire Exits
All fire exits should be kept clear from any obstacles. All students have
a responsibility to make sure that chairs, empty boxes or any other type of
obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to
ensure that in the event of an emergency there is a clear exit.
Fire Safety Procedure
Each work area has a designated fire warden, who in the event of a
fire will take charge. They are recognized by the use of the red hard hat they
wear.
If you find the fire:
 Assess the danger prior to doing anything.
 If it is safe, assist anyone to move away from the vicinity of the fire.
 If it is possible, close the door to the fire area.
 Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.
 Break the glass section of the fire alert call point.
 Call to the switch; ensure you know where the fire is, any other details
that may be of assistance to the fire brigade. Details could be size of
the fire, cause or type of fire, any people hurt or trapped, has anyone
tried to put it out.
 If it is safe to do so, put out the fire with the correct extinguisher or fire
hose.
174
If the designated fire officer is not present, someone quickly needs
to take responsibility and:
1. Locate the source of the fire.
2. Locate any people.
3. Remove all people from the building.
4. Once outside, do a head count.
5. Notify the authorities.
Personal Safety While Working with PCs
Computer equipment can be dangerous, and you or others can be
injured or even killed if you don’t follow proper safety guidelines when
working along with PCs. The following are some precautionary measures to
take before working with any computer equipment:
 Wear shoes with non-conductive rubber soles to help reduce the
chance of being shocked or seriously injured in an electrical accident.
 Do not work on components that are plugged into their power source.
 Do not remove expansion cards from a computer when it is turned on.
 Remove jewelries when working inside any computer-related
equipment.
 Be sure not to pour water on electronic components.
Guidelines for Testing Configured Computer System and Network
Testing Your Computer Network
You've set up all your network switches, plugged in all the cables, and
configured all your computers. One task remains before you can declare your
network is finished: You must verify that the network works as expected.
Here are a few simple tests you can conduct to make sure your network is
functional:
 Check the physical connections.
Check that the Link light — the little red or green light next to the RJ-45
port — is lit on every computer. You must check this light both on the
computer itself and on the switch or router the computer is plugged into. If
this light is not on, you have a connection problem — most likely a bad cable.
175
 Verify that you can log in.
When you're sure the physical connections are good, you should
attempt to log in to each of your network computers using a valid domain
user account.
 Check the network configuration.
Click the Start button, type cmd and press Enter. Then, enter the
command ipconfig /all and press Enter.
This command will spit out numerous lines of information. The line
you're looking for should resemble this:
IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred)
If this part of the output does not show a valid IP address, you need to
check that your IP configuration is set correctly and that your DHCP server is
working.
 Verify that the computers can ping each other.
Another basic test you should perform is to use the ping command
from a command prompt to make sure that the computers on your network
can contact one another.
Do several ping tests. First, make sure that TCP/IP is up and running
by having the computer try to ping itself. Open a command prompt and
type ping local host. The output from this command will indicate whether or
not the ping was successful.
Next, try to ping your servers by name. For example, if your file server
is named FileServer01, use the command ping FileServer01.
176
Writing a Technical Report on Test Conducted
Technical Report is any document that records the procedure adopted
and results obtained from a scientific or technical activity or investigation. Use
the following format for a technical report for your recently conducted test.
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:________________________________________
Date of Inspection: __________________ Time: _________________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
177
Testing the Wireless NIC
Directions: In this activity, you will check the status of your wireless
connection, investigate the availability of wireless networks, and test
connectivity. After accomplishing the task you need to write a technical report
regarding the test conducted.
Recommended Equipment
 A computer with Windows XP Professional installed
 A wireless NIC installed
 An Ethernet NIC installed
 Linksys WRT300N Wireless Router
 Internet connectivity
Step 1
 Disconnect the Ethernet patch cable from your computer.
 A red “X” appears over the “Local Area Connection” icon.
 Hover over the “Wireless Network Connection” icon in the tray.
 Open a command window.
 Ping 127.0.0.1.
Figure 116. Local Area Connection- A Network Cable is Unplugged
Figure 117. Wireless Network Connection Icon in System Tray
178
 Use the ipconfig command.
 Get IP address of the default gateway.
Figure 118. Ping 127.0.0.1
Figure 119. Ipconfig window
179
 Ping the default gateway.
 A successful ping indicates that there is a connection between the
computer and the default gateway.
Step 2
 Open a web browser.
 Type www.google.com in the “Address” field, and then press Return.
Step 3
 Open the Network Connections window.
Figure 120. Ping the Default Gateway
180
 Right-click the wireless connection and choose Properties.
 Click the Wireless Networks tab.
 Click the View Wireless Networks button.
Figure 121. Network Connections Window
Figure 122. Wireless Networks Tab
181
TECHNICAL REPORT ON TEST CONDUCTED
Name of Technician:_______________________________________
Date of Inspection: __________________ Time: _______________
Device Tested:
Specification:
Diagnosis:
Action Taken:
Remarks:
182
A. Paper and Pencil Test
General Directions: Read the items very carefully. Write your answer in a
clean sheet of paper.
Test I. True or False
Directions: Write TRUE if the proceeding statement is correct and FALSE if
otherwise.
_______1. A safe workplace is clean, organized and well-lit.
_______2. One must unplug the power from the source before opening a
case and performing services.
_______3. It is a best practice that a fire extinguisher and first aid kit must be
available in the workplace.
_______4. You are allowed to open the power supply or a monitor.
_______5. You can bring food and drinks inside the laboratory.
_______6.The key to a well-tuned computer system is proper configuration.
_______7. Boot log stores all information from the boot process.
_______8. Registry is a collection of database of configuration in Windows
operating system.
_______9. The shortcut of Microsoft Configuration is ipconfig.
_______10. Configuration is the way a system is set up.
Test II. Multiple Choice
Direction: Write the letter of the correct answer.
1. What boot configuration utility allows setting the programs that will run at
startup?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
2. What application allows you to edit the registry?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
3. Which of the following enables you to test sound and graphics output?
a. Ipconfig c. msconfig
b. regedit d. dxdiag
4. Which of the following is an applet that controls the look of windows?
a. Appearance and themes c. Performance and Maintenance
b. Network and Internet d. Sounds, Speech and Audio
183
5. Which of the following applets does not belong to Performance and
maintenance category?
a. Administrative tool c. Power Options
b. Automatic Updates d. System
6. Which of the following wizard is used to configure windows for vision,
hearing and mobility needs?
a. Accessibility Option c. Sounds, speech and audio
b. Security Center d. User Accounts
7. A tab in direct X Diagnostic tool that displays your current audio settings.
a. Input c. Sound
b. Music d. System
8. Which of the following is the most commonly used networking cable
category?
a. Cat3 c. Cat 5 and 5e
b. Cat 5 d. Cat 6
9. What do you call a copper-cored cable surrounded by a heavy shielding?
a. coaxial cable c. optical fiber
b. fiber optics d. twisted pair
10.What Ethernet cable is used to connect two devices directly?
a. Cross-Over c. both A and B
b. Straight-through d. None of the options
11.Which of the following is a number used to identify a device on a
network?
a. Default gateway c. IP address
b. DNS Server d. subnet mask
12.In which of the following IP address does 192.168.1.105 belong?
a. Class A c. Class C e. Class E
b. Class B d. Class D
13.What command is used to test the ability of the source computer to reach
a specified destination computer?
a. Ipconfig c. Ping
b. Msconfig d. Regedit
14.What do you call an approach to computer networking where all
computers show equivalent responsibility for processing data?
a. Client server c. Peer-to-client
b. Peer to peer d. None of the options
15.Which of the following is an example of Class A subnet mask?
a. 255.0.0.0. c. 255.255.255.0
b. 255.255.0.0. d. 255.255.255.255
184
Test III. Matching Type
Direction: Match Column A with Column B.
A B
1. Copper cabling used for telephone
communication
2. Standard Ethernet cable
3. Cable that has a very thin core
4. Cable that has a thicker core
5. Tool used for crimping RJ45
6. Connector for Cat 5e cable
7. Set of rules
8. Indicates the network portion of an
IP address
9. Command used find out the ip
address
10.Glass or plastic conductor
a. Crimping tool
b. Cross- over
c. Fiber- optic
d. Ipconfig
e. Multi- mode
f. Ping
g. Protocol
h. RJ45
i. Single- mode
j. Straight-through
k. Subnet mask
l. Twisted pair
Test IV. ACRONYMS
Direction: Give the complete meaning of the following acronyms.
1. UTP
2. STP
3. IP
4. TCP /IP
5. HTTP
6. FTP
7. SSH
8. IMAP
9. SMTP
10.DHCP
11.DNS
12.TTL
13.LAN
14.VPN
15.NIC
185
B. Skills Checklist
Configuration Skills
Directions: Listed below are the most important skills one must have in order
to configure computer systems and networks. The matrix lists the skills
expected you to master. Check the appropriate column which describes the
level of your confidence with the given skills.
Configuration Skills I can do it
confidently
3
I can do it
but with
assistance
2
I am not
confident
1
1. I can use the different
tools for configuration.
2. I can inspect networking
devices and connectors.
3. I can create a cross-
over and straight-
through Ethernet cable.
4. I can test the
functionality of an
Ethernet cable.
5. I can assign and
configure IP address.
6. I can execute the
ipconfig command
properly.
7. I can manage to create
a peer-to-peer
networking.
8. I can configure Network
Interface Card using
DHCP.
9. I can enable firewall
10.I can configure file and
printer sharing.
TOTAL
GRAND TOTAL
Add all the scores to get the grand total and then divide it by the total
number of items. Refer to the verbal interpretation on the next page to
determine your initial configuration ability.
186
Numerical and Verbal interpretation
Numerical Value Verbal Interpretation
2.51 – 3.00 Confident
1.76- 2.50 Confident but needs assistance
1.00 – 1.75 Not yet Confident
187
MODULE 4:
MAINTAINING COMPUTER AND NETWORK SYSTEMS
Content Standard Performance Standard
The learner demonstrates
understanding of the underlying
concepts and principles on
configuring computer systems and
networks.
The learner independently
demonstrates skills in configuring
computer systems and networks as
prescribed by TESDA Training
Regulations.
Number of Sessions (Time Allotment):60 HOURS
Computer Hardware Servicing: This course provides an excellent
introduction to the Information and Communications Technology (ICT)
industry and in-depth exposure to personal computers, hardware, and
operating systems in accordance to local industry requirements and
standards. You will learn the functionality of various hardware and software
components and best practices in maintenance and safety issues.
In this module, topics will be introduced progressively, for easy
understanding. After carefully answering the pre- assessment, reading all the
lessons, answering all the guide questions, performing all the activities,
showing pieces of evidences of learning and answering the summative test,
you will have a considerable knowledge and skills in installing computer
systems and networks essential to be successful in computer hardware
servicing as one of the career options in ICT.
188
There will be three (3) major topics that you will encounter: (1) will be
maintaining computer systems; (2) maintaining network systems; (3)
inspecting and testing configured/repaired computer systems and networks.
The three major topics contains sub-topics which the ultimate goal to teach
you how to maintain computer and network systems. This module contains
what to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND
as well as what to TRANSFER. The competencies for this module are:
LO 1. Plan and prepare for the maintenance of computer system and
networks
 Plan on how to maintain computer systems and networks
 Identify tools in maintaining computer systems and networks
 Inspect testing equipment and devices
 Check PC specifications
 Verify network functions and specifications
LO 2. Maintain computer systems
 Identify faulty computer systems
 Test normal functions of computer systems
 Perform repair and replacement of faulty computer systems
 Adhere to the recommended schedule and techniques in maintaining
and cleaning computer systems
 Respond to sudden breakdowns of computer systems in accordance
with established procedures
LO 3. Maintain network systems
 Follow OHS procedures in maintaining network systems
 Identify procedures in maintaining network systems
 Check or run the diagnostic software
 Adhere to the recommended schedule and techniques in maintaining
and cleaning network systems
 Respond to sudden breakdowns of network systems in accordance to
established procedures
 Run the burn-in test on computer systems
189
LO 4. Inspect and test configured/repaired computer systems and
networks
 Maintain the computer systems and networks to ensure safe
operations
 Run or conduct computer-to-computer communications
 Connect computer systems to the internet
 Check computer system and network to ensure safe operations
 Run the burn-in test on computer systems
 Conduct final inspection on the tests undertaken
 Prepare technical reports that comply with the job requirements
In order to master the above listed competencies, you must be
knowledgeable of the topics under what to KNOW, perform activities required
under what to PROCESS, accomplish additional meaningful tasks under what
to REFLECT and UNDERSTAND and finally show some pieces of evidence
of your learning by transferring what you have learned in a different context
under what to TRANSFER.
190
You will be challenged to dig deeper into your prior knowledge and
previous experiences about computer hardware servicing.
SKILLS TEST
Directions: Listed below are some of the most important skills that you must
master in order to render quality service when you enter the industry of
Computer Hardware Servicing. Read the skills carefully. Write “YES” if you
can do the skill and “NO” if not. Feel free to answer each skill. Write your
answers in your notebook.
I can… YES NO
plan and prepare work to ensure occupational
health and safety (OHS) policies and procedures
are followed.
obtain materials, tools, equipment and testing
devices needed to conform with job
requirements.
interpret work instructions according to job
requirements.
obtain computer components/ devices/ systems
and determine its location prior to installation.
install equipment / devices / systems in
accordance to job requirements.
check / test devices / systems and / or
installations to determine the conformity to job
requirements.
check computer systems and networks for
configuration in accordance with specifications
and requirements.
diagnose fault or problem in the computer
systems and networks in line with standard
operating procedures (SOP).
configure the identified systems and networks
based on specifications and job requirements.
inspect and test configured computer systems
and networks in conformity with manufacturer's
instructions / manual.
correct / adjust components or parts of computer
systems and networks in accordance with job
requirements.
191
test computer systems and networks to ensure
safe operation.
perform scheduled / periodic maintenance in
accordance with manufacturer's requirements.
make needed repairs / replacements in
accordance with established procedures, when
necessary.
clean and clear worksite of all surplus/excess
materials in accordance with company SOP.
Lesson 1. Procedures in Planning and Conducting Maintenance
Preventive Maintenance
Preventive maintenance can be described as maintenance of
equipment or systems before fault occurs. It can be divided into two
subgroups: Planned Maintenance and Conditioned-Based Maintenance.
Planned Maintenance (PM) is any variety of scheduled maintenance to
an object or item of equipment. Specifically, PM is a scheduled service visit
carried out by a competent and suitable agent, to ensure that an item of
equipment is operating correctly to avoid any unscheduled breakdown and
downtime of an equipment.
Condition Based Maintenance (CBM) is a maintenance strategy that
uses the actual condition of the asset to decide what maintenance needs to
be done. CBM dictates that maintenance should only be performed when
certain indicators show decreasing performance or upcoming failure.
Checking a machine for these indicators may include non-invasive
measurements, visual inspection, performance data and scheduled tests.
Condition data can be gathered at certain intervals, or continuously.
The purpose of systematic inspection, detection and correction of
existing / future problems is very important to maintain equipment / facilities in
satisfactory condition before it may cause major problem.
Maintenance, including tests, measurements, adjustments, and parts
replacement, performed specifically to prevent faults from occurring.
Maintenance is divided into two (2) general type. Preventive
maintenance is given for maintaining equipment and facilities in satisfactory
operating condition to extend the life of the equipment. Corrective
maintenance is task performed to identify, isolate and rectify a fault so that
the failed equipment or system can be restored to an operational conditions
within the tolerances or limits.
192
Common methods of determining what preventive (or other) failure
management policies should be applied are: Original Equipment
Manufacturer (OEM) recommendations, requirements of codes and legislation
within a jurisdiction, what an "expert" thinks ought to be done, or the
maintenance that is already done to similar equipment, and most important
measured values and performance indications.
Maintenance Procedures
In preparing maintenance procedure, you also have to consider
designing a systematic plan for both for hardware and software. This saves
time, money and frustration and ensures safe conditions to prevent injury to
people and damage to computer equipment.
Planning Maintenance Procedures for Computer System and Networking:
A. Design a systematic maintenance plan for hardware.
1. Design a monitoring, evaluating and updating plan.
2. Place your computer in a well-ventilated area.
3. Schedule the use of computer for its longer life.
4. Move the computer only when it is turned off and unplugged.
5. Treat your computer properly.
B. Design a systematic maintenance plan for your software.
1. Backup your files.
2. Install or secure passwords.
3. Delete temporary files.
4. Update anti-virus and spyware.
Figure 123. Computer Inspection
193
Design a systematic monitoring, evaluating and updating plan for
hardware.
Computers have significantly changed the working environment,
simplifying and speeding up many tasks across many work areas. However,
with these advances are some potential problems and maintenance issues.
These guidelines describe how computer technicians, students and computer
users can work together to achieve a productive workplace environment. The
guidelines reflect current knowledge and best practice for the use of computers
so you can achieve maximum efficiency and safety in your workplace.
SAMPLE MONITORING PLAN
Date:
Comp
1
Comp
2
Comp
3
Comp
4
Comp
5
Recommendations
Monitor is
functional.
Printer
Cartridges are
replaced.
Storage devices
are functional.
Optical Drives
are functional.
Place your computer in a well-ventilated
area.
 This will allow proper circulation of air
inside the computer unit.
Schedule the use of computer for its longer
life.
 This will help lessen the attacks of viruses
and increases the life span of your computer.
Figure 124. Computer Laboratory
Figure 125.Computer Usage
194
Move the computer only when it is turned
off and unplugged.
 To avoid damage to the computer unit
always turn off and unplugg it when
transferring the computer to another
location.
Treat your computer properly.
 This means taking care of your computer. PCs
and laptops should be properly turned off.
Do systematic maintenance plan for your
computer software.
Back-up your files
 Protecting your files means creating backups,
storing your file backups on your hard drive or
any removable storage device regularly.
Figure 126. Unplugged Power Cable
Figure 128.Backup Media
Figure 127. Computer care
195
Install or secure passwords.
 Installing passwords makes your files
more secure.
Delete temporary files.
 Deleting the temporary files on your
computer will enhance its speed and
will create more disk space for your
files.
Update anti-virus and spy ware.
 Regularly update your anti-virus for
your computer protection against
viruses.
Figure 129. Installing Passwords
Figure 130. Deleting Temporary Files
Figure 131.Updating Anti-Virus
196
Diagnoses and Identification of Faulty Computer and Network Systems
The following topics will familiarize you with planning and preparing for
installation; installing equipment and devices; and conducting test on the
installed computer system. Read carefully all the topics and apply the skills you
have gained from the lessons provided in this module.
A. Preventing Computer Systems Failure
Computers, in general, are pretty stable, and you can usually rely on
them to not fail you. However. If you develop some basic habits, you can
postpone serious computer problems, if not avoiding them entirely.
1. Computer issues. Know
that your computer is going
to fail. You need to treat
your computer as if it were a
doomed failure. Always
assume that failure is
imminent.
A fatal error results in
data loss, damage to your
computer and/or its ability to
function, hardware failure, or other serious issues.
Signs of imminent failure might include regular poor performance, frequent
errors and/or popups, unknown programs being installed, frequent power loss
(the computer shuts down automatically frequently), frequent crashes, or
certain parts not working.
Figure 132. Computer issues
197
2. Dust issues. Preventing failure means
making sure your computer is physically
clean in its operations. Make sure that
there is not too much dust inside,
especially on the fans. Dust can reduce
performance and cause overheating.
3. RAM issues. Know your computer's
specifications and its limits. RAM runs
even the PC is running idly. It consumes
RAM storages capacity making you
difficult to open a program if RAM storage
had been consumed.
4. Malware issues. Make sure that your anti-virus software is updated to be
able to scan unnecessary files that enter your PC. Do not install programs
that you’re not familiar with or if do not fully trust.
5. Hardware issues. When something is not
working properly, either diagnose the problem
yourself and fix it, to prevent further damage or
contact a professional and have them look at it
for you. Take advantage of warranties on parts
if they fail.
Figure 133. Inside the System Unit
Figure 134. Random Access Memory
Figure 135.Hardware
198
6. Warning issues. If the same error
message shows up every time you
log in, be sure to investigate it.
Although unlikely, these errors could
be important.
7. Usage issues. Give your computer a break.
Believe it or not, your computer likes rest, too.
Leaving it on all of the time wears out hardware,
and puts unnecessary wear and tear on the
hardware. Giving your computer a break also
saves you money (electrical bills).
8. Warranty issues. Always take advantage
of warranties. Get a warranty to protect your
hardware, so it can be replaced in case of
failure.
9. Backup issues. Back-up everything.
Run regular backup of your important files to
other disks, computers, or an online backup
service.
Figure 137. Power Off
Figure 139. Storage Media
Figure 136.Error Messages
Figure 138. Warranty Sticker
199
10. Error message issues. If your PC
fails to function, diagnose the problem.
Write down the necessary info such as
error messages or things don’t work
properly. If you know how to fix it, do it, to
avoid further damage but if not then seek
for professional help.
Network Problems
When you suddenly cannot connect to the Internet, any of several
things could be wrong. Use this checklist to find and solve common Internet
connection problems.
1. Unplugged Network Cable
Unplugged or loose network cables are one of the most common
reasons why you might suddenly find yourself unable to connect to the
Internet. That's a problem on wireless networks, but on most laptops the
wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On home
networks, it's also possible that someone unplugged the router.
Action: Ensure your wired or wireless network hardware is switched on and
plugged in.
2. Website Temporarily Offline
What may seem to be a network problem connecting to the Internet is
sometimes simply a Web site (or whatever server is on the other end of the
connection) being temporarily offline.
Action: Before assuming your Internet connection is faulty, try visiting several
popular Web sites rather than just one.
3. IP Address Conflicts
If your computer and another on the network both have the same IP
address, the conflict between them will prevent either from working properly
online.
Figure 140. Error Messages
200
Action: To resolve an IP conflict, follow these instructions to release and
renew your IP address. If your network uses static IP addresses, manually
change your IP to a different number.
Windows XP
Step 1:
Click Start > Run. In the Run window, enter “cmd” then click OK.
Step 2:
On the command prompt, enter “ipconfig/release” then press [Enter].
Step 3:
Once the IP address becomes 0.0.0.0, enter “ipconfig/renew” then
press [Enter].
4. Computer Firewall Malfunctions
Firewall software running on most computers is intended to prevent
unwanted network traffic from disrupting its operation. Unfortunately, these
software firewalls can malfunction and start blocking valid Internet traffic.
When two software firewalls, such as Windows Firewall plus a third-party
201
product, are installed on the same computer, contention between the two can
also incorrectly block traffic.
Action: If you have recently installed or upgraded software firewalls on your
computer, temporarily disable them to determine whether it may be the cause
of Internet connection problems.
5. Outside Wireless Signal Range
The performance of Wi-Fi network connections depends on distance
between the device and the wireless access point. The farther away a Wi-Fi
device is, the slower the local connection generally runs, until it breaks
altogether. Wireless signal interference in the area can also limit the effective
range of a Wi-Fi connection. Whenever you are unable to reach the access
point, you also cannot connect to the Internet, obviously.
Action: Use one of the options written below to measure the strength of your
wireless signal and try these ideas to expand the range of your Wi-Fi.
Ideally, you should place the router at a height in some central location and
away from other cordless devices. Make sure that the router is not placed
near something metallic (like an almirah or window grills) as that will weaken
the wireless signals. Avoid mirrors as they can reflect the wireless signals
away from the desired direction.
Wireless routers generally ship with omni-directional antennas but you can
replace them with more powerful uni-directional antennas and that will keep
the signal from getting broadcast in all directions.
6. Wireless Network Configuration
Wi-Fi networks with encryption options like WPA or WEP turned on
require computers to use matching security keys when connecting. If
someone changes the encryption keys or password on the access point,
devices that worked before will suddenly be unable to establish sessions and
Internet connections. Likewise (though less likely), if the access point settings
are changed to require using a specific Wi-Fi channel number, some
computers may be unable to discover it.
Action: Confirm that the Wi-Fi channel number and encryption keys on your
router have not recently changed (check with the network administrator if
necessary). When using a hotspot, follow the provider's instructors for signing
in carefully.
202
7. Broadband Router or Access Point Malfunctions
Home networks that use broadband routers are easier to manage than
those without one, but technical glitches with the router can also prevent
computers from connecting to the Internet. Router failures are caused by
overheating, excessive traffic, or simply a faulty unit. Typical symptoms of a
flaky router include computers on the network not being able to obtain IP
addresses, or the router console not responding to requests.
Action: Check the router's lights and console if possible to ensure it is
running and responding properly. Troubleshoot and reset the router if
necessary. Change the old router if necessary.
8. Blocked By Your Service Provider
Internet Service Providers (ISPs) can choose to block access from
your account if you fail to make payment or otherwise violate the provider's
Terms of Service. Especially when using paid hotspots that charge by the
hour or day, sometimes people forget to keep their subscription updated.
Other common reasons an ISP might block your account include exceeding
bandwidth caps, sending spam e-mail, and downloading illegal or
inappropriate content.
Action: Contact your ISP if you suspect your account has been blocked.
9. Computer Glitches
Computers suffer from technical glitches or malfunctions. Although
relatively uncommon nowadays, a computer's network adapter hardware
might suddenly fail due to overheating or age. Failures in the operating
system software that control the adapter, on the other hand, can occur
frequently especially with computers that are heavily used. Viruses and
worms also may disable or block a computer's network interfaces from
functioning properly. If using a laptop or other mobile device, transporting it
from one location to another can corrupt the state of its network.
Action: Check the computer and remove any malware that you will find. On
Windows computers, try resetting the network connection. Reboot the
computer if necessary.
10. Network Downtime
Those using satellite Internet service may notice they canot connect to
the Internet during periods of very bad weather. Providers in dense urban
areas (including cellular Internet carriers) sometimes are unable to support
203
peaks in network traffic that causes sporadic outages for some customers.
Finally, those who subscribe to newer or more complex forms of Internet
services (such as fixed wireless broadband) may experience more downtime
than others as providers encounter more issues with relatively less mature
equipment.
Action - If all else fails, contact your Internet provider to verify whether they
are experiencing an outage. Some providers also give advice on
troubleshooting problems connecting to their network.
Slide Show Computer and Network Errors
Directions: In this worksheet, you will write the computer errors/problems,
error messages and the network problems you encountered. Create a
Powerpoint presentation.
Be prepared to discuss your answers.
Computer Problems Network Problems
Pictorial Tour
Directions: Form a group of five members and make an additional research
on the different diagnoses on faulty computer and network systems. Visit
computer shops in your community. You can also interview/observe a
practitioner while lending a quality service in computer hardware servicing.
204
Video Demo
Application of Diagnosis on Faulty Computer and Network Systems
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through video demo. You can use a
video camera to record the event stressing the diagnosis on faulty computers
and networks system. This event will be presented through a video
presentation using projectors or monitors. You will be rated based on the
rubrics written below:
CRITERIA PERCENTAGE SCORE
Accuracy (Role and function of a device
was accurately shown)
30%
Presentation (Organization or sequence
of the play and appropriate gestures were
used)
30%
Clarity (Diagnosis clearly delivered) 30%
Team work (Cooperation of each member
was evident)
10%
Performance Rating
Maintain Computer and Network System
As a future computer technician, you must be diligent and eager to
know the different procedures in using the tools for configuring computer and
network systems because this will guide you to carry out a particular job in a
proper manner. Once you already identify the competencies, you must also
acquire the appropriate skills to apply it in real time situations.
This part will help you to find out some of the required procedures in
computer system configuration. Some of them are intentionally not included
so that you will have a chance to explore and learn through your own
experience and study.
The subsequent statements below describe the varied procedures in
using Action Center in the Control Panel:
205
Windows and other Microsoft products have their own built-in
troubleshooting tools that bear little or no resemblance to the Fix It
troubleshooters. Windows 7's Action Center Control Panel applet alerts you to
system problems via an icon in the taskbar's notification area. You can also
use the Action Center to view the machine's security and maintenance
status.
Go to the Action Center's link
to the Control Panel's
Troubleshooting applet to find about
a dozen options for fixing problems
related to program compatibility,
hardware and audio, networking,
security, Windows Update,
performance, and power usage.
(Information for troubleshooting
Vista and Windows XP is available
on Microsoft's TechNet site.) Here is
how:
1) Click on the Start Button.
2) Choose Control Panel.
3) Select System and Security.
4) Choose Action Center.
5) On the Action Center, browse
and check all the options for systems
check.
 Security (View Anti-Spyware
Programs, update virus
protection)
 Maintenance (Perform System Maintenance, Check for Solutions for
unreported problems, Setup Backup)
 Troubleshooting
 Recovery
Figure 141. Control Panel
Figure 142. System and Security
206
Windows Security Center can help enhance your computer's security by
checking the status of several security essentials on your computer, including
firewall settings, Windows automatic updating, anti-malware software
settings, Internet security settings, and User Account Control settings. If
Windows detects a problem with any of these security essentials (for
example, if your antivirus program is out of date), Security Center displays a
notification and places a Security Center icon Picture of the red Security
Center shield in the notification area. Click the notification or double-click the
Security Center icon to open Security Center and get information about how
to fix the problem.
When it comes to problems with Office applications, you are not likely to
find much help in the programs' built-in help systems. (Note that Office 2007
apps include a built-in diagnostic routine. See the Microsoft Support site for
more information.)
You could attempt to sort through the links on Microsoft's support site for
Office 2007 and 2010 or the equivalent site for Office 2003, but if the Office
Fix It solutions do not help, your best bet may be to use the repair feature of
the Office installer.
Figure 143.Action Center Dialogue Box
207
To do so, open the Control Panel Programs and Features applet (Add
or Remove Programs in Windows XP), select your version of Office, click the
Change button at the top of the list, then select Repair button in the wizard
that opens, and follow the wizard's instructions. The Microsoft Support site
provides more information about repairing Office 2010, Office 2007,
and Office 2003.
Even if your system appears to be running well, you may benefit from
using Microsoft's Fix It and other diagnostic tools. Most PC users rely on
automatic updates of their system, security, and application software. But
programs sometimes conflict in ways their vendors cannot predict. Few of
these software glitches slam the brakes on your system but they are likely to
slow it down a little or a lot.
Investigate and Interpret: Computer Systems Check
Directions: In this worksheet, you will check and write down the current
status of your computer systems before the updates and after the updates
with regard to the different area listed below. Be prepared to discuss your
answers and the updates made.
Area Status
(Before
Updates)
Status
(After Updates)
Security
1) Anti-Spyware Programs
2) Anti-Virus
Maintenance
1) System Maintenance
208
Investigative Report
Directions: To deepen your understanding about computer systems status,
search online or you can also interview a practitioner while rendering a quality
service in computer hardware servicing. Present your report to the class.
Ask their Profile (Name, Job description, Age, Business Name).
1. Interview them about procedures in maintaining their computer and
network systems or usual problems they encountered.
CRITERIA PERCENTAGE SCORE
Accuracy (Details in maintaining
computer and network systems were
elaborated well).
30%
Clarity (Clearly delivered each topic) 30%
Presentation (Organization or sequence
of information)
10%
Performance Rating
Magazine Article
Directions: Make an article regarding to the effects of ignoring computer
problems. Use the questions below as your guide in writing your article. Use
striking title and be creative. Be ready for an oral presentation.
1. What is the risk of turning off messages about spyware and related
protection?
2. What is the risk of turning off messages about virus protection?
Contents Excellent (5) Good (3) Poor(1)
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but
one with uppercase
letters.
Punctuation Correct ending
punctuation in every
209
sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing
and alignment.
Total Points
COMPUTER SPECIFICATIONS
What is Specification?
The specification or ‘spec’ is a list of the key components that make up
the computer. It is provided by retailers to help buyers decide which PC, and
which combination of features, they need. When buying a PC you start by
deciding what you want your PC to do. This tells the specification you actually
need.
When reviewing a computer specification, the most important
component to take are the processor, the size of RAM and the size of the
hard drive as these are central to the overall capability of the system. If it is
planned to use specialized programs for students with special needs, it is
advisable to purchase a suitable specification computer to meet the system
requirements for these programs.
210
Understanding a Specification
Sample specification for a certain desktop computers:
Processors
Two companies - Intel Inc. and AMD Inc. – are the manufacturers of
most of today’s PC processors and both offer a range that balances price and
performance. Processors are generally defined by their speed, in megahertz
(MHz) or in gigahertz (GHz), and this relates to the number of operations they
can perform per second. The higher the value, the faster the PC will perform
and the more expensive it is. More recent and more powerful processors use
a 64 Bit architecture, rather than the previous 32 Bit models.
Memory (RAM)
211
The main working memory in a computer is called random access
memory or RAM. The processor uses this memory to run programs. RAM is
measured in megabytes (MB). Most modern computers use DDR 2 RAM.
A minimum of 2024 MB (2GB) of RAM is recommended for general
purpose PCs. 2048 MB (2GB) of RAM is also sufficient for PCs running
multimedia applications, i.e., those on which digital music, digital video or
high-end graphics are being created/edited.
Storage – The Hard Drive
The hard drive is the computer’s primary storage area. It stores the
applications and programs that run on the PC, as well as any work created by
users. From a school’s perspective, the capacity of the hard drive, measured
in gigabytes (GB), is a key criterion and should be given due consideration
when reviewing PC specifications.
A hard drive capacity of at least 80GB is recommended for general
purpose PCs. A hard drive capacity of 200GB or more is recommended if
working with multimedia applications where large graphics and digital
audio/video files are being created and stored.
Other Specifications
Monitors
The older Cathode Ray Tube (CRT) have been largely replaced by
Liquid Crystal Display (LCD) and Light Emitting Diode (LED) flat-screens. A
15” LCD/LED has the same viewing area as the older 17” CRT.
Average entry-level PCs usually come with a 17” flat-screen and this is
adequate for most general purpose applications.
Larger 19” flat-screens are available and may be appropriate if video
editing and advanced graphics work is being carried out.
Teachers of students with special needs may want to consider using
larger monitors with their students.
Optical Drives
CD R/W drives are standard on PCs and allow the information on a
compact disc (either data or audio) to be read and written to by the PC. It is
defined by its speed (i.e., 48x or 48 speed).
DVD drives can read both CDs and DVDs. Standard on entry level
computers are 48x DVD-ROM/CD_RW drives and allows you to copy blank
CDs. High performance computer use 52x DVD-RWs. Educational software is
being developed in both DVD and CD formats, but a DVD can hold over 25
times more data than a CD.
212
Graphics and Sound Cards
These cards are installed inside a PC and are responsible for
determining the quality of the audio and visuals (graphics and video) output
by the computer. They hold their own memory (in MB), which is why they add
to a computer’s capability.
An integrated graphics card with 256MB of memory is recommended
for general purpose PCs.
Computers running high-end applications generally require a separate
256MB graphics card.
A sound card generally comes as standard in most PCs purchased
today. If students intend to work extensively with digital music, the school
should consider getting a high-end sound card as this will create greater
depth, complexity and realism of sound.
Speakers and Headphones
Most computers come with either built-in or external speakers. Schools
may also consider buying headphones to control sound levels within a
classroom or computer room. Cheap ‘headphone splitters’ can also be
purchased — these enable two sets of headphones to be used per computer.
Network Interface Card (NIC)
It is recommended that all PCs be purchased with a suitable network
interface card (NIC). A network card allows a computer to be connected to a
network. A 10/100/1000 Mbps (Megabits per second) card is the standard
network card today. Few school networks currently operate at speeds higher
than 100Mbps.
Operating Systems (OS)
PCs are generally purchased with an operating system pre-installed. It
is worth checking that your existing software will still work with the operating
system of any new systems being purchased. It may be possible to choose a
particular operating system and, if so, this may help standardize new
machines with existing school PCs.
At present, Microsoft’s newer OS is Vista, which generally performs the
same functions as Win XP. Microsoft XP Professional is still the most
common and recommended OS found in schools that meets their general
needs very well and is recommended for schools. As Vista operating system
can come in various types and configurations, schools should check that the
version of Vista will be suitable and compatible for the software and network
infrastructure of the school. Vista Home or XP home versions are not
recommended for use in schools, however when ordering computers schools
need to specify a base operating system. The choice of base operating
system should be made along with their choice of operating system license.
Operating system license costs depend on a number of factors including type
of school, or type of license, example once off purchase via Microsoft’s select
213
agreement or purchasing software per year via Microsoft’s schools
agreement.
Linux is an open source free operating system which is not widely used
by schools at present, though it may be suitable for schools who are aware of
its capabilities. The most widely used open source data base is Ubuntu. It is a
Linux based operating system and is distributed free along with the source
code. Its desktop looks somewhat similar to that of Windows, with window
controls and icons. There is reasonable large software support available on
Ubuntu; the common applications include Mozilla Firefox web browser,
LibreOffice office application suite, GIMP image editor.
OpenSolaris is a computer operating system developed by Sun
Microsystems. It runs well on desktops, laptops, servers and data centers.
OpenSolaris is GUI based like Ubuntu and has rich graphical desktop and
windows for easy navigation. It is now available in version 11 and can be
downloaded without any cost from the Oracle website.
Purchasing Considerations
Consider the following points when purchasing PCs
• What is the intended use of the PC and will the chosen specification fulfill
these aims?
• Is the PC compatible with existing computer equipment and software?
• Is the technical support service satisfactory?
• a minimum 1 year warranty including replacement if needed and full
parts and labor is recommended
• Will added peripherals be required such as headphones, and optical
mice.
• Easy access of multiple USB ports
• Operating System licensing options
214
Internet Research
In this worksheet, you will use the Internet, a newspaper, or a local store to gather information
about the components you will need to complete your customer’s computer. Be prepared to
discuss your selections.
Instructor Note: All the components a student chooses must be compatible with the components provided. (For
example, the selected CPU and RAM must work in the provided motherboard) No budget has been given. Answers
may vary.
Your customer already owns the case described in the table that follows.
Brand and Model
Number Features Cost
Cooler Master ATX Mid Tower
CAC-T05-UW ATX, Micro ATX compatible form factor
2 External 5.25" drive bays
2 External 3.5" drive bays
2 Internal 5.25" drive bays
7 Expansion slots
USB, FireWire, audio ports
Search the Internet, a newspaper, or a local store to research a power supply compatible with the components that
your customer owns. Enter the specifications in the table that follows:
Brand and Model
Number Features Cost
Sea Sonic 550 watt
SS-550HT Dual +12V
SLI Certified
Up to 88% efficiency
ATX12V/EPS12V form factor
Brand and Model
Number Features Cost
GIGABYTE LGA 775
GIA-965P-DS3 DDR2 800
PCI Express X16
SATA 3.0 Gbps interface
1.8V-2.4V RAM Voltage
1066/800/533 MHz Front side bus
4 memory slots
Dual-channel memory supported
ATA 100 connector
RAID 0/1
4 USB 2.0 ports
ATX form factor
215
Answer the following:
1. List three components that must have the same or compatible form factor.
2. List three components that must conform to the same socket type.
3. List two components that must use the same front side bus speed.
4. List three considerations when choosing memory.
5. What component must be compatible with every other component of the
computer?
Making a Checklist
Directions: Make a market study on components, its brand, functionality and
cost. You can ask computer vendors of the price lists and inquire of its
specifications. Choose two brands then make comparisons. Be ready for an
oral presentation.
Components Brand
No.1
Cost Cost Strengths Weakness
Processor
Motherboard
Memory
Graphic Card
Sound Card
Components Brand
No.2
Cost Cost Strengths Weakness
Processor
Motherboard
Memory
Graphic Card
Sound Card
216
Performance Score Card
Score Reference:
0 = Some facts are clearly
inconsistent with source
material
1= Some facts are
questionable/unrealistic
2 = All facts seem
accurate/good.
Computer Specifications
Directions: In this activity, you will create a complete list of specifications of a
one set desktop computers including its brand name and cost. Total all the
amount and present it to the class.
Performance Score Card
Score Reference:
0 = Some facts are
clearly inconsistent with
source material
1= Some facts are
questionable/unrealistic
2 = All facts seem
accurate/good.
Details Points
Brand model is precisely given
Cost is based on the market
selling price
Strength/weakness are accurate
Presentation skills (Clarity of the
voice)
TOTAL
Details Points
Brand Model is precisely given
Cost is based on the market selling price
Complete list of the given hardware were
enumerated well
Presentation (Clarity of the thought and
voice)
TOTAL
217
Networking Hardware Requirements
Although setting up a home network is not necessarily an expensive or
difficult project, you just need to have few basic pieces of hardware to
connect your computers, printers, gaming consoles, and assorted gadgets to
each other — and to the Internet.
Need Purpose
DSL or Cable
Modem
A DSL or cable modem connects your computer to a
high-speed DSL or cable Internet connection. Although
dial-up modems are still available for slower dial-up
Internet connections, the connection speeds are far too
slow for a home network.
Wired or
wireless
router
A wired or wireless router connects your DSL or cable
modem to your home network. Many DSL/cable modems
now have built-in routers that allow you to connect your
network directly to your Internet connection.
Wired or
wireless
network
adapters
A wired or wireless network adapter is the device in your
computer (or printers, gaming consoles, and other
networking equipment) that connects your computer to
your network.
Ethernet
cabling
Ethernet cabling is used to connect your wired network
adapters to a router or network switch. Even if you are
using a wireless router, you will need at least one
Ethernet cable to connect your wireless router to your
DSL or cable modem.
In a network, computers and other devices are connected to share
resources. Network connections vary in many ways depending on the setup
the user would want to, availability of the network devices and the location or
map area of links. One may either use wireless throughput or wired
throughput. The next lesson will guide you on how to setup these
connections.
218
Router Basics
Your router is the glue that holds your home network together. It
connects all your computers to one another, either through Ethernet cables or
a wireless connection. A router is different than a modem: your modem
connects you to the internet, while your router connects your computers to
one another. When you hook up your router to the modem, however, you are
then able to share that internet connection with all of the computers on your
network. Sometimes modems come with built-in routers.
Devices that connect to your router—that is, the computers, tablets,
smartphones, DVRs, game systems, and so on—are called clients. Each
client on the network is given an IP address, which helps your router direct
traffic. Clients within the network get a local IP address, while your modem
gets a global IP address. Global IP addresses are like street addresses, while
local IP addresses are like apartment numbers: one lets you find the building
in relation to the rest of the world, while the other lets you find the specific
location within the complex. These addresses make sure the right information
from the outside world gets to the right computer on your network.
Routers have a number of different features, so we'll go through some
of the most common router specs and how they affect your home network.
Most people have a mix of wired and wireless devices on their
network, so most of the discussion will focused on wireless routers. Since
wireless routers allow for both wired and wireless connections, you can wire
up when necessary, and connect over Wi-Fi everywhere else.
Wireless Throughput
Throughput is the
speed at which a router can
transfer data. The transfer
speed of your wireless
connection is dependent on
the wireless standard it uses.
The most common standards
today are 802.11g and
802.11n (also known as
"wireless G" and "wireless N",
Figure 144. Wireless Throughput
219
respectively). Wireless N is faster than wireless G, though routers that
support wireless N are also more expensive. Most new devices—like
smartphones and laptops—support the faster wireless N.
Wired Throughput
The wired half of your router will come in one of two speeds: 10/100
Mbps and 10/100/1000 Mbps (also known as "gigabit"). 10/100 routers are
cheaper, but will not transfer data between computers as quickly as gigabit
routers will. If you are only using your router to connect to the internet, 10/100
is fine, since your internet connection is probably slower than 100Mbps,
meaning you will not be able to actually take advantage of the router's full
speed. If you are transferring data between computers, however, you may
want to go with a gigabit router, since it will transfer that data much faster
than a 10/100 model.
Range
Wireless routers can only reach a limited area of distance. If you have
a big house and have the router on one side, you might not be able to access
the network from the other side of the house. Your range, like your speed, is
determined by the wireless standard you use. Wireless N has a longer range
than wireless G, so if range is important you will want to use wireless N.
That said, there are many other ways to connect to your network from afar.
Wireless extenders (also called wireless repeaters) are products you can buy
that do exactly what the manuals say to extend your network further.
Alternatively, you can buy a powerline adapter, which lets you use your
home's electrical wiring to hook a distant device up to your router with an
Ethernet cable (and thus get a faster connection than wireless would allow
for).
Number of Ports
Routers have two types
of ports in the back: LAN ports
and WAN ports. Your WAN
port hooks up to your modem
(which, again, is what
connects to the internet), while
the LAN ports hook up to your
computers and other clients.
Most routers have one WAN
port, but you will need as many LAN ports as the wired devices you have. If
Figure 144.Router ports
220
you have more wired devices than can fit on a router, you can plug them all in
using a wired switch. A switch is like a power strip for your router: it lets you
plug in more devices than the router originally allowed.
Wireless Security
Unless you do not mind
strangers eating your bandwidth and
potentially accessing your
networked files, you should always
protect your wireless network with a
password. WPA2 is currently the
most secure type of wireless
encryption, so make sure you use
WPA2 if you can. Some old wireless
devices do not support WPA, in
which case you will have to use the less secure WEP instead. Basically,
every devices made in the last four years supports WPA2 encryption.
Sample Network Components Specifications
Item Minimum
Requirements
Recommended
Modems
Cable Cat-5 UTP Cat-5 UTP
network adapters Ethernet 100Base-TX Ethernet 1000Base-T
Hub/Switch 100 Megabit Hub 1.0 Gigabit Switch
Power Surge Protector Surge Protector & UPS
Network Layout
Directions: In a short coupon bond, draw a simple schematic diagram of a
computer connected to a network. Label the parts and present your drawing
to the class. Your work will be rated according to the following criteria:
Figure 145. Wireless Security
221
CRITERIA Excellent
4
Good
3
Fair
2
Poor
1
Adherence to the
proper network setup
(50%)
-drew the diagram
with right setup
Workmanship (20%)
-organized materials
and tools while
accomplishing the
task and exhibited
effective time
management
Quality of work (30%)
-presented the final
output neatly.
Critical Review
Directions: Make a market study on network hardware equipment, its brand,
functionality and costs. You can ask computer vendors of the price lists and
inquire of its specifications. Choose two brands then make comparisons. Be
ready for an oral presentation.
Components Brand
No.1
Cost Brand
No.2
Functionality Cost
Router
Hub 8-port
UTP cable
Rj45
connector
Sound Card
222
Performance Score Card
Score Reference:
0 = Some facts are clearly
inconsistent with source
material
1= Some facts are
questionable/unrealistic
2 = All facts seem
accurate/good
Computer Shop Network Layout
Directions: Draw on a short bond paper, layout plan of a computer café
connected to a network. Write the specifications of the network hardware and
incorporate the following requirements. Draw your diagram in a short coupon
bond.
 one computer server
 20 client computers
 one DSL modem
 UTP cables
 hub
Performance Rubrics
Details Points
Brand Model is precisely given
Cost is based on the market selling
price
Complete list of the given hardware
were enumerated well
Presentation (Clarity of the thought
and voice)
TOTAL
CRITERIA Percentage Score
1. Originality of network layout 40%
2. Neatness of the drawing 40%
3. Proper use of equipment and materials is
observed.
10%
4. Observance of Safety Precautions. 10%
PERFORMANCE RATING
223
Lesson 2: Maintaining Computer Systems
This lesson is intended to develop your skills in planning and preparing
for installation of computer devices and operating system. At the end of this
lesson, you are expected to:
 Follow OHS procedures in maintaining computer systems
 Diagnose and identify faulty computer systems
 Test normal functions of computer systems
 Perform repair and replacement of faulty computer systems
 Adhere to the recommended schedule and techniques in maintaining and
cleaning computer systems
 Respond to sudden breakdowns of computer systems in accordance with
established procedures
As a future computer technician you must be diligent and eager to
know the different procedures in maintaining computer system because this
will guide you in carrying out a particular job in a proper manner. Once you
already identify the procedures, you must also be able to apply it in real life
situations.
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information and
Communication Technology (ICT) student should know how to behave when
working in the computer laboratory, as well as implement a safe way of
accomplishing every task. Safety practices should be learned early and
always adheres in working with any electrical and electronic device, including
personal computers and its peripherals. This is for your protection as well as
to the people working with you, and for the devices that you are using. The
basis for this process begins with Occupational Health and Safety Policies.
224
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environment.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other
people from harm.
4. If the hazard is can be easily and safely cleared, then do so.
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. After clearing of the hazard, fill out the correct documentation to
assist in identifying improved practice to reduce further incidence of
hazards.
MAINTENANCE OF COMPUTER SYSTEM
Perhaps you have handpicked the finest computer with the selected
fastest processor and graphic card and with a few gigabytes of memory. So
you thought to yourself that your machine is probably going to sustain you for
the next five (5) years. But little did you discover that some six months down
the road, your computer is behaving like a Pentium 2 computer, perpetually
flustering you with its choppy images, frustrating pop-ups and tremendously
slow disk access. Gradually, your computer crashes and all your data is lost
on one fine afternoon.
One thing you have probably missed out is the need for system
maintenance. The basic routine maintenance comprises of the 3 basic
processes:
1. Data Backup
2. Malware Maintenance
3. Disk or File System Maintenance
225
Let us address each of the processes in detail so that you can better
understand how you can apply them in your system to extend its longevity.
DATA BACKUP
Backing up basically
means creating a redundant
copy of a data so that in case
anything happens to the
original data, you have a spare
copy. This is typically a simple
thing to do.
First, you must ask
yourself why should you back
up the data or system?
If you feel that you should backup your valuable data, then you should
decide and select what are the data to be backup. Depending on your needs,
you may choose to backup your windows registry, or your Outlook Express
mail data, or even your windows security keys.
Windows operating system's friendly interface allows you to drag and
drop computer files from one storage device to another. And this can be as
simple as copying a document file from your desktop into a thumb drive.
But when these files gradually occupies a lot of disk space, you may
need to seek help from archiver utilities such as Winzip which enables you to
compact your files into a single compressed file. You can then break up this
large file into several pieces to be stored in several mediums such as a span
of CD or DVD-Recordable.
Winzip also allows you to protect your file with encryption and a
software password to prevent any unauthorized access. There are a number
of backup methods you could use.
Figure 146. Data Backup
226
How to backup files in Windows XP:
1. To use the built in
Windows XP backup
tool, follow the
instructions.
2.Click the Start
button > All
Programs >
Accessories >
System Tools >
Backup.
3. The Windows XP backup tool allows backing up all user files in just one
task. If you select the option of the My Documents backup, it will copy the
entire contents of the Documents and Settings folder including MS
Outlook/Outlook Express messages and settings as well as your profile
settings.
The Windows XP
backup tool allows backing
up all user files in just one
task. If you select the option
of the My Documents
backup, it will copy the entire
contents of the Documents
and Settings folder including
MS Outlook/Outlook Express
messages and settings as
well as your profile settings.
4. However, in most situations full backup is not necessary. In all likelihood
the My Documents folder of your computer will be large in size and contain a
Figure 147. Step No.2 How to Backup your files
Figure 148. Step No.3
227
lot of irrelevant information. If this is the case, Windows XP backup tool
suggests that you manually specify files that you want to include or exclude
from the backup set.
5. Lastly, do not forget to back-up your Internet Explorer favorites from within
IE. You can export them from the Menu.
Figure 149. Step No.4
Figure 150. Step No.5
228
MALWARE MAINTENANCE
Malware refers to any
kind of malicious codes, objects
or content that infiltrates your
computer, resulting in damage
and causing your system to act
in an undesirable manner.
Commonly, these include
viruses, spyware, worms, trojan
horses, spams and many more.
When you are infected, you can
lose your privacy, confidential
data and access to your system
when software and hardware are
damaged. Fortunately, there are
a couple of preventive measures
you can take to protect yourself
from malware.
One thing you can do to scan the file for any virus infection before you
attempt to open it. If the scan shows nothing, it is probably a safe file. But
then again, it may be a new virus yet to be updated in your virus scan. You
can either wait and apply the next virus signature update and perform a
second scan or risk it all and open the file.
DISK MAINTENANCE
Did anyone tell you that your hard disk is a pretty tricky machine?
When you first installed your operating system, you may be pleased to know
how smooth and efficient your software applications are running. But
gradually, it slows down and this bothers you. What truly causes the decline
in performance? You may argue that your disk is just a couple of months old.
This has much to do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets. Initially, the bucket
only contains a few spanners, a hammer and some screws. So every time
you search for a particular item, it is relatively easy to find. But soon as you
keep filling the bucket with all sorts of items and especially when the amount
of items grows, you will discover that you may need more time just to search
Figure 151. Anti-Malware Application
229
for a particular screw head. In such cases, uninstall any unnecessary
software and defragment your disk. Typically, your system performance will
decline when the amount of data in your hard disk starts to grow.
Essay Writing Activity
Directions: Write an essay about the importance of Data Backup. Relate
your statements to the most treasured skills you acquired in the lesson. Give
also your own title for the essay (minimum of 400 words).
Contents Excellent (3) Good (2) Poor(1)
Spelling Almost all words spelled
correctly
Capitalization Begins all sentences but
one with uppercase
letters.
Punctuation Correct ending
punctuation in every
sentence but one.
Grammar Simple sentences are
grammatically correct.
Handwriting Legible. Good spacing
and alignment.
Total Points
Figure 152. Disk Cleanup Window
230
Research and Investigate
Directions: Form a group of five members and make a research on the
different advantages and disadvantages of data backup, malware
maintenance and disk maintenance. You can also interview/observe a
practitioner while lending a quality service in computer hardware servicing.
Report this to the class.
Demonstration
Application on Maintenance of Computer System
Directions: After the interview and observation with a practitioner, your group
will showcase what you have learned through a demonstration. You will be
rated base on the rubrics below:
Criteria Excellent
4
Good
3
Fair
2
Poor
1
Content (40%)
-Conveys full
understanding of the
content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays interesting
purpose
Speak Clearly (10%)
-Group members
speaks clearly at all
times
Volume (10%)
-Loud volume
Preparedness (10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-displays teamwork
231
DIAGNOSIS AND IDENTIFICATION OF FAULTY SYSTEM
More than 70% of all computer problems are related to cabling and
connections. Ensure all cables are connected and connected firmly. IDE and
floppy ribbon cables and power cables can often go loose. Ensure
microprocessor, memory modules, and adapters such as video card are
inserted correctly and do not "pop-up" due to vibration.
Problem 1: System has no power at all. Power light does not illuminate,
fan inside the power supply does not turn on, and indicator light on
keyboard does not turn on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Power cable is
unplugged
Visually inspect power
cable.
Make sure power cable
is securely plugged in.
Defective power
cable
Visual inspection or try
another cable.
Replace cable.
Power supply
failure
Power cable and wall
socket are OK, but
system is still dead.
Contact technical
support.
Faulty wall outlet;
circuit breaker or
fuse blown
Plug device into
socket and test.
Use different socket,
repair outlet, reset
circuit breaker or
replace fuse.
Problem 2: System is inoperative. Keyboard lights are on, power
indicator lights are lit, and hard drive is spinning.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Expansion card is
partially dislodged from
expansion slot on the
motherboard.
Turn off computer.
Remove the cover of
the system unit.
Check all expansion
cards to ensure they
Using even pressure
on both ends of the
expansion card, press
down firmly on
232
are securely seated in
slots.
expansion card.
Defective floppy disk
drive or tape drive
Turn the system off.
Disconnect the cables
from one of the floppy
drives. Turn on the
system, check to see if
the keyboard operates
normally. Repeat until
you have located
defective unit.
Contact Technical
Support.
Defective expansion
card
Turn the computer off.
Remove an expansion
card.
Make sure expansion
card is secure in
expansion socket.
Problem 3: System does not boot from hard disk drive, but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between
hard drive and system
board is unplugged.
When attempting to
run the FDISK utility
described in the HARD
DISK section of the
manual you get a
message, INVALID
DRIVE
SPECIFICATION
Check cable running
form disk to disk
controller on the
board. Make sure
both ends are
securely plugged in;
check the drive type
in the Standard
CMOS Setup (in your
motherboard
manual).
Damaged Hard Disk or
Disk Controller
Format hard disk; if
unable to do so, the
hard disk may be
defective.
Contact Technical
Support.
Hard Disk directory or
FAT is scrambled
Run the FDISK
program, format the
hard drive(See HARD
DRIVE section of
manual). Copy your
Backing up the hard
drive is extremely
important. All Hard
Disks are capable of
breaking down at any
233
backup data back onto
hard drive.
time.
Problem 4: System only boots from Floppy Disk. Hard Disk can be read
and applications can be used, but booting from Hard Disk is impossible.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Hard Disk boot program
has been destroyed.
Corrupted system files Back up data and
applications files.
Reformat the Hard Drive
as described in the Hard
Drive section of the
manual. Re-install
applications and data
using backup disks.
Problem 5: Error message reading "SECTOR NOT FOUND" or other
error messages indicators that certain data is not allowed to be
retrieved.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Sector Not Found Error Hard drive is likely bad
itself.
You may be able to
resolve this issue by
running scandisk and
having scandisk mark
the sectors as bad.
Problem 6: Disk formatted on IBM PS/2 will not operate with this system.
PROBABLE CAUSE DIAGNOSIS SOLUTION
The IBM PS/2 uses a
different format than
other computers.
IBM PS/2 disk format
will not work in an AT
type computer.
Format disk in the AT
type computer. Insert disk
into the IBM PS/2 and
copy the files you wish.
Problem 7: After installing an expansion card (network card, tape drive
card, etc.), the system no longer works properly.
234
PROBABLE CAUSE DIAGNOSIS SOLUTION
Monitor has no power. All or part of the system
may be inoperable. The
new card may work but
a mouse or COM port
may not work.
Change the interrupt or
RAM address on the new
expansion card. See the
documentation that came
with the new card in order
to change pin settings.
Many expansion devices
come with proprietary
software that will assist
you in doing this.
Problem 8: Screen message says "Invalid Configuration" or "CMOS
Failure."
PROBABLE CAUSE DIAGNOSIS SOLUTION
Incorrect information has
entered into the
configuration (setup)
program.
Check the configuration
program. Replace any
incorrect information.
Review system's
equipment. Make sure
correct information is in
setup.
Problem 9: Screen is blank.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Monitor has no power. Power connectors may
be loose or not plugged
in.
Check the power
connectors of the monitor
and the system. Make sure
monitor is connected to
display card, change I/O
address on network card if
applicable.
Monitor is not connected
to computer.
See connections of the
video cable from the video
adapter card going to the
monitor.
235
Problem 10: System does not boot from hard disk drive, but can be
booted from floppy disk drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Connector between hard
drive and system board
unplugged.
When attempting to run
the FDISK utility
described in the HARD
DISK section of the
manual you get a
message, INVALID
DRIVE SPECIFICATION.
Check cable running form
disk to disk controller on
the board. Make sure both
ends are securely
plugged in; check the
drive type in the Standard
CMOS Setup (in your
motherboard).
Problem 11: Memory Module Problem
PROBABLE CAUSE DIAGNOSIS SOLUTION
Memory problem, display
card jumpers one not set
correctly.
Loose installation of the
RAM on the memory slot
Reboot computer. Re-
install memory, make sure
that all memory modules
are installed in correct
sockets. Check jumper and
switch settings on display
card. See display card
section for information of
settings.
Computer virus Computer system
becomes too slow and
experiencing hang-up.
Use anti-virus programs
(McAfee/PC-cillin, E-port,
etc.) to detect and clean
viruses.
Problem 12: Screen goes blank periodically.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Screen saver is enabled. Disable screen saver.
236
Problem 13: Keyboard failure
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is disconnected.
Loose keyboard cable
connection
Reconnect keyboard.
Check keys again if there
is no improvement,
replace keyboard.
Problem 14: No color on screen
PROBABLE CAUSE DIAGNOSIS SOLUTION
Faulty monitor If possible, connect
monitor to another system.
If no display, replace
monitor.
Problem 15: Floppy drive light stays on.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Floppy Drive cable is not
connected correctly.
Shorted power wire for
floppy
Reconnect floppy cable
making sure PIN1 on the
Floppy Drive corresponds
with PIN1 on floppy cable
connector.
Problem 16: Error reading drive A:
PROBABLE CAUSE DIAGNOSIS SOLUTION
Bad floppy disk Try new floppy disk.
Floppy disk is not
formatted.
Format floppy disk (type
ENTER)
237
Problem 17: Windows system drive failure
PROBABLE CAUSE DIAGNOSIS SOLUTION
SETUP program does
not have correct
information.
Boot from drive A: using
DOS system disk. Input
correct information to
SETUP program.
Hard Drive cable is not
connected properly.
Check Hard drive cable.
Problem 18: Cannot boot system after installing second hard drive.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Master/Slave jumpers are
not set correctly.
Set master /slave
jumpers correctly.
The Hard Drive is
incompatible.
Run SETUP program and
select correct drive types.
Call drive manufacturers
for compatibility with
other drives.
Problem 19: Missing operating system on Hard Drive
PROBABLE CAUSE DIAGNOSIS SOLUTION
CMOS setup has been
changed.
Run setup and select
correct drive type.
Problem 20: Certain keys do not function.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keys are jammed or
defective.
Replace keyboard.
238
Problem 21: Keyboard is locked, no keys function.
PROBABLE CAUSE DIAGNOSIS SOLUTION
Keyboard is locked. Unlock keyboard.
Critical Review: Problems Encountered
Directions: In this activity, list down at least five (5) problems, error
messages or incidents you encountered while working or using a computer
and the actions taken in every problem/error message or incidents
encountered.
Problems Encountered Actions Taken
1.
2.
3.
4.
5.
Slide Show Presentation
Directions: In this activity, you will learn how useful the Internet can be for a
Personal Computer (PC) support technician.
1. Using a personal computer, pretend that the motherboard manual is not
available and you need to replace a faulty processor. Identify the
manufacturer and model of the motherboard by looking for the manufacturer’s
name and model number stamped on the board. Research the Web site for
that manufacturer. Print the list of processors the board can support.
Afterwards, make a slide show presentation and report it to the class.
239
Video Tutorials
Application on Diagnosis of Faulty Systems
Directions: In this activity, your class will be grouped into three (3) and will
make an interview and observation with a practitioner. The group will
showcase what they have learned through a video demo or tutorials. Use
digital cameras or cellphones on recording the video. You will be rated based
on the rubrics written below:
Criteria Excellent
4
Good
3
Fair
2
Weak
1
Content (40%)
-Conveys full
understanding of
the content
Enthusiasm (10%)
-Facial expression
and body language
generates strong
enthusiasm
Interest and
Purpose (10%)
-Displays
interesting purpose
Speak Clearly
(10%)
-Group members
speaks clearly at all
times
Volume (10%)
-Loud volume
Preparedness
(10%)
-Group is prepared
with props and
costumes
Cooperation (10%)
-Displays teamwork
240
Diagnostic Software Tools
Diagnostic software is used to identify problems on a computer or
piece of equipment. These programs test the onboard systems for issues and
help to alert users of potential problems or breakdowns. Over the years, these
programs have gone from very basic to complex and highly specialized. With
this increase in technology, the skill required to use the software has actually
decreased to the point where most people can use this software with little or
no training.
Programs that provide
diagnostic information are
common everywhere.
Something as simple as the oil
light on a car dashboard is a
type of diagnostic software.
These hard-coded diagnostic
tools usually monitor one
specific part of a larger piece
of equipment and typically are
always operating. While these
types of diagnostic programs
are the most common, they are
usually the least versatile.
When people think of true
diagnostic software, they usually think of the types used on computers. These
programs monitor the computer for problems involving every aspect of the
machine, from hardware to software—far more complex and versatile than
the change oil light.
Since the introduction of diagnostic software, it has evolved in many
ways. The original type could only find the most major of problems. There
should be strong indicators or physical damage in order for the software to
recognize and report the problem. When computers became more common in
people's homes, particularly with the rise of Disc Operating Systems,
commonly known as DOS, diagnostic software became more common. Small
built-in programs, such as Checkdisk (CHKDISK), allowed users to perform
Figure 149: Defragmentation and Optimization
of hard drive
241
basic diagnostic routines on their systems. These early programs would often
output technical information and esoteric error codes instead of readable
information. In recent years, the output reports have changed considerably.
The basic outputs are now readable by most users, and they often contain
tips or warnings telling users what they should or should not do, all in plain
language.
Technological advances have even made Web page-based diagnostic
software available for home users. With minimal Web searching, nearly any
home user can find a wide range of websites offering to speed up their
computer or diagnose problems. Many of these sites are scams, so
consumers should perform proper research before using them. General
Internet searches can provide a number of resources to check a company's
credibility.
Some Downloadable Diagnostic Tools
Yet Another Cleaner
Protects your PC from browser hijacker, malicious plug-ins,
malwares, adware, various viruses
ARO 2013
Repairs registry errors, remove "junk" files, and ensure your PC is
fully protected
RegDoctor
Improves your system performance and stability by repairing and
cleaning the Windows Registry
Wise Registry Cleaner
Cleans the registry portion of the hard drive
Advanced System Care
Tunes up and maintains your PC, with anti-spyware, privacy
protection, and system cleaning functions.
CPU-Z
Accesses various information's about your computer
242
Advanced System Care Pro
Tunes up and maintains your PC automatically
Free Window Registry Repair
Scans, repairs, and optimizes your Windows registry
Disk management tools:
 Fdisk - creates and deletes disk partitions.
 Format - prepares a hard drive prior to use.
 Scandisk or Chkdsk - checks for physical errors on the disk surface.
 Defrag - optimizes use of space on a disk.
 Disk Cleanup - removes unused files.
 Disk Management - creates partitions and formats disks (GUI
interface).
 System File Checker (SFC) – scans the operating system critical files.
Procedure in Cleaning
Hardware Components
Cleaning your computer
and its components and
peripherals helps keep the in
good working condition and
helps keep the computers from
spreading germs.
Figure 150: Cleaning Schedule
243
How often should I clean my computer?
The frequency of how often you should clean your computer varies on
several different factors. To help you determine how often you need to clean
your computer, we have created the chart below. Check the appropriate
boxes below that apply to your computer’s environment to determine how
often it should be cleaned.
General Cleaning Tips
Below is a listing of general tips that should be taken when cleaning any of
the components or peripherals of a computer, as well as tips to help keep a
computer clean.
1. Never spray or squirt any liquid onto any computer component. If a
spray is needed, spray the liquid onto a cloth and then use that cloth to
rub down the component.
2. You can use a vacuum to clean up dirt, dust, or hair around the
computer on the outside case. However, do not use a vacuum for the
inside of your computer as it generates a lot of static electricity that can
damage the internal components of your computer. If you need to use
a vacuum to clean the inside of your computer, use a portable battery
powered vacuum designed to do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before
cleaning.
4. Be cautious when using any cleaning solvents; some individuals may
have allergic reactions to chemicals in cleaning solvents and some
solvents can even damage the case. Try to always use water or a
highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs or
controls. In addition, when cleaning the back of the computer, if
anything is plugged in, make sure turn off the PC and unplug the
power cable.
6. When cleaning fans, especially the smaller fans within a portable
computer or laptop it is suggested that you either hold the fan or place
something in-between the fan blades to prevent it from spinning.
Spraying compressed air into a fan or cleaning a fan with a vacuum
may cause damage or back voltage to be generated.
7. Never eat or drink around the computer area.
244
Cleaning Tools
Although many companies have created products to help improve the
process of cleaning your computer and peripherals, you can also use
household items to clean your computers and peripherals. Below is a listing of
items you may need to use while cleaning your computer or computer
peripherals.
Keep in mind that some components in your computer may only be
cleaned using a product designed for cleaning that component.
 Cloth - A cloth is the best tool used when rubbing down a component;
although paper towels can be used with most hardware, we
recommend using a cloth whenever possible. Caution: It is
recommended that you use a cloth when cleaning components such as
the outside of the case, a drive, mouse, etc. You should not use a cloth
to clean any circuitry such as the RAM or motherboard since they can
generate Electro Static Discharge (ESD) that can damage electronics.
 Water or rubbing alcohol - When moistening a cloth, it is best to use
water or rubbing alcohol. Other solvents may be bad for the plastics
used with your computer.
 Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and
other particles out of a computer can be one of the best methods of
cleaning a computer. Over time, these items can restrict the airflow in a
computer and cause circuitry to corrode. Do not use a standard
vacuum as it can generate a lot of static electricity that can damage
your computer.
 Cotton swabs - Cotton swabs moistened with rubbing alcohol or water
are good for wiping hard to reach areas in your keyboard, mouse, and
other peripherals.
 Foam swabs - It is Always better to use lint-free swabs such as foam
swabs.
Procedures in Cleaning Hardware Components
Case cleaning
Why do we need to clean the computer case regularly? It keeps
the appearance of the computer looking new. During cleaning, if ventilation
locations are found, these can be cleaned helping the case keep a steady
245
airflow to the computer, keeping components cool and in good working
condition.
Procedures:
1) The plastic case that houses the PC components can be cleaned with
a lint-free cloth that has been slightly dampened with water. For
stubborn stains, add a little household detergent to the cloth. It is
recommended that you never use a solvent cleaner on plastics.
2) Make sure all vents and air holes are hair and lint free by rubbing a
cloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is safe
to use a standard vacuum when cleaning the outside vents of a
computer. However, if you need to clean the inside of the computer,
use a portable battery powered vacuum to prevent static electricity.
CD-ROM, DVD, and other disc drive cleaning
Why do we need to clean disc drives? A
dirty CD-ROM drive or other disc drives can
cause errors when reading discs. These
read errors could cause software installation
and other issues while running the program.
Procedure: To clean the CD-ROM drive, it
is recommend to purchase a CD-ROM
cleaner from your local retailer. Using a
CD-ROM cleaner should sufficiently clean
the CD-ROM laser from dust, dirt, and
hair.
In addition to cleaning the drive with
a special disc designed to clean drives,
you can also use a cloth dampened with
water to clean the tray that ejects from the
drive. Make sure however, that after the
tray has been cleaned, it has to be
completely dried before putting the tray
back into the drive.
Figure 151. Disk Cleaner
Figure 152. Disc Cleaning
246
CD and DVD disc cleaning
Why do we need to clean disc? Dirty CDs can cause read errors or total
malfunction.
Procedure: Cleaning CDs and DVDs should be done with a cleaning
kit but can also be done with a normal clean cotton cloth or shirt. When doing
this with a clean cotton cloth or shirt, wipe against the tracks, starting from the
middle of the CD or DVD and wiping towards the outer side as shown in the
below picture. Never wipe with the tracks; doing so may put more scratches
on the disc.
It is recommended to use water when cleaning a CD. However, if the
substance on a CD cannot be removed using water, pure alcohol can also be
used.
Hard drive cleaning
Why do we need to clean a hard drive? While hard drives cannot be
cleaned physically, they can be cleaned with various utilities on the computer
to help it run fast and more efficiently. Disk Management is one of the utilities
that will prevent the hard drive from slowing down.
Procedure: Disk Management can be accessed in the Control Panel,
look for Administrative Tools, then double-click on the Computer Management
icon. In the System and Security window, click on the Administrative Tools. In
the Administrative Tools window, double-click on the Computer Management
icon.
When Computer Management opens, click on Disk Management on
the left side of the window, located under Storage. After a brief loading period,
Disk Management should now appear on the right side of the Computer
Management window.
Keyboard cleaning
Why do we need to clean the keyboard? The computer keyboard is often
the most germ infected item in your computer. Often, it will contain more
bacteria than your toilet seat. Cleaning it can help remove any dangerous
247
bacteria. Dirt, dust and hair can also build up causing the keyboard to
malfunction.
Procedure: Before cleaning the keyboard, turn off the computer or
unplug the USB keyboard. Not unplugging the keyboard can result in causing
other computer problems as you may press keys that cause the computer to
perform an unwanted task.
Many people clean the keyboard by turning it upside down and
shaking. A more effective method is to use compressed air. Compressed air
is pressurized air contained in a can with a very long nozzle. Aim the air
between the keys and blow away all of the dust and debris that has gathered
there. A vacuum cleaner can also be used, but make sure the keyboard does
not have loose "pop off" keys that could possibly be drawn up by the vacuum.
After the dust, dirt, and hair had been removed spray a disinfectant
onto a cloth or use disinfectant cloths and rub each of the keys on the
keyboard. As mentioned in our general cleaning tips, never spray any liquid
onto the keyboard.
Substance spilt into the keyboard
Below are a few recommendations to help prevent a keyboard from
malfunctioning once a substance has been spilt within it.
If anything is spilt onto the keyboard turn the computer off immediately
or at the very least disconnect it from the computer. Then, flip the keyboard
over helping to prevent the substance from penetrating the circuits. While the
keyboard is upside down, shake the keyboard over a surface that can be
cleaned later. While still upside down, use a cloth to help clean out what can
be reached. After you have cleaned it to the best of your ability, leave the
keyboard upside down for at least one night allowing it to dry. Once dry,
continue cleaning the keyboard with any remaining substances.
If after cleaning the keyboard you have keys that stick, remove the
keys and clean below the keys and the bottom portion of the key.
Finally, if the keyboard still works but remains dirty or sticky, try
washing the keyboard in the dishwasher.
248
If after doing all the above steps the keyboard does not function properly or at
all, it is recommended you buy a new keyboard.
LCD screen cleaning
Why do we need to clean the LCD screen? Dirt, dust, and finger prints can
cause the computer screen to project blurry images/texts.
Procedure: Unlike a computer monitor, the LCD or flat-panel display is
not made of glass, it therefore requires special cleaning procedures.
When cleaning the LCD screen, it is important to remember not to
spray any liquids onto the LCD directly. Press gently while cleaning, and do
not use a paper towel as it may cause the LCD to gather scratches.
To clean the LCD screen, use a non-rugged microfiber cloth, soft
cotton cloth, or swiffer duster. If a dry cloth does not completely clean the
screen, you can apply rubbing alcohol to the cloth and wipe the screen with
the damp cloth. Rubbing alcohol is used to clean the LCD before it leaves the
factory.
Monitor cleaning
Why do we need to clean the monitor? Dirt, dust, and fingerprints can
cause the computer screen to project blurry images/texts.
Procedure: The glass monitor screen can be cleaned with ordinary
household glass cleaner. Be sure to remove power from the monitor and
spray the cleaner onto a lint-free cloth so the fluid does not leak into the
electrical components inside the monitor. Vacuum off any dust that has
settled on top of the monitor, and make sure no books or papers have been
placed on the air vents. Obstructed monitor vents can cause the monitor to
overheat or even catch fire.
Caution: We suggest using a cloth dampened with water when
cleaning monitor or a screen that is not made of glass or has any anti-glare
protection on the screen. Using ordinary household glass cleaner on special
screens, especially cleaners with ammonia can remove anti-glare protection
or other special surfaces.
249
Other good cleaning tools
 Microfiber Towels
 Swiffer Dusters
Motherboard cleaning
Why do we need to clean the motherboard? Dusts can build up and
corrode circuitry causing various problems such as computer lockups.
Caution: When working with interior computer parts (e.g.
motherboard), take the necessary ESD precautions and avoid unplugging any
cables or other connections.
Procedure: Compressed air is recommended when cleaning the
motherboard from dust, dirt, or hair. When using compressed air, hold it in the
up-right position; otherwise, it is possible that chemicals may come out of the
container that could damage or corrode the motherboard or other component
within the computer. Also, make sure to always blow the dust or dirt away
from the motherboard, or out of the case.
Another good alternative to compressed air is to use a portable battery
powered vacuum that can effectively remove the dust, dirt, and hair from the
motherboard completely and prevent it from getting trapped within the case.
However, do not use a standard electric vacuum as it can cause a lot of static
electricity that can damage the computer. When using the vacuum, it is vital
that you stay a couple of inches away from the motherboard and all other
components to help prevent contact as well as to help prevent anything from
being sucked into the vacuum. Ensure that you do not remove any small
components with the vacuum such as
jumpers.
Optical Mouse cleaning
Why do we need to clean optical mouse
regularly? A dirty mouse (mouse with a ball)
can be difficult to move. It can also cause
strange mouse movement.
Figure 153. Optical Mouse
250
Procedure: To clean the optical
mouse, you must first wipe the bottom cover
of the mouse. Turn the mouse upside down to
look at the lens.
If there is a smudge on the lens, gently
clean the area with a plain cotton-tipped
swab. If there is debris in the lens, gently blow
the debris away from the area. Check the
surface on which you are using the mouse.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.
Why? To help keep a mouse clean and germ free it can be helpful to clean
the mouse.
Procedure: Use a cloth moistened with rubbing alcohol or warm water and
rub the surface of the mouse and each of its buttons.
Mechanical mouse cleaning
Why is it important to clean an
optical mouse? A dirty optical-mechanical
mouse (mouse with a ball) can be difficult to
move. It can also cause strange mouse
movement.
Procedure: To clean the rollers of
an optical-mechanical mouse, you must first
remove the bottom cover of the mouse. To
do this, examine the bottom of the mouse to
see what direction the mouse cover should
be rotated. As you can see in the illustration
below, the mouse cover must be moved
counter clockwise. Place two fingers on the
mouse cover and push the direction of the
arrows.
Figure 154. Cleaning
Optical Mouse
Figure 155. Mechanical Mouse
251
Once the cover has rotated about an
inch, rotate the mouse into its normal
position, covering the bottom of the mouse
with one hand and the bottom should fall off
including the mouse ball. If this does not
occur, attempt to shake the mouse gently.
Once the bottom cover and the ball are
removed, you should be able to see three
rollers located within the mouse. Use a cotton
swab, finger, or fingernail to remove any
substance. Usually, there will be a small line
of hair and dirt in the middle of the roller, remove as much as this substance
as possible.
Once you have removed as much dirt and hair as possible, place the
ball back within the mouse and place the cover back on.
If the mouse still appears to be having the same issue, repeat the
above process. If after several attempts the mouse is still having the same
issues, it is likely that your mouse has other hardware issues and we
recommend that it be replaced.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.
Why do we need to do this? To help keep a mouse clean and germ
free.
Procedure: Use a cloth moistened with rubbing alcohol or warm water
and rub the surface of the mouse and each of its buttons.
Printer cleaning
With some printers it may be necessary to
clean the inside of the printer to help keep the
printer running smoothly.
Figure 157. Printer Cleaning
Figure 156. Mouse Opening
252
Why do we need to do this? Cleaning the outside of a printer can help keep
the printer's appearance looking good; and in the case of a printer that is used
by many different people, it will keep the printer clean and free from germs.
Procedure: First, make sure to turn off the printer before cleaning it.
Dampen a cloth with water or rubbing alcohol and wipe the case and each of
the buttons or knobs on the printer. As mentioned earlier, never spray any
liquid directly onto the printer.
Scanner cleaning
Why do we need to do
this? Flatbed scanners
commonly become dirty with dust,
fingerprints, and hair. When a
scanner is dirty, the images may
have distortions.
Procedure: Clean a flatbed
scanner's surface by spraying a
window cleaner onto a paper
towel or cotton cloth and wipe the
glass until clean. As mentioned earlier, never spray a liquid directly onto the
component.
To clean the outside of the scanner, the same towel or cotton cloth can
be used.
Miscellaneous Cleaning Steps
Below are listings of miscellaneous computer hardware that is rarely
used today, but some people who will use it and therefore need to know how
to clean their devices.
Floppy drive cleaning
Why do we need the floppy drive? Because dirty read/write heads
on the floppy drive can cause errors during the reading or writing process.
Figure 158. Scanner Cleaning
253
Procedures: The floppy drive can be cleaned in two different ways.
The first method of cleaning a floppy drive; (and our recommended method) is
to purchase a kit at your local retail store designed to clean the read/write
heads on your floppy drive.
The second method of cleaning the floppy drive is only recommended
for experienced computer users. Open the floppy drive casing and physically
swab the read/write heads with a lint-free foam swab soaked in pure alcohol,
or trichloroethane. When performing these steps, be extremely careful when
cleaning the heads to ensure that you do not lock them out of alignment
causing the floppy drive not to work. To help prevent the heads from
becoming out of alignment, use a dabbing motion lightly putting the swab on
the head and removing it, do not perform a side-to-side motion with the swab.
Ways to Improve your Computer's Performance
Disk Defragmentation
Fragmentation makes your hard disk do extra work that can slow down
your computer. Removable storage devices such as USB flash drives can
also become fragmented. Disk Defragmenter rearranges fragmented data so
your disks and drives can work more efficiently. Disk Defragmenter runs on a
schedule, but you can also analyze and defragment your disks and drives
manually.
When you store data into the hard disk, the data will normally occupy
the disk in continuous manner if there is sufficient data space on disk.
Imagine if you delete some data files, this will then leave some "gaps" in data
space. When new data files need to be stored and if the size of these data
files could not fit into a single gap, the data files will be segmented and fitted
across several gaps with interval. Your hard disk progressively becomes
fragmented after excessive usage of writing, deleting and storing of data into
your disk.
254
A file is typically broken into several small parts and stored in various
areas on a hard disk. When a read request is executed, the disk will search
for the multiple pieces, process and link them and finally present it on screen
from the computer when you read a file or execute an application.
Besides improvement in system performance, disk defragmentation
will also improve data recovery yield in case your disk needs to be sent in for
recovery process.
For a similar reason, you should not perform defragmentation after
accidental data deletion as this will overwrite the deleted data when data
blocks are moved or replaced.
To defrag your hard disk, follow these steps:
1. Open Disk Defragmenter by clicking the Start button. In the
search box, type Disk Defragmenter, and then, in the list of results,
click Disk Defragmenter.
2. Under Current status, select the disk you want to defragment.
3. To determine if the disk needs to be defragmented or not, click
Analyze disk. If you are prompted for an administrator password or
confirmation, type the password or provide confirmation.
Once Windows is finished analyzing the disk, you can check the
percentage of fragmentation
on the disk in the Last Run
column. If the number is
above 10%, you should
defragment the disk.
4. Click Defragment disk. If
you are prompted for an
administrator password or
confirmation, type the
password or provide
confirmation.
Disk Defragmenter might take
from several minutes to a few hours
Figure 159. Disk Defragmenter
255
to finish, depending on the size and degree of fragmentation of your hard
disk. You can still use your computer during the defragmentation process.
Notes:
 If the disk is already in exclusive use by another program or is
formatted using a file system other than NTFS file system, FAT, or
FAT32, it cannot be defragmented.
 Network locations cannot be defragmented.
 If a disk that you are expecting to see under Current status is not
showing up there, it might be because it contains an error. Try to repair
the disk first, then return to Disk Defragmenter to try again.
Cleaning Windows Registry
Registry is a system-defined database which is used by an Operating
System to store all the information needed to configure the Windows settings
for 1 or more users, applications and hardware devices. Information
contained in registry includes user's profiles, application installed on the
computer, types of documents that are created, setting of properties sheet for
each application folder and icon, existing hardware in the system, and all the
ports that are being used.
Why Cleaning the registry is important
When using the computer, users may have experienced quite a
number of problems relating to registry issues that may result in severe
consequences such as error messages pop-up, noticeably slow performance
of a system or even system crash. The reasons leading to these problems,
however, are mainly caused by missing or invalid registry key(s) from the
Windows registry.
Usually, when any particular application is uninstalled from Windows, it
is recommended that you should use Add or Remove Programs feature to
proceed (Start menu>Control Panel >Add or Remove Programs) However, if
you delete any program manually without using this function, you might
mistakenly move away the registry key in the OS or even leave behind the
orphaned registry key. This, of course, will cause the problem of missing/
invalid registry entries. Other actions include deletion of startup programs,
installation of software embedded with spyware or changes in hardware.
And because of the above reasons, cleaning Windows registry has
become an essential and crucial action that you need to implement regularly.
256
Do it regularly or you might experience losing all important data due to the
system breakdown.
Can I Delete The Registry By Myself?
The answer is "No". When you attempt to remove the registry by your
own, the risk that you may remove the valid registry is high because without
the registry cleaner software, it is not easy to determine which registry
belongs to which application. Therefore this may cause the system to crash or
the software to malfunction.
How Do I Clean Windows Registry?
You can either buy Windows Registry cleaner software available in the
market or download a free trial package from the Internet to try out before
paying a full version. When run, this software will first identify the problems
with your Windows registry such as missing/invalid key references. After that,
it will proceed to probe your request for registry removal.
Below are some basic and useful features that you must consider
when choosing the Registry Cleaner software:
 ability to scan for the whole computer system for invalid/ orphan
registry
 ability to backup all the current registry in the system
 have an "undo" feature to restore the cleaning action
 options on which to choose registry key(s) to be deleted
 online updating of the software should be available
Now, with the software running regularly, it will have saved up a large
amount of disk space for your PC. The system then will run as smoothly and
efficiently like before.
Organizing Disk Drive Partition
What is Disk Partitioning?
Partitioning creates a logical file structure on your hard disk so as to
divide various portions of a hard disk to be used for different purposes such
as a dual operating systems, storage or organizational purposes.
257
Why Partition Your Disk?
Partitioning your hard disk helps categorize your files into logical
groupings so that you can search for files and make changes more
effectively. Folders are made for the same reason too. But partitioning
provides better security.
Security
Most default primary partition is the C drive. This is the drive where
your operating system and most other software applications are installed in. A
useful way of protecting your data is to store your personal information into a
separate disk partition. For example, if you are using a 80GB hard disk, you
might want to partition it into two drives - drive C & drive D. Drive C will
contain your operating system files and software applications such as your
Microsoft Office Suite, Adobe Acrobat, Antivirus, Photoshop etc., while drive
D can be configured as a storage drive to store all your document files, JPEG,
MP3 and other personal data.
It is understood that your most important files are those that are difficult
or virtually impossible to replace. For example, if Microsoft Word crashes, you
can always reinstall the application to make it work again. However, if your
document files are corrupted by a virus or worm, you may need to spend
money and precious time trying to recover your data. In some cases, you may
not be able to recover them if the damage is too severe. Statistics have
shown that most viruses and worms are more likely to infect executable and
system files compared to your MP3 or excel spreadsheets. Therefore, if one
partition corrupts, only that partition suffers and hopefully not the whole drive.
Convenience
Another reason for storing your document files in a separate drive is
the ease of manageability. Say in a scenario where your computer needs to
be reformatted due to severe corruption, you can easily reformat drive C and
be assured that all your documents in drive D remains intact. This will save
you time trying to backup your documents, then restoring them back in your
local drive after your computer is reformatted and starts working. In this way,
should you decide to refresh your operating system or application, the stored
data will not be affected.
258
Dual Operating System
You may wish to install more than one operating system into your
computer. For example, you need to use a Windows and Linux operating
system. But both are unable to be installed in the same partition. By
partitioning the disk, you separate two logical spaces to include each
individual OS.
Evaluating your Needs
Ask yourself the following questions to help you determine the kind of
partitions to create:
1. Do you work more on documents than on software?
2. Does your job require you to install multiple software applications?
3. Does the size of your software exceed that of your documents?
The objective here to is to study the space ratio to allocate for each
partition. The choice of how you partition your disk is important because it
affects both disk performance and efficiency. If you are a designer or sound
engineer given a computer with 80GB of disk space, you probably would want
to assign 25GB of capacity to your primary disk and 55GB to a secondary
drive to contain all your media files. You can always adjust this ratio
according to your needs. On the other hand, if you are a software tester or a
hardcore gamer, you would probably choose to assign 50GB to your primary
disk and 30GB to the secondary drive for storage. Again, there is no fixed rule
or a standard template and much is directly dependent on your needs and
how you operate.
Defragmentation Issue
Direction: In this activity, you will list down at least five importance of
defragmentation and partitioning and its effect a computers performance.
259
UNDERSTANDING PARTITIONS
The master boot record is the first register that resides in your hard
disk. It is located at the first sector of the disk and the first program that runs
each time you power up your computer. The master boot record contains two
important structures - the master boot code and the master partition table.
Both provide instruction and information and how your computer boots up.
Due to its structure, a single hard disk is limited to four primary partitions. One
of it will be assigned as the active partition to contain your operating system.
Simply, You can create four primary partitions, or three primary partitions and
one extended partition which can be subdivided into multiple logical partitions.
For example, you may want to split your 80GB disk as follows:
 40GB primary partition for your OS and software applications
 10GB for MP3 files
 15GB for Document files
 5GB for Miscellaneous files
 10GB for Archival files
First, you create a 40GB primary partition. This will occupy the first of the
4 partitions. Then you can create a 40GB extended partition. And within the
extended partition, you create four logical partition - 10GB, 15GB, 5GB &
10GB. So the result of this will be a C drive (40GB), D drive (10GB), E drive
(15GB), F drive (5GB) and an H drive (10GB).
MAKING A DISK IMAGE BACKUP
Making a duplicate image or cloning a drive is often used in data
recovery to ensure that the original media where data has been lost is
untouched while recovery is done on the cloned drive.
It can also be used as a backup procedure. However, it is risky
because all the data duplicated will be along with whatever viruses and
malware that infected the drive.
260
BACKUP
Creating a backup of files is one of the most important things people
do not do, even though it should be their top priority.
Never recover lost data on the original media. Make a copy or image of
it on another storage media, and recover from that copy.
Check Mode of Failure
Before you engage in any self-recovery jobs, do the following first:
 Check if you have heard any sound prior to your data loss.
 notice if the performance of the system degrade.
 Encountered any problems while opening files, folders or saving.
This is simply to make sure that the loss is logical in nature, and not
physical. If you encounter any data loss arising from physical data loss,
please send it to a professional data recovery outfit.
DUPLICATION - Disk Image Backup
Once you have installed the additional storage media, it is time to duplicate it.
For that, you can use a free software - ADRC Data Recovery Tools.
1. Download and unzip the program. Installation is not required.
2. Run the software.
3. Under tools, choose the option
"Image Backup/Restore".
Figure 160. Image Backup / Restore
261
4. There are two radio buttons. Select "Create Image From Disk".
5. Then, in the lower drop down menu, select the drive you want to clone.
6. Save and indicate an image file name.
Figure 161. Create Image from Disk
Figure 162. Image Disk Drop-Down Menu
Figure 163. Filename for Image File
262
Figure 165. Image Backup / Restore
7. Then wait for the operation to finish.
Copy Disk Image to Another Drive
1. Once you have created the disk image, you need to copy the image to
another drive.
2. Using the same software, under tools, select "Image Backup/
Restore".
3. There are two radio buttons. Select "Store Image Disk".
4. Under "Image File", browse for the image you just created.
5. Then specify the drive you want to extract the image to be cloned.
Figure 164. Progress Bar
Figure 166. Store Image to Disk
263
Figure 167. Filename for Image
6. The drive you choose will have all its data destroyed. Be warned.
7. Click "Yes", and transfer of image to disk will be completed.
Critical Review
Now, that you are done with the disk image, read more about disk
image through ICT books and other resources. You should consider the
following topics for research:
1. Acronis True Image
2. Norton Ghost Image
3. Other disk Image backup software
Figure 168. Confirmation Window
264
Online Review
After the research, watch this video presentation using the URL below:
https://www.youtube.com/watch?v=rS616jQOURg
Answer the following questions:
1. What do we need to back-up?
2. Why you need to back-up in the same drive?
3. What other storage media is mentioned on the video?
4. Why is it important to create a system repair disc?
5. What are the different system recovery options?
How to Scan Disk
Scan Disk is one of the most common maintenance tools bundled with
an operating system. This is an application that checks the computer’s hard
drive for errors and bad sectors. Once Scan Disk finds an error in the hard
drive, it will attempt to fix it.
There are a number of reasons for the errors found inside a hard drive
and these include:
 frequent system crashes;
 critical system applications that have been improperly closed; and
 the existence of harmful programs such as viruses, trojans, etc.
What Does Scan Disk Do?
Scan Disk is designed to repair damaged hard drive sectors and
clusters on your computer’s hard drive. Majority of errors detected with the
utility programs permit the application to recover the data stored in the
damaged regions of the hard drive. When Scan Disk finds a bad or damaged
cluster during a scan, it will move the information stored in that cluster to a
new location on the computer’s hard drive. Scan Disk also checks and repairs
the integrity of file systems such as FAT, FAT32, and NTFS.
265
Figure 169. Scan Disk Window
Scan Disk requires exclusive
access to a drive when it executes.
Hence, if one or more of the files are
open on the drive that you want to scan,
Scan Disk may display a prompt asking
if you want to schedule the drive check
the next time you restart your computer.
Once Scan Disk finishes its task,
it provides a report that contains the
errors it has found and the amount of disk space it has scanned. It is therefore
important for users to use the Scan Disk application because it ensures that their
data is safe from being corrupted. Aside from this, there is a guarantee that their
computer will perform at optimum levels.
The earliest Scan Disk version appeared in MS DOS 6.2. In Windows 95
and 98, Scan Disk was given a graphical user interface (GUI). In this graphical
environment, the user can find:
 progress bars
 buttons
 information regarding the status of the scan and the errors (if any)
How to Run Scan Disk in Windows
2000 and Windows XP
 Press the Start button on
desktop.
 Double click on My Computer.
 Highlight the disk to be scanned
for bad sector on the list of Hard
Disk Drives.
 Open the File menu and select
Properties option.
 Select the Tools tab.
 Click the Check Now button.
 The scanning process will then
initiate. Figure 170. Disk Defragmenter window
266
How to Run Scan Disk in Windows Vista
 Click the Computer icon on the desktop.
 Right click the drive to be scanned with Scandisk and select
Properties.
 Click on the Tools tab. Under the Error-checking sub heading, click the
Check Now button.
 A window named Check Local Disk will appear. To attempt to correct
errors, check the Scan for and attempt recovery of bad sectors
checkbox.
 Click Start to initiate the disk scan. In Vista, it is required to schedule
the Scandisk to run at boot time as Vista has mechanisms that do not
allow it to run while the system is operating.
Run Scan Disk on Windows 7
In the deployment of Windows 7, the Scan Disk utility underwent a
name change and is now called “CHKDSK” that performs the same functions
as the legacy application for the Operating System.
Run CHKDSK Using the Graphical User Interface (GUI)
Step 1 – Select the “Computer” option from the Start menu.
Step 2 – Right click the drive to check for errors followed by clicking the
“Properties” menu button.
Step 3 – Select the “Tools” menu option followed by the “Check Now”
menu button.
If the computer drive is in use, the Operating System will display a
dialogue menu asking if you desire to schedule a full scan in the future.
Run CHKDSK from the DOS Command Prompt
Alternatively, CHKDSK can be run from the DOS or Command prompt
on the Windows 7 OS.
Step 1 – Open the DOS prompt on your computer by selecting the “Start”
and “Run” menu options.
Step 2 – Enter “cmd” followed by the “enter” key to open the command
prompt.
Step 3 – Enter “chkdsk c:” to initiate a system check of the local hard
drive. If you desire all errors to be fixed through invocation at the DOS
267
prompt, enter “CHKDSK c: /F /R” to find and fix all errors on the local
drive. If your hard drive is labeled with a different letter than “c” just
replace the letter in the above example with the actual hard drive letter on
your computer.
Answer the following questions in your answer/test notebook.
1. What are the things that the scan disk could do in a computer? How
often do you use scan disk your computer?
2. Computers should be protected from errors to prevent component
malfunction. What are the things you should do to avoid such
malfunction?
1. Concept Mapping
In this activity, write in the figures the concepts that relate to the word
“scan”. Add more shapes if you want.
2. Scan Flash Drive
Scanning your flash drive will enable you to check if there are some errors in
it.
Here's How:
a. Press the Start button on desktop or double-click the My
SCAN
268
Computer icon on your desktop.
b. Select or highlight the flash drive to be scanned for bad sector on
the list .
c. Open the File menu and select Properties option.
d. Then a window dialogue box will appear, then select the Tools tab.
e. Click the Check Now button. The scanning process will then initiate.
DELETING TEMPORARY FILES
Remove Unnecessary Data Files and Programs
Files and programs that are left idle or cluttering in your computer tend
to affect the performance of your system. This happens when the disk space
is heavily occupied and more computer resources are allocated to keep track
of them. During a read request, the disk needs to bypass all unnecessary files
to access the required data. Hence, there is a significant performance dip. In
certain situations, poorly written applications can cause undesirable effects
such as erratic system hangs, blue screens or conflict with other software.
Unused Software Application
These are usually the
software program that you
have installed but used rarely if
not at all. To remove unwanted
programs and applications,
follow these steps:
 Click Start, point to
Settings, select Control
Panel.
 Double click on the
Add/Remove Programs
icon.
 Select the unused program and click on the Remove button.
Figure 171. Add or Remove Programs
Window
269
Temporary Internet Files
These are files that accumulate in your computer when you surf the web.
Temporary files such as graphics, web pages and cookies are downloaded
into a special temporary folder to facilitate efficient web browsing. To delete
all temporary Internet files, follow these steps:
 Click Start, point to Settings, select Control Panel.
 Double click on Internet Options.
 Under the Temporary Internet Files group box, click the Delete File
button.
 Check the Delete All Offline Content option on the new window and
click Ok.
Figure 172. Internet Properties Window
270
Windows Temporary Files
Windows temporary files
are generated and stored in your
computer each time you perform
a software installation or
procedure. Very often, poorly
written programs fail to delete
them, hence causing them to be
left idle in your disk. To delete
these temporary files, follow
these steps:
 Click Start, point to
Programs, point to
Accessories.
 Point to System Tools
and select Disk
Cleanup.
 Select the drive to
clean up
 Click OK.
Computer Terminologies
Answer the following questions in your notebook. You may research on
the internet for your answers.
 What is the meaning of “cache”? internet cookies?
 How is this concept related to temporary files? What are its effects in the
computer operation? Can these files be also removed or deleted to speed
up computer operation?
Figure 173. Select Drive Dialogue
Box
Figure 174. Disk Cleanup Dialogue Box
271
Deleting Temporary Files
Directions: Choose your partner. Perform the process of deleting of
temporary internet files. You will be graded using the Performance Score
Card below:
CRITERIA Passed Failed
1. Sequence of steps in deleting is followed.
2. Safety precautions are observed.
3. The students cooperatively performed the activity.
PERFORMANCE RATING
Disk Cleanup
Disk Cleanup is a computer maintenance utility that is included in the
Microsoft Windows operating system and is designed to free up space on the
hard drive. Disk Cleanup helps free up space on your hard drive. Disk
Cleanup searches your drive, and then shows you temporary files, Internet
cache files, and unnecessary program files that you can safely delete. The
cleanup process involves searching and analyzing the hard drive for files that
are no longer needed. Then it proceeds to remove them and thus freeing up
disk space on the hard drive.
Here is the list of all the files that can be deleted from Windows XP:
272
1. Downloaded program files
2. Temporary Internet files
3. Offline webpages
4. File for the Recycle Bin
5. Temporary files
6. Web client/publisher
temporary files
7. Compressed old files
8. Catalog files for the content
indexer
Disk Cleanup is a feature of Windows that enables a user to delete
system/junk files safely. For example, by using the disk cleanup feature, you
can free up a considerable amount of space on your PC, like getting rid of TIF
(Temporary Internet Files) and other 'useless', and not required, files.
To reduce the number of unnecessary files on your hard disk to free up
disk space and help your computer run faster, use Disk Cleanup. It removes
temporary files, empties the Recycle Bin, and removes a variety of system
files and other items that you no longer need.
To delete files using Disk Cleanup
The following procedure cleans up files associated with your user account.
You can also use Disk Cleanup to clean up all the files on your computer.
1. Open Disk Cleanup by clicking the Start button . In the search box,
type Disk Cleanup, and then, in the list of results, click Disk Cleanup.
Figure 175. Disk Cleanup Dialogue
Box
273
2. In the Drives list, click the hard disk drive that you want to clean up,
and then click OK.
3. In the Disk Cleanup dialog box, on the Disk Cleanup tab, select the
check boxes for the file types that you want to delete, and then
click OK.
4. In the message that appears, click Delete files.
Remove Unnecessary Startup Programs
Some applications are automatically configured to load each time you
boot into Windows. These programs are usually represented by icons that are
loaded in your system tray (the panel located at the bottom right corner of
your screen). Most of which are unnecessary and tend to take up
unnecessary system resources which often slow down your computer.
Microsoft provides a tool called the System Configuration Utility that enables
you to configure the programs to be loaded during startup.
To use this utility, follow these steps:
1. Click Start, point to Run.
2. Type in: msconfig
3. Click on the Startup tab.
Figure 176. System Configuration Window
274
4. A list of options will appear indicates that the programs that start up
each time you load Windows.
5. Tick only those that are necessary and click OK.
6. Restart your computer. Click Restart.
If you are a Windows 2000 and Windows NT users, you can still use the
same program msconfig.exe. Since Microsoft did not include the utility in
these two versions of Windows, you have to download it. Once you have
downloaded the file into your computer, follow these steps:
1. Unzip the file.
2. Copy the msconfig.exe file into the C:winntsystem32 folder.
3. To access the utility, click Start, select Run and type in: msconfig.
Ignore the error messages about not being able to find the following
files:
o config.sys
o autoexec.bat
o win.ini
o system.ini
Activity: Internet Research
In this activity, you will learn how useful the Internet can be for a PC
support technician. Do the following tasks:
1. Research online for the importance of Disk Cleanup and when
to apply it.
2. List down the advantages and effects to the computer system.
275
Activity
Directions: Delete temporary files in different Operating Systems.
1. Delete Temporary Files in Windows 7 and Windows 8
2. Delete Temporary Files in Windows XP
Manually cleaning out the Tempfolder in Window XP is often a
necessary maintenance step when the Windows XP Disk Cleanup utility fails
to clean out the Tempfolder automatically.
Removing temporary files is a quick and easy task that can help save
disk space and keep your PC clean of file clutter. Just follow the step-by-step
directions below to manually clean out the Tempfolder:
Time Required: Manually cleaning out the Temp folder in Windows XP
usually takes less than 5 minutes.
Here's how:
1. Click on Start and then Run.
2. In the text box in the Run window, type %Temp% and click OK. A
folder full of files and other folders will appear.
All of the folders and files you see in this Temp folder are no longer
being used by Windows XP and can safely be deleted.
3. To remove individual folders or files, hold down your Ctrl key while left-
clicking on each item you want to delete. Release the Ctrl key when
you are finished.
To delete these items, press Delete key or choose File and then
Delete from the menu.
4. Confirm that you want to delete the files by clicking Yes on the Confirm
Multiple File Delete window that opens.
5. If you like to remove everything inside the Temp folder, choose Edit
and then Select All from the menu.
276
Note: If you are prompted that there are hidden files in this folder, just
click on OK to bypass the message. A few hidden files hanging out in
the Temp folder probably are not important enough to worry about.
6. Now that all of the files and folders are selected, press your Delete key
or choose File and then Delete from the menu.
7. Confirm that you want to delete the files by clicking Yes on the Confirm
Multiple File Delete window that opens.
8. After all of the files have been deleted you can close the window and
empty your Recycle Bin, permanently removing the files from your PC.
Note:
1. You may receive an Error Deleting File or Folder message while the
files are being deleted. This just means that one of the files is in use by
a program. Click OK, close all open programs, and repeat the steps
above. If you still receive the message, try restarting your PC and
repeating the process.
277
Lesson 3. Maintain Network Systems
Maintaining computer system and network increases efficiency and
saves you from the hassle and expense associated with major repairs.
However, it is essential to understand how to schedule maintenance plans
and implement it accordingly. By learning when maintenance is practical and
developing a scheduling strategy, you can set up maintenance strategies that
are beneficial to your computer system and network.
The following are the procedures on how to maintain computer system
and networks:
Create an Equipment Maintenance Schedule
In order to perform the maintenance of your computer efficiently, a
maintenance schedule is made to guide the personnel in the proper
maintenance procedure. This will help them remember the maintenance task
that needs to be done in order to improve the functionality of the computer
system and networks.
Create a Maintenance Checklist
To determine if the maintenance program is implemented according to
what is planned, an assessment must be done. The result of the assessment
will then be recorded and reported to the proper authorities for immediate
action.
The assessment is through regular inspections which assure that the
maintenance activities are done on the date and time they were was planned
and that the performance levels adhered to the defined standard.
Below is a sample Maintenance Inspection Checklist. This checklist
will confirm if the maintenance activities have been performed in order to
prolong the life of this particular equipment. The inspection items are stated in
question form as these serve as the criteria or standards of maintenance.
278
Perform the computer maintenance task regularly.
Just knowing all the basics of computer maintenance task schedule
clearly will not be enough. Find time to apply all of the maintenance
procedure regularly and frequently. Make computer maintenance activities a
regular practice, so that you always have a fine tuned computer with good
performance.
Perform Network Maintenance Procedures
Networks are used to transmit information and electricity through cables.
When installing these networks, at most care must be applied to protect the
network installers from injury. Procedures must also be followed to ensure
that those around the network cables do not become the victims of electrical
fires or other hazards.
1. Duct Systems
Networks are sometimes installed in duct systems. There is a
concern that the network cables might become damaged during
construction, so the ducts must be built away from planned
future road construction and utilities, according to the
International Telecommunication Union. The manholes placed
279
in the roads must be kept away from intersections so that the
network installation and repair workers are not at risk of being
hit by a vehicle.
Optical Lasers
Networks that use optical lasers uses invisible radiation that is
emitted by these lasers. Before installing the laser, the laser
operation manual and safety guide must be read, according to
Net Ap. No one should stare inside the optical ports from where
the lasers emit their light or else blindness could result. When
working with the laser, safety goggles must always be worn.
Falling
Many networks are run along utility poles, which are wooden
poles that have network cables raised high above the ground.
When installing these cables, falling can be disastrous given the
height of the utility poles. Therefore, network installers should
wear safety harnesses to ensure that they do not fall.
De-Energize
Some networks have cables that are electrically charged. These
cables must be de-energized and tests should be used to
ensure that the cables do not have any remaining electricity in
them. The tools that are used for repairing the cables are
insulated so that electricity does not travel through them and
into the hands of the line repairer.
Cable Safety Standards
Network cables must have certain characteristics to be legally
used for networks. The cables must not produce flames that can
ignite anything. They must not have halogen. They must not
produce acidic fumes. They must be resistant to ionizing
radiation. Cables must be coded so that those working with the
cables can identify what they are.
Cable Inspection
Networks must only be installed by licensed professionals.
Building inspectors must check the network cables to ensure
that they are installed properly and that they will not create a fire
280
hazard. These building inspections are especially important
when the property containing the network cables is sold.
General Safety
Safe working conditions help prevent injury to people and damage to
computer equipment. A safe work space is clean, organized, and properly
lighted. Everyone must understand and follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electrical
shock, and damage to eyesight. As a best practice, make sure that a fire
extinguisher and first-aid kit are available in case of fire or injury. Poorly
placed or unsecured cables can cause tripping hazards in a network
installation. Cables should be installed in conduit or cable trays to prevent
hazards.
These are some of the basic safety precautions to observe when
working on a computer:
 Remove your watch and jewelry and secure loose clothing.
 Turn off the power and unplug equipment before performing service.
 Cover sharp edges inside the computer case with tape.
 Never open a power supply or a CRT monitor.
 Do not touch areas in printers that are hot or that use high voltage.
 Know where the fire extinguisher is located and how to use it.
 Keep food and drinks out of your work space.
 Keep your work space clean and free of clutter.
 Bend your knees when lifting heavy objects to avoid injuring your back.
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries,
and fatalities in the home and the workplace. Power supplies and CRT
monitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power supplies
and CRT monitors.
281
Some printer parts become hot during use, and other parts might
contain high voltage. Check the printer manual for the location of high-voltage
components. Some components retain a high voltage even after the printer is
turned off. Make sure that the printer has had time to cool before making the
repair.
Electrical devices have certain power requirements. For example, AC
adapters are manufactured for specific laptops. Exchanging power cords with
a different type of laptop or device may cause damage to both the AC adapter
and the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment.
To avoid an electrical shock and to prevent damage to the computer, turn off
and unplug the computer before beginning a repair.
The following are general information on electrical safety:
 Electrical equipment that is plugged into a power source should
NEVER be handled if your hands or feet are wet.
 Do not allow cables and plugs to get wet. Thus, keep liquids away
from electrical equipment.
 Unplug equipment by pulling on the plug, not the cord.
 Damaged electrical equipment that constitute an electrical hazard are
not to be used until properly repaired or replaced.
 Never connect electrical cords in series.
 All electrical circuit disconnects or panels must not be blocked.
 Ground pins on the plugs and the devices plugged into the
receptacles must be intact.
 Do not store flammable liquids near electrical equipment.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire
extinguisher can prevent a small fire from getting out of control. When
working with computer components, be aware of the possibility of an
accidental fire and know how to react. Be alert to notice odors being emitted
from computers and electronic devices. When electronic components
overheat or short out, they emit a burning odor. If there is a fire, follow these
safety procedures:
282
 Never fight a fire that is out of control or not contained.
 Always have a planned fire escape route before beginning any work.
 Get out of the building quickly.
 Contact emergency services for help.
 Locate and read the instructions on the fire extinguishers in your
workplace before you use them.
Be familiar with the types of fire extinguishers used in your country or
region. Each type of fire extinguisher has specific chemicals to fight different
types of fire.
Types of Fires
Not all fires are the same. Different fuels create different fires and require
different types of fire extinguishing agents.
Class A
Class A fires are fires in ordinary combustibles such as wood,
paper, cloth, trash, and plastics.
Class B
Class B fires are fires in flammable liquids such as gasoline,
petroleum oil and paint. Class B fires also include flammable
gases such as propane and butane. Class B fires do not include fires
involving cooking oils and grease.
Class C
Class C fires are fires involving energized electical equipment such
as motors, transformers, and appliances. Remove the power and
the Class C fire becomes one of the other classes of fire.
Class D
Class D fires are fires in combustible metals such as potassium,
sodium, aluminum, and magnesium.
283
Class K
Class K fires are fires in cooking oils and greases such as animals
fats andvegetable fats.
Some types of fire extinguishing agents can be used on more than one
class of fire. Others have warnings where it would be dangerous for the
operator to use a particular fire extinguishing agent.
Different types of fire extinguishers are designed to fight different
classes of fire. The three most common types of fire extinguishers are: Water
(APW), Carbon Dioxide (CO2), Dry Chemical (ABC,BC,DC).
Water and Foam fire extinguishers snuff the fire by taking away the
heat element of the fire triangle. Foam agents also separate the oxygen
element from the other elements.
Water extinguishers are for Class A fires only - they should not be
used on Class B or C fires. The discharge stream could spread the flammable
liquid in a Class B fire or could create a shock hazard on a Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen
element of the fire triangle and also be removing the heat with a very cold
discharge.
Carbon dioxide can be used on Class B & C fires. They are usually
ineffective on Class A fires.
Dry Chemical fire extinguishers extinguish the fire primarily by
interrupting the chemical reaction of the fire triangle. Today's most widely
used type of fire extinguisher is the multipurpose dry chemical that is effective
on Class A, B, and C fires. This agent also works by creating a barrier
between the oxygen element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the memory
aid P-A-S-S to remember the basic rules of fire extinguisher operation:
 P: Pull the pin.
 A: Aim at the base of the fire, not at the flames.
 S: Squeeze the lever.
 S: Sweep the nozzle from side to side.
284
Accomplish the maintenance inspection checklist below. Put a check mark on
the column which states an action taken. Do this on your notebook.
MAINTENANCE INSPECTION CHECKLIST
Equipment Type PERSONAL COMPUTER
Property Code PC001
Location Practical Work Area
YES NO INSPECTION ITEMS
1. Are the stability of the male plug and other power
connections checked regularly?
2. Is the machine regularly cleaned?
3. Is the monitor checked and cleaned regularly?
4. Are the peripherals cleaned and checked
regularly?
5. Is the hard disk checked and cleaned regularly?
6. Are the applications regularly updated?
7. Are backing-up of files done regularly?
Video Tutorial
Directions:
Watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI and
make an outline of steps on maintenance procedure or the action taken
shown in the video.
Weekly Maintenance Checklist
Directions: Create a weekly maintenance checklist for the computer
laboratory. Include all the computer and network hardware. You will be given
40 minutes to complete the task. You can use any applications in creating the
checklist. Present your output to the class.
285
Excellent
(3)
Good
(2)
Poor
(1)
Hardware/Peripherals All
hardware/peripherals
were enumerated
Format Layout of the checklist
is good.
Details Important details
were included such as
dates, checker’s
name, area/room,
remarks, conditions,
etc.
Handwriting Legible. Good spacing
and alignment.
Total Points
Burn-In Testing
Burn-in testing enables you to run test scripts and to create new
scripts. The Diagnostics main menu provides two burn-in selections,
Immediate Burn-In Testing and Deferred Burn-In Testing.
 Immediate Burn-In enables you to run an existing script and to select
configuration options. Deferred Burn-In enables you to create a new
script.
Standard Scripts
Sun provides three ready-made scripts designed to test the general
health of the devices on your system. These scripts include:
 quick.tst
286
This script performs a series of tests that require the user to interact
with the test software. When they require a user interaction, they stop and do
not time out. These tests are faster than the full.tst but they are less thorough.
For example, they do not run all the tests associated with a DIMM.
 noinput.tst
This script performs a non-detailed test of most hardware components,
excluding those components that require user input (keyboard, mouse,
sound, and video). This test does not require user input. It is normally the first
test performed for hardware-related problems.
 full.tst
This script performs a detailed and comprehensive test on all hardware
components, including those that require user input. It includes external port
tests and requires loopback connectors on COM ports, parallel ports, and
USB ports. You must interact with the test utility to progress through these
interactive tests.
Performing Immediate Burn-In Testing
Use Immediate Burn-In Testing to run test scripts.
To Perform Immediate Burn-In Testing
1. From the Diagnostics main menu, select Immediate Burn-In Testing. The
screen displays a list of settings shown in TABLE 6-3 and a Burn-In menu.
2. From the menu, select Load Burn-In Script.A text box appears.
3. Type the name of the script you want to run, for example quick.tst,
noinput.tst, or full.tst.
4. To change any of the options, select Change Options at the bottom of the
screen.
This opens the Burn-In Options menu, which enables you to modify the
options listed in TABLE 6-3 for the currently loaded test script.
5. Select Perform Burn-In Tests.
The diagnostics software executes the test script as configured.
287
TABLE 6-3 Continuous Burn-In Testing Options
Option
Default -
General
Default using quick.tst,
noinput.tst,orfull.tst Script
All Possible
Choices
Pass
Control
Overall
Time
Overall Passes
Individual Passes,
Overall Passes, or
Overall Time
Duration 01:00 1
Enter any number to
choose the time
duration of the test
Script File N/A quick.tst, noinput.tst, or full.tst
quick.tst,
noiniput.tst, or full.tst
Report
File
None None User defined
Journal
File
None
D:noinput.jrl,D:quick.jrl, or
D:full.jrl
User defined
Journal
Options
Failed
Tests
All Tests, Absent Devices,
and Test Summary
Failed Tests, All
Tests, Absent
Devices, and Test
Summary
Pause on
Fail
N N Y or N
Screen
Display
Control
Panel
Control Panel
Control Panel or
Running Tests
POST
Card
N N Y or N
Beep
Codes
N N Y or N
Maximum
Fails
Disabled Disabled 1-9999
Show Results Summary
Selecting show results summary on the diagnostics main menu
displays the tests that have been run and lists the results, which can be Pass,
Fail, or Not Applicable.
288
 Processor
This section shows the following tests conducted against the
processor: Core Processor Tests, AMD 64-Bit Core Tests, Math Co-
Processor Tests - Pentium Class FDIV and Pentium Class FIST, MMX
Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set, and
MP Symmetry.
 Motherboard
This section shows the following tests conducted against the
motherboard: DMA Controller Tests, System Timer Tests, Interrupt Test,
Keyboard Controller Tests, PCI Bus Tests, and CMOS RAM/Clock Tests.
 Memory, Cache Memory, and Video Memory
This section shows the following tests conducted against the various
types of memory: Inversion Test Tree, Progressive Inversion Test, Chaotic
Addressing Test, and Block Rotation Test.
 Input Device
This section shows the following tests conducted against the input
device: Verify Device, Keyboard Repeat, and Keyboard LEDs.
 Mouse
This section shows the following tests conducted against the mouse:
Buttons, Ballistics, Text Mode Positioning, Text Mode Area Redefine,
Graphics Mode Positions, Graphics Area Redefine, and Graphics Cursor
Redefine.
 Video
This section shows the following tests conducted against the video:
Color Purity Test, True Color Test, Alignment Test, LCD Test, and Test Cord
Test.
 Multimedia
This section shows the following tests conducted against the
multimedia components: Internal Speaker Test, FM Synthesizer Test, PCM
Sample Test, CD/DVD Drive Read Test, CD/DVD Transfer (KB/Sec),
289
CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD Seek Time
(ms), CD/DVD Test Disk Read, and CD/DVD Tray Test.
 ATAPI Devices
This section shows the following tests conducted against ATAPI
devices: Linear Read Test, Non-Destructive Write, and Random Read/Write
Test.
 Hard Disk
This section shows the following tests conducted against the hard disk:
Read Test, Read Verify Test, Non-Destructive Write Test, Destructive Write
Test, Mechanics Stress Test, and Internal Cache Test.
 USB
This section shows the following tests conducted against the USB:
Controller Tests and Functional Tests.
 Hardware ID
The compare test is used to determine the machine ID for the system.
This test is not available for the Sun Blade X6275 server module.
Print Results Report
The Print Results Report option enables you to print results of the
diagnosis of your server if it is connected to a printer through a parallel port.
Exit
The Exit option exits the PC-Check software and reboots the server module.
Viewing the PC-Check Results
You can use the text file editor to view the results when you run PC-Check
manually. To do this, you need to know the name of the file or files produced
by the tests.
PC-Check Filenames
When you run a test, the header of the screen where you invoke the
test shows you the name of the output file. For example, when you run the
290
FIGURE 178. PC-Check System Information Menu
continuous burn-in test, the name of the output file is PCCHECK.BRN, as you
can see in the following figure.
Other files are named PCCHECK.xxx, for example, PCCHECK.JNL or
PCCHECK.HII. The .HII file is especially important because it shows the
entire host configuration at the time of failure.
Viewing PC-Check Files with the Text File Editor
When you know the name of the output file, you can use the text file
editor to view the file.
1. Select the System Information Menu option on the PC-Check
Main Menu and press Enter.
The System Information Menu appears, as shown here:
FIGURE 177. PC-Check Continuous Burn-in Testing
Page
291
FIGURE 179. PC-Check Journal File in Text Editor
2. Select the Text File Editor and press Enter. You are prompted for a file
name.
3. Type in the file name (for example, PCCHECK.JNL) and press Enter.
The editor opens with the file displayed, as shown here:
292
Lesson 4. Inspect Computer Systems and Networks
OHS Procedures in Maintaining Network Systems
In general, testing is finding out how well something works. In terms of
human beings, testing tells what level of knowledge or skill has been
acquired. In computer hardware and software development, testing is used at
key checkpoints in the overall process to determine whether objectives are
being met. For example, in software development, product objectives are
sometimes tested by product user representatives. When the design is
complete, coding follows and the finished code is then tested at the unit or
module level by each programmer; at the component level by the group of
programmers involved; and at the system level when all components are
combined together. At early or late stages, a product or service may also be
tested for usability.
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information and
Communication Technology (ICT) student should know how to behave when
working in the computer laboratory, and how to implement a safe way of
accomplishing every task. Safety practices should be learned early and
always adhered to in working with any electrical and electronic device,
including personal computers and its peripherals. This is for your protection
as well as to the people working with you, and for the devices that you are
using. The basis for this process begins with Occupational Health and Safety
Policies.
Occupational Safety and Health (OSH) is a planned system of working to
prevent illness and injury where you work by recognizing and identifying
hazards and risks. Health and safety procedure is the responsibility of all
persons in the computer and technology industries. You must identify the
hazards where you are working and decide how dangerous they are.
Eliminate the hazard or modify the risk that it presents.
293
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their
organization to report and act upon any potential workplace hazard. Students
need to be aware of the type of hazards that are possibly present in their work
environment.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other
people from harm.
4. If the hazard can easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in
charge, principal etc.) to obtain assistance.
6. Following clearing of the hazard fill out the correct documentation to
assist in identifying improved practice to reduce further incidence of
hazards.
Maintenance of the Computer Systems and Networks
Diagnostic Software for Network
Network Diagnostic Tool is an efficient and reliable tool to help you
determine and identify the possible network issues that prevent you from
using your computer to the fullest. With Network Diagnostic Tool, you can
quickly identify the problems you may be having, which sometimes occur with
home computers that are connected to the web via cable or DSL modems.
The Network Diagnostic Tool is a utility that analyzes your system and
performs a wide range of tests to determine the cause of your connectivity
issues by investigating all your network-related services and programs,
looking into your IP configuration and default gateway, but it will also test out
the DNS and Firewall.
Moreover, Network Diagnostic Tool can also run an Internet
connection validation test, in the interest of discovering the underlying
294
problems and gathering all the information you may need with a minimal level
of effort for you.
The program will assist you during the troubleshooting operation,
enabling you to save significant amounts of time by sparing you from finding
the causes of your network problems by yourself.
There are free available network diagnostic tools that can be download
online, such as Wireshark and TCPdump. It will help you monitor your
network performance and highlight discrepancies that might point to
underlying malicious activity.
Testing Demonstration
To check the vulnerability or stability of your network connection, go to the
internet and download a free network diagnostic tool.
 Go to any search engine and type – network diagnostic tool.
 After downloading the application, run the setup file of the program and
install it into your computer.
 If the program was already installed, run the application. Take note of
the diagnosis. Do some action if there are problems or errors
encountered.
Network Diagnostics for Windows XP tool
Directions: Visit the link on http://support.microsoft.com/kb/914440. Follow
the instructions given and apply them to your computer. You are to be rated
according to the rubric below.
295
Rubric for your Performance Test
CRITERIA Excellent
4
Good
3
Fair
2
Poor
1
Adherence to the
sequence of setup
-Followed carefully the
given instructions.
Workmanship
-Had organized
materials and tools
while accomplishing
the task and has time
management.
Quality of work
-Presented a neat final
output.
Schedule and Techniques in Maintaining Systems
Regular maintenance is essential to keep a network running well. You
should also be prepared to upgrade equipment and software periodically to
take advantage of improving technology.
System Restore
System Information maintains a history of device drivers that are
installed on your computer. If you are unsure of a computer's recent history,
you can use System Information to better understand what has happened in
the past. If a device does not work correctly, and its history indicates a recent
upgrade to a new driver, replace that driver with the original driver, and test to
see if doing so resolves the issue.
System Information also provides access to tools you can use for
troubleshooting your computer.
296
Figure 180. System Restore Window
If you install an update from the Windows Update Web site, and it fails
to meet your expectations, restore the original files by running the Update
Wizard Uninstall from the Tools menu in the System Information tool. If your
computer worked fine yesterday, but is not working properly today, try
restoring yesterday's configuration files by running the System Restore utility
from the Tools menu in the System Information tool.
To start Microsoft System Information, use either of the following methods:
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Information.
 Click Start, click Run, type msinfo32.exe in the Open box, and then
click OK.
To start System Restore
 Click Start, point to Programs, point to Accessories, point to System
Tools, and then click System Restore; or
 Click Start, click Run, type System Restore in the Open box, and then
press Enter key. Then, it will prompt you to the dialogue box shown
below:
 Click Next button, then it will prompt you to restore your computer to
the state it was working properly. Tick on Show More Restore Points
then check the box below to display other possible options you can
choose.
297
 Choose a Restore Point given on the list and select Next.
 Finally, choose Finish button to proceed with the process. Wait for the
computer to automatically restart as it undergoes system restore.
Figure 181. System Restore Window with More Restore
Points
Figure 182. Confirm Restore Point Window
298
After doing the performed task, you will be assessed using the
following criteria:
CRITERIA Excellent
(3)
Good
(2)
Poor (1)
1. Sequence of steps is followed.
2. Safety precaution is observed.
4. Speed (Worked in a fast manner).
PERFORMANCE RATING
Network Monitoring
Network monitoring refers to the practice of overseeing the operation
of a computer network using specialized management software tools.
Network monitoring systems are used to ensure availability and overall
performance of computers (hosts) and network services.
Network Monitoring Software Tools
The ping program is one example of a basic network monitoring
program. Ping is a network administration utility or tool used to test
connectivity on an Internet Protocol (IP) network. It also measures the latency
or delay between two computers. Ping is a software tool available on most
computers that sends Internet Protocol (IP) test messages between two
hosts. Anyone on the network can run these basic ping tests to verify the
connection between two computers is working and also measure the current
connection performance.
299
Testing Network Connection with Ping Symptoms:
 wants to test the network using Ping
 wants to test the latency of the network
1. Open the Command Prompt or Terminal. Every operating system has a
command line interface that will allow you to run the Ping command.
The Ping command operates virtually and identically on all systems.
If using Windows, open the Command Prompt. Click the Start
button and enter "cmd" into the Search field. Windows 8 users can
type "cmd" while on the Start screen. Press Enter to launch the
Command Prompt.
2. Type ping followed by an IP address or a website address then press
Enter key to execute the command. Here is a brief explanation of
commonly used ping commands:
o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk
to itself. If the loopback step fails, it might be because the TCP drivers
are corrupted, the network adapter might not be working, or another
service is interfering with IP.)
o ping <IP address> (This will ping the IP address of a device like a local
computer, remote server or any client that receives an IP address to
verify that it is reachable and that you can communicate with it
properly.) Example: ping 192.168.1.1 (this is the default IP address of
NETGEAR routers)
o ping<website address> (This command will test for the Internet
connectivity and DNS functionality.) Example: ping www.netgear.com,
ping google.com
300
Figure Command Prompt Window
Here is a screenshot of a successful ping test:
The first arrow shows the computer we are trying to reach is
responding. (The DNS address "www.netgear.com" is displayed into the
equivalent IP address, 10.1.1.86.) This also shows that the computer is
online and it has Internet access.
The second arrow shows that all of the sent packets are received
showing that there is 0% loss. This means that the connection is available
and stable.
The third arrow shows the average time it took to answer. "Average =
0ms" is the best possible result. This kind of result is usually received if the
device you tried to reach is within the same network.
Common Ping Test Problems
1. Request Timed Out. This message indicates that no reply messages
were received within the default time of 1 second. This can be due to
many different causes; the most common causes arenetwork
congestion, failure of the ARP request, packet filtering, routing error, or
a silent discard. Most often, it means that a route back to the sending
host has failed. This might be because the destination host does not
know the route back to the sending host, or one of the intermediary
routers does not know the route back, or even that the destination
host's default gateway does not know the route back. Check the routing
table of the destination host to see whether it has a route to the
sending host before checking tables at the routers.
Figure 183. Command Prompt with Ping command
301
2. Unknown Host
This error message indicates that the requested host name cannot be
resolved to its IP address; check that the name is entered correctly and
that the DNS servers can resolve it.
3. Destination Host Unreachable
This message indicates one of two problems: either the local system
has no route to the desired destination, or a remote router reports that
it has no route to the destination. The two problems can be
distinguished by the form of the message. If the message is simply
"Destination Host Unreachable," then there is no route from the local
system, and the packets to be sent were never put on the wire. Use the
Route utility to check the local routing table.
If the message is "Reply From < IP address >: Destination Host
Unreachable," then the routing problem occurred at a remote router,
whose address is indicated by the "< IP address >" field. Use the
appropriate utility or facility to check the IP routing table of the router
assigned the IP address of < IP address >.
If you pinged using an IP address, retry it with a host name to
ensure that the IP address you tried is correct.
Practicing TCP/IP Networking Skills
While connected to the Internet or another TCP/IP network, answer
these questions:
1. What is your current IP address?
2. Release and renew your IP address. What is your new IP address?
3. Are you using dynamic or static IP addressing? How do you know?
4. What is your adapter address for this connection?
5. What is your default gateway IP address?
302
Network Checking
Direction: Check the network status by using the ping command. Make a
status report on the results.
1. Ping a website.
2. Ping the router.
3. Ping a terminal/computer.
Rubric for your performance Test
Criteria Percentage Grade
Accuracy 50 %
Adherence to the procedures 20%
Workmanship(applied safety
precautions)
20%
Speed 10%
Performance Rating
303
Computer Communications
Although computers communicate on many different levels and there is
a great deal of variation between the different types of computer systems
involved, the basic communication process is relatively uniform and
standardized. Essentially, computers communicate with one another over
networks that are connected via wire or wireless communication methods.
There are many different types of networks, and there are many different
types of network-connection methods as well.
As mentioned before, there are many types of networks. From
smallest to biggest, the most common network types are personal area
network, local area network, campus area network, metropolitan area
network, wide area network, global area network and internetwork. The basic
difference between these network types is their size (how many remote
computer systems are connected to them) and their method of connection.
Methods of Connection Commonly Used
There are many different types of connection media that are used in
contemporary society to connect computer networks to one another. In terms
of wired connections, there is coaxial cable, fiber-optic cable, USB cable and
traditional telephone lines. These are the most common network
connections. Wireless technologies differ hugely from one another, but the
most popular kinds are Bluetooth and WiFi.
How network works - Computers in network
General Network Techniques - When computers communicate on a
network, they send out data packets without knowing if anyone is listening.
Computers in a network all have a connection to the network and that is
called to be connected to a network bus. What one computer sends out will
reach all the other computers on the local network.
Figure 184. General Network
304
For the different computers to be able to distinguish between each
other, every computer has a unique ID called MAC-address (Media Access
Control Address). This address is not only unique on your network but unique
for all devices that can be hooked up to a network. The MAC-address is tied
to the hardware and has nothing to do with IP-addresses. Since all computers
on the network receive everything that is sent out from all other computers,
the MAC-address is primarily used by computers to filter out incoming
network traffic that is addressed to the individual computer.
When a computer communicates with another computer on the
network, it sends out both the other computer’s MAC-address and the MAC-
address of its own. In that way the receiving computer will not only recognize
that this packet is for it but also who sent this data packet so a return
response can be sent to the sender.
In an Ethernet network as described here, all computers hear all
network traffic since they are connected to the same bus. This network
structure is called multi-drop.
One problem with this network structure is that when you have, let say
ten (10) computers on a network and they communicate frequently and due to
that they send out data packets randomly, collisions occur when two or more
computers sends data at the same time. When that happens, data gets
corrupted and has to be resent. On a network that is heavy loaded, even the
resent packets collide with other packets and have to be resent. In reality this
soon becomes a bandwidth problem. If several computers communicate with
each other at high speed they may not be able to utilize more than 25% of the
total network bandwidth since the rest of the bandwidth is used for resending
previously corrupted packets.
The way to minimize this problem is to use network switches.
305
FIGURE 185. Combined Modem and Router
Set up a DSL or cable connection
To set up a Digital Subscriber Line (DSL) or cable connection, you first
need an account with an Internet Service Provider (ISP). For DSL, the ISP is
usually a phone company; for cable, it is usually a cable TV provider.
You will also need a modem, a router, or a device that combines the
two. When you have your modem and router or your combination device,
follow the corresponding steps below.
How to plug in a combined modem and router properly
1. Plug the device into an electrical outlet.
2. Plug one end of a phone cord or cable into the wide area network
(WAN) port of the device, and then plug the other end into the wall
jack. The WAN port should be labeled "WAN." (DSL users: Do not use
a DSL filter on the phone line.)
3. Plug one end of an Ethernet cable into the local area network (LAN)
port on the device, and then plug the other end into the networking port
of the computer that you want to connect to the Internet. The LAN port
should be labeled "LAN." (If you are connecting wirelessly, skip this
step.)
4. Start (or restart) the computer.
5. Open the Connect to the Internet wizard by clicking the Start button,
clicking Control Panel, click Network and Internet, click Network
and Sharing Center, click Set up a connection or network, and then
click Connect to the Internet.
306
FIGURE 186. Modem and Router properly
plugged-in
How to plug in modem and router properly
1. Plug the modem into an electrical outlet.
2. Plug one end of a phone cord or cable into the modem, and plug the
other end into the wall jack. (DSL users: Do not use a DSL filter on the
phone line.)
3. Plug one end of an Ethernet cable into the modem, and plug the other
end into the wide area network (WAN) port on the router.
4. Plug the router into an electrical outlet.
5. Plug one end of an Ethernet cable into the local area network (LAN)
port on the router, and plug the other end into the networking port on
the computer that you want to connect to the Internet. (If you are
connecting wirelessly, skip this step.)
6. Start (or restart) the computer.
7. Open the Connect to the Internet wizard by clicking the Start button ,
clicking Control Panel, clicking Network and Internet, clicking Network
and Sharing Center, clicking Set up a connection or network, and then
clicking Connect to the Internet.
Video Tutorial
Directions:
Watch the video on http://www.youtube.com/watch?v=KBHyDd2cJBs and
make an outline of steps or procedure of the action taken presented or shown
in the video.
307
Network Connection Demo
You are required to make a network connection using the devices
provided. You will be rated according to the criteria given below.
Equipment, Tools and Materials Required:
- UTP cables
- 1 router
- 1 hub
- 2 PC unit
- DSL connection
Given the following materials, set-up a network connection on one computer.
CRITERIA 1 2 3 4 5
 Safety Precautions are observed.
 All the UTP cables are properly connected
to the computer and hub.
 Computer is properly connected and seen
in the network.
 Proper boot-up and shutdown of the
computer is observed.
Total:
308
Identify Safety Procedures and Potential Hazards for Users and
Technicians
Safety in the lab and in the work place is an important issue when
working on computers and other electrical devices. General safety guidelines
and fire safety guidelines protect the technician and the equipment.
General Safety Guidelines
Follow the basic safety guidelines to prevent cuts, burns, electrical shock,
and damage to eyesight. As a best practice, make sure that a fire extinguisher
and first aid kit are available in case of fire or injury.
Installing network cables, whether copper or fiber-optic, can be
dangerous. Often, cables must be pulled through ceilings and walls where there
are unexpected obstacles or toxic materials. You should wear clothing that
protects you from these materials. For example, wear long pants, a long-
sleeved shirt, sturdy shoes that cover your feet, and gloves. Most importantly,
wear safety glasses. If possible, ask building management, or someone
responsible for the building, if there are any dangerous materials or obstacles
that you need to be aware of before entering the ceiling area.
Cable, Cable Cutters, and Cable-Cutting Safety Hazards
All levels of technicians should know the hazards before working with
network cables and equipment. This section describes the safety hazards of
working with copper cables, which, like fiber-optic cables, can be dangerous to
handle.
Caution
When handling cable, always wear eye protection. Never touch the ends
of any type of cable to bare skin.
When you cut copper cable, the small copper strands can puncture your
skin or cut you. The small pieces that come off after cables are cut often fly into
the air. Remember to always wear safety glasses when cutting any type of
309
cable.
The cutting and crimping tools used to repair set of terminate copper
cables can be dangerous if not used properly. Read the instructions that comes
with the tool. Practice using the tool on scrap cable, and ask an experienced
installer for help if you need it.
Remember that copper cable conducts electricity. A faulty equipment,
static electricity, or lightning can energize even a disconnected cable. If in
doubt, test the cable you are working on with a simple voltage detector before
touching it.
Preparing Technical Reports
The main purpose of a technical report is to deliver information. Technical
reports are intended primarily for the long-term archival of results and
descriptions and for monitoring the conditions of laboratory facilities such as the
computers, network status and other hardware facilities.
A good report needs careful planning. As part of the planning stage, you
should answer the following questions.
 What is the report about? What are you trying to say? You should
arrange things so that the key facts and conclusions are very accessible.
Not everyone will read the whole report, so ensure that your message is
concise even if a person only skims the document.
 Who are you writing for? It is simply impossible to write a technical
document that will be equally easy for everybody to read: the level of
explanation you need for an expert audience is totally different from the
explanation needed for readers who are unfamiliar with the subject. It is
absolutely essential that you identify the potential readers — the
professional group, not the individuals — before you start your work.
 How long can the report be? It is difficult to predict in advance exactly
how long a report will be. Technically speaking, writing reports for
hardware and other facilities should be specific and itemized.
310
A hardware report can help you to:
 identify the hardware components inside your computer – CPU, memory,
motherboard etc;
 understand conflicting hardware inside your computer; and
 help the computer repair person to understand your computer with a
written, detailed hardware report (therefore he can find the missing
drivers faster, for example).
Fill-up the following reports.
Sample of simple Technical Reports.
311
Sample Detailed Technical Report
312
Computer Item Enumeration
Directions: Enumerate the hardware items that can be seen inside the
computer laboratory, applications installed in a computer, network devices,
computer tools and others.
Creating Computer Hardware – Software – Tools Report
Directions: Create Computer Hardware – Software – Tools Report on the
available devices in your computer laboratory. Reports will be based on the
items inspected in the laboratory. Create your own format. You are to be
rated according to the score card below.
PERFORMANCE SCORE CARD
CRITERIA Percentage Score
1. Originality of format and layout 40%
2. Content of the report 40%
3. Proper use of equipment and materials is
observed.
10%
4. Observance of Safety Precautions 10%
PERFORMANCE RATING
313
I. Identify what maintenance procedure is described in each situation.
__________1. This will allow proper circulation of air inside the computer unit.
_________ 2. This will help lessen the attacks of viruses and will increase the
life span of your computer.
__________3. This means taking care of your computer.
__________4. Protecting your files means creating backups, storing your file
backups on your hard drive or any removable storage device regularly.
__________5. By deleting the temporary files on your computer, it will
enhance its speed and will create more disk space for your files.
__________6. Regularly update your anti-virus for your computer protection
against viruses.
__________7. To avoid damage to the computer unit always turn off and
unplugged it when trying to transfer the computer to another location.
__________8. Installing passwords makes your files more secure.
__________9. Maintenance of equipment or systems before fault occurs
__________10. This will allow proper circulation of air inside the computer
unit.
II. Choose the letter of the correct answer:
1) It refers to a list of the key components that make up the computer.
a. Specs c. Brand
b. Manufactures d. Checklist
2) The main working memory in a computer is called ___________.
a. ROM c. Processor
b. RAM d. memory chips
314
3) It stores the applications and programs that run on the PC, as well as
any work created by users.
a. CD/DVD c. Hard drive
b. RAM d. Zip drive
4) These cards are installed inside a PC and are responsible for
determining the quality of the visuals output by the computer.
a. Audio Card c. LAN Card
b. Graphics Card d. Adapter card
5) These are the two leading companies when it comes to manufacturing
processors.
a. HP and Dell c. AMD and Intel
b. Epson and Canon d. Acer and Asus
6) This card allows a computer to be connected to a network. A
10/100/1000 Mbps (Megabits per second) card is the standard card
specifications today
a. Audio Card c. Network Card
b. Graphics Card d. Adapter card
7) It is a free open source operating system.
a. Microsoft Windows c. Mac OS
b. Linux d. Chrome OS
8) A cabling is used to connect your wired network adapters to a router or
network switch.
a. Internet c. coaxial
b. Ethernet d. fiber optic
9) A glue that holds your home network together
a. router c. Hub
b. DSL d. Ethernet cable
10) The standard transfer speed of your wireless connection is
__________.
a. 802.11g c. 802.11m
b. 801.11g d. 802.11j
11)The wired half of your router has a speed of _____________.
a. 10/100 Mbps c. 100/1000 Mbps
b. 10/10/100 Mbps d. 10/10/1000 Mbps
315
12) Routers have two types of ports available at the back. Which is not
part of it?
a. LAN c. MAN
b. WAN d. WLAN
13) It basically means to create a redundant copy of a data.
a. Data Backup c. System restore
b. Image copy d. hardcopy
14) It refers to any kind of malicious codes, objects or content that
infiltrates your computer, resulting in damage and causing your system
to act in an undesirable manner.
a. Software c. Malware
b. Spyware d. Firmware
15) Software is used to identify problems on a computer or piece of
equipment.
a. Network software tool c. Diagnostic Software tool
b. Hardware Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives
can work more efficiently.
a. Defragmenter c. software
b. Fragmenter d. defrag
17) It is a system-defined database which is used by an Operating
System to store all the information needed to configure the Windows
settings.
a. Registry c. Registration
b. Register d. Registering
18) This is an application that checks the computer’s hard drive for errors
and bad sectors.
a. Scan c. Scan Disk
b. System Restore d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft
Windows operating system and it is designed to free up space on the
hard drive.
a. Network software tool c. Scan Disk
b. Data Backup d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you
determine and identify the possible network issues that prevent you
from using your computer to the fullest.
a. Burn-in c. Diagnostic Software tool
b. Hardware Software tool d. Network Diagnostic tool
316
III. Match Column A with Column B
Column A Column B
1. Creates and deletes disk
partitions
A. Scan disk
2. Optimizes use of space on a
disk
B. Format
3. Prepares a hard drive prior to
use
C. Defrag
4. Removes unused files. D. Disk Cleanup
5. Checks for physical errors on
the disk surface
E. Fdisk
317
Books and Articles and Printed Materials:
Amy Hisson, “Computer Assembly and Configuration- Lab and Assignments”
David Anfinson, Ken Quamme “IT Essentials: PC Hardware and Software
Companion Guide” 3rd
Edition- 2008 at 800 East 96th
Street
Indianapolis, Indiana 46240 USA
Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter “Introduction to
Information Technology” 3rd
Edition- 2005 at Rosewood Drive, Denver,
John Wisley and Sons(Asia) Pte. Ltd
Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie
P. Lujero “Technology and Livelihood Education- Information and
Communications Technology Learners Manual – Grade 7 & 8”
Rosalie P. Lujero, Ronaldo V. Ramilo “Technology and Livelihood Education-
Information and Communications Technology Learners Manual –
Computer Hardware Servicing Grade 9”
Electronic Resources:
“Definition of Configuration” Retrieved from
http://www.webopedia.com/TERM/C/configuration.html
“File Sharing” Retrieved from
http://www.techopedia.com/definition/16256/file-sharing
“Fundamentals of PC repair” Retrieved from http://www.ustudy.in/ce/hard/u1
“Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best
Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 |
Networking Tips | UNIX and LINUX Usability | Installation Procedure Of
Various Operating Systems | computer repair | computer problems”
Retrieved from http://101-computer-
troubleshooting.blogspot.com/2009/09/directx-diagnostic-tool-
dxdiag.html-
318
“How to configure peer to peer workgroup network step by step Guide”
Retrieved from http://computernetworkingnotes.com/basic-workgroup-
networking/workgroup-set-up.html-
“How to make an Ethernet cross over cable” Retrieved from
http://www.makeuseof.com/tag/ethernet-crossover-cable/
“Occupational Safety Precautions” Retrieved from
“peer to peer networking” Retrieved from
http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en
&docname=bph05694-
“Ping Tim Fisher” Retrieved from
http://pcsupport.about.com/od/commandlinereference/p/ping-
command.htm-
“Puzzles for Activities” Retrieved from
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp
“System Configuration utility” Retrieved from
http://moderncomputerskillsandtraining.com/?page_id=2950-
“Turn On the Windows Firewall” Retrieved from
http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-on-
off#turn-windows-firewall-on-off=windows-7
“Windows Registry” Retrieved from
http://pcsupport.about.com/od/termsr/p/registrywindows.htm--
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE
_PC_v40_Chapter2.pdf
319
Client/serverNetwork- a computer network in which one centralized, powerful
computer called server is a hub to which many less powerful personal
compters or workstations called clients are connected.
Coaxial cable- a type of wire that consists of a center wire surrounded by
insulation and then a grounded shield of braided wire which minimizes
electrical interference.
Configuration- the way a system is set up. Configuration can refer to either
hardware or software, or the combination of both.
Cross-over- is a cable used to connect two network devices directly.
Direct X- a set of APIs developed by Microsoft that enables programmers to
write programs that access hardware features of a computer without
knowing exactly what hardware will be installed on the machine where
the program eventually runs.
Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to
transmit data. Fiber optics has several advantages over traditional metal
communications lines.
IP Address- is a number that is used to identify a device on the network.
IP config- is a command used to find out the IP address of a certain network.
Network- is a group of two or more computer systems linked together.
Peer-to-peer Network- a type of network in which each workstation has
equivalent capabilities and responsibilities.
Ping- a command prompt used to test the ability of the source computer to
reach a specified destination computer.
320
Protocol- is the special set of rules that end points in a telecommunication
connection use when they communicate.
Registry- is a database used by Windows operating system to
store configuration information.
RJ45- short for Registered Jack-45, it is an eight-wire connector used
commonly to connect computers onto a Local-Area Network (LAN).
Security- techniques for ensuring that data stored in a computer cannot be
read or compromised by any individuals without authorization
Straight-through- is used in local area network to connect a PC to a network
hub and router.
Subnet mask- is used to determine what subnet an IP address belongs to. An
IP address has two components, the network address and the host
address.
Twisted pair- is a type of cable that consists of two independently insulated
wires twisted around one another.
Virus- is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.

More Related Content

PPTX
Regional Diagnostic Test ICT-CSS-10.pptx
PDF
1st quarter css week 1
DOCX
TLE10_ICT_CSS_Q1_M4_v3 (1).docx
PPTX
Maintaining computer and network system
PDF
TLE - Information and Communications Technology - Computer Hardware Servicing...
PDF
Css grade 11 week 1
PPTX
Computer issues - TLE ICT 10
PPTX
Ict 9 module 3, lesson 1.2 understanding computers
Regional Diagnostic Test ICT-CSS-10.pptx
1st quarter css week 1
TLE10_ICT_CSS_Q1_M4_v3 (1).docx
Maintaining computer and network system
TLE - Information and Communications Technology - Computer Hardware Servicing...
Css grade 11 week 1
Computer issues - TLE ICT 10
Ict 9 module 3, lesson 1.2 understanding computers

What's hot (20)

PPTX
Css q3 week2
PDF
CHS Learning Module Grade 9
PPTX
Grade 7 ICT Trends and Issues in ICT - MATATAG.pptx
PDF
K to 12 electrical teacher's guide
PDF
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
PPTX
Materials, Tools, Equipment and Testing Devices
PPTX
Lesson 02 areas of tle
PDF
acronyms of parts of computer system servicing
PPTX
Personal entrepreneurial competencies (pecs)
PDF
Quarter ii css 9
PDF
K to 12 pc hardware servicing teacher's guide
PDF
Curriculum guide ICT 7
PDF
CSS L03 - Mensuration and Calculation in CSS
PDF
Applying quality-standard (css)
PPTX
T.L.E. GRADE 7 LESSONS
PPTX
Computer hardware servicing practice occupational health and safety procedure
PDF
TLE/HE Household Services Curriculum Guide
PPTX
381091947 introduction-computer-systems-servicing-nc-ii
PDF
K to 12 Carpentry Learning Modules
PPTX
TLE 10 (ICT): LAN Cabling
Css q3 week2
CHS Learning Module Grade 9
Grade 7 ICT Trends and Issues in ICT - MATATAG.pptx
K to 12 electrical teacher's guide
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
Materials, Tools, Equipment and Testing Devices
Lesson 02 areas of tle
acronyms of parts of computer system servicing
Personal entrepreneurial competencies (pecs)
Quarter ii css 9
K to 12 pc hardware servicing teacher's guide
Curriculum guide ICT 7
CSS L03 - Mensuration and Calculation in CSS
Applying quality-standard (css)
T.L.E. GRADE 7 LESSONS
Computer hardware servicing practice occupational health and safety procedure
TLE/HE Household Services Curriculum Guide
381091947 introduction-computer-systems-servicing-nc-ii
K to 12 Carpentry Learning Modules
TLE 10 (ICT): LAN Cabling
Ad

Viewers also liked (20)

PDF
K-12 Module in TLE - ICT Grade 10 [All Gradings]
PDF
Learning Module Cookery Grade 10
PDF
Computer Hardware Servicing Learner's Material Grade 10
PDF
K to 12 PC Hardware Servicing Learning Module
PDF
LM Cookery G10
PDF
Lm wellness massage g10
PPTX
Learning objectives and goals
PPTX
Student learning goals
DOCX
The ICT Capability of Secondary School
PDF
K to 12 Mechanical Drafting Learning Module
DOCX
THE FINANCIAL CAPABILITY OF A FILIPINO FAMILY FOR EDUCATION
DOC
First Quarter of 2013 Regional Monitoring, Evaluation and Plan Adjustment (RM...
PDF
Guidelines on the Assessment and Rating of Learning Outcomes under the K to...
PDF
Learning Module Cookery G9
PDF
Lm household services-grade_9_1st and 2nd quarter
PPTX
Personal Entrepreneurial Competencies (PECS) in Commercial Cooking
DOCX
Technology Design and Innovation Summative Multiple Choice
DOC
Grade 10 Math Module 1 searching for patterns, sequence and series
PDF
Lm household services-grade_9_3rd and 4th quarter
PDF
K to 12 household services teacher's guide
K-12 Module in TLE - ICT Grade 10 [All Gradings]
Learning Module Cookery Grade 10
Computer Hardware Servicing Learner's Material Grade 10
K to 12 PC Hardware Servicing Learning Module
LM Cookery G10
Lm wellness massage g10
Learning objectives and goals
Student learning goals
The ICT Capability of Secondary School
K to 12 Mechanical Drafting Learning Module
THE FINANCIAL CAPABILITY OF A FILIPINO FAMILY FOR EDUCATION
First Quarter of 2013 Regional Monitoring, Evaluation and Plan Adjustment (RM...
Guidelines on the Assessment and Rating of Learning Outcomes under the K to...
Learning Module Cookery G9
Lm household services-grade_9_1st and 2nd quarter
Personal Entrepreneurial Competencies (PECS) in Commercial Cooking
Technology Design and Innovation Summative Multiple Choice
Grade 10 Math Module 1 searching for patterns, sequence and series
Lm household services-grade_9_3rd and 4th quarter
K to 12 household services teacher's guide
Ad

Similar to CHS Learning Module G10 (20)

PDF
Ict impotant deped
DOCX
TLE10_ICT_CSS_Q1_M3_v3.docx
PDF
ICT MODULE 10.pdf
PPTX
201 how to use the computer
PDF
LAS 6.pdf
DOCX
IT-era-Syllabus-dox-for-school-purposes-
PDF
358111385 computer-systems-servicing-dll
PPT
G R I Marketing Comm Technology
PPTX
Unit 1 introduction to computers
PPTX
June 2010 Cis Workshop Class
PPTX
June 2010 Cis Workshop Class
DOCX
Course Description G10.docx
DOCX
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
DOCX
Syllabus chs 9
XLS
AlphaTech Learning Objectives
DOC
Computer basics
PDF
Q1_LE_TLE 7_Lesson 1_Week 1 ICT 7 JOB.pdf
PDF
MATATAG CURR_Q1_LE_TLE 7_Lesson 1_Week 1.pdf
PDF
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University
Ict impotant deped
TLE10_ICT_CSS_Q1_M3_v3.docx
ICT MODULE 10.pdf
201 how to use the computer
LAS 6.pdf
IT-era-Syllabus-dox-for-school-purposes-
358111385 computer-systems-servicing-dll
G R I Marketing Comm Technology
Unit 1 introduction to computers
June 2010 Cis Workshop Class
June 2010 Cis Workshop Class
Course Description G10.docx
421543902-BUDGET-OF-WORK-ICT-GRADE-10.docx
Syllabus chs 9
AlphaTech Learning Objectives
Computer basics
Q1_LE_TLE 7_Lesson 1_Week 1 ICT 7 JOB.pdf
MATATAG CURR_Q1_LE_TLE 7_Lesson 1_Week 1.pdf
B Sc IT II Sem NHSB Networking For Home And Small Business Amity University

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PDF
01-Introduction-to-Information-Management.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
01-Introduction-to-Information-Management.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Classroom Observation Tools for Teachers

CHS Learning Module G10

  • 1. GOVERNMENT PROPERTY NOT FOR SALE ALLOTTED TO District/ School: _________________________________________ Division _________________________________________________ First Year of Use: _________________________________________ Source of Fund (Year included):__________________________ Basic Education Curriculum TECHNOLOGY AND LIVELIHOOD EDUCATION Information and Communications Technology Learner’s Material Computer Hardware Servicing
  • 2. ii Department of Education Republic of the Philippines Computer Hardware Servicing –Grade 10 Learner’s Material First Edition, 2014 ISBN: ___________ Republic Act 8293, section 176states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this book are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Br. Armin A. Luistro FSC Undersecretary: Dina S.Ocampo, Ph.D. Assistant Secretary: Lorna Dig Dino, Ph.D. Printed in the Philippines by ____________ Department of Education-Instructional Materials Council Secretariat(DepEd-IMCS) Office Address: 2nd Floor Dorm G, Philsports Complex, Meralco Avenue, Pasig City, Philippines 1600 Telefax: (02) 634-1054, 634-1072 E-mail Address: imcsetd@yahoo.com Development Team of the Learner’s Material Authors: Rosalie P. Lujero Teacher III / School ICT Coordinator Dasmariñas East National High School Ronaldo V. Ramilo Education Program Specialist Division of Tanauan Michael Angelo C. Gatchalian Teacher III / School ICT Coordinator Dagupan City National High School Editors: Joemar A. Garraton Reviewers: Romeo B. Gacutan, Simfroso C. Robles II and Marion I. Alinas Illustrator and Layout Artists: Subject Specialist: Owen M. Milambiling Management Team: Dr.Lolita M. Andrada, Jocelyn DR Andaya, Bella O. Mariñas, Dr. Jose D. Tuguinayo, Jr.
  • 3. iii TABLE OF CONTENTS Module 1: PERSONAL ENTREPRENUERIAL COMPETENCIES (PECs) Introduction ………………….……………………………………. 1 Objectives …………………………………………………………. 2 Pre-Assessment ………………………………………………….. 3 Learning Goals and Target …….……………………………… Reading Resources and Instructional Activities ……………… 4 4 What to Know…………………………………………………….. 6 Assessment of PECs vis-à-vis Entrepreneur .……………….. What to Process.……………………………………………..…. 6 7 What to Reflect and Understand ……………………………… 9 What to Transfer ………..……………………………………… 12 Module 2: ENVIRONMENT AND MARKET (EM) Introduction ………………….……………………………………. 14 Objectives …………………………………………………………. 15 Pre-Assessment ………………………………………………….. 15 Learning Goals and Target …….……………………………….. Reading Resources and Instructional Activities ……………… What to Know …………………………………………………… Product Development ……………………………………… Concept of Developing Product …………………………. Finding Value ……………………………………………… Innovation …………………………………………………. Unique Selling Proposition……………………………….. What to Process…………………………………………………. What to Reflect and Understand ……………………………… What to Transfer………………………………………………… What to Know …..………………………………………………… 18 19 19 19 22 22 23 23 24 25 26 27
  • 4. iv Generating Ideas for Business ………………………….. Key Concept of Selecting a business Idea …………….. Branding …………………………………………………… What to Process.………………………………………………………….….. What to Reflect and Understand ...……………………………………….. What to Transfer …………………………………………………………... 27 29 30 31 33 34 Module 3: CONFIGURING COMPUTER SYSTEMS AND NETWORK Introduction ……………………………………………………… Learning Competencies / Objectives ………………………… - Pre-Diagnostic / Assessment …………………………………. - Reading Resources / Instructional Activities ……………….. - Plan and Prepare for Configuration of Computer Systems and Networks ……………….. - What to Know …………………………………………………… - Safety Procedures…………………………………….. - General Safety Guidelines ………………………….. - Fire Safety Guidelines ………………………………. What to Process ……………………………………………….. Peer to Peer Activity ………………………………… What to reflect / Understand …………………………………. Research and Investigation ………………………… What to Transfer ……………………………………………….. Role Playing …………………………………………... What to Know …………………………………………………… Prepare Tools Used for Configuration ……………. Structure of the Registry ……………………………. What to Process ……………………………………………….. MS Configuration and Command Classification … Applet Grouping …………………………………….. 36 37 38 43 43 43 43 44 44 44 45 45 46 46 47 47 48 48 53 56 56 57
  • 5. v What to Reflect / Understand ………………………………… Research and Explore …………………………….. What to Transfer ………………………………………………. Oral Presentation ……………………………………. What to Know ………………………………………………….. Procedure in Using Computer System Configuration Tools………………………………….. What to Transfer ……………………………………………….. Windows registry Backup and Recovery………. Reading Resources / Instructional Activities…………… Configure What to Know ………………………………………………. Safety Precautions related to Networks ……… Fiber-Optic Safety ………………………. Chemical ………………………………… Tools ……………………………………… Glass Shards …………………………… Harmful Light …………………………… What to Know ……………………………………………… Networking Devices, Media and Connector …… Common Network Cables ……………………… Twisted Pair ……………………………………… Category Rating ………………………………… Coaxial Cable ………………………………… Fiber-Optic Cable ………………………………… Creating Ethernet Cable ………………………… What to Process…………………………………………… Criss-Cross Puzzle……………………………. What to Reflect / Understand …………………………. What to Transfer………………………………………… Create Your Own Ethernet Cable……………. 58 59 60 60 61 61 68 68 82 83 83 84 84 84 84 85 85 85 85 86 87 87 88 89 93 93 94 96 96
  • 6. vi What to Know…………………………… Internet Protocols………………………. IP Addressing…………………………….. Subnet Mask…………………… IpConfig…………………… How to Assign IP Address…………… Ping……………………………………. What to Process……………………………… Protocols…………………………………………….. Identify IP Address Classes……………………….. What to Reflect / Understand……………………… Reflection on the Video Presentation…… What to Transfer…………………… Configure an Ethernet NIC to use DHCP…… Configure Wireless Router……… What to Know……………………………. Peer to Peer Network…………………………… Peer to Peer Network in Windows XP…………… Peer to Peer Network in Windows 7…………….. Client/ server Network ……………………………. What to Process……………………… What to reflect/understand ……………….. What to Transfer…………………… What to Know……………………………… Network Security………………………… Security Attacks…………………………. Virus, Worms, and Trojan Horses…………………. Security Procedure………………………… Data Encryption………………………. Port Protection……………………… 98 98 100 102 102 104 108 111 111 112 112 113 114 114 120 123 123 124 128 134 136 136 140 141 141 142 142 143 144 145
  • 7. vii How to Enable Windows 7 Firewall…………….. Wireless Security Techniques………………… What to Process……………………… Short Quiz………………………… What to reflect / Understand ………… What to Transfer……………… Configure Windows XP Firewall…………. What to Know…………………………… File Printer Sharing……………………. Printer Sharing……………………………. What to Process……………………………………… Essay Writing ……………………… What to Reflect…………………………….. Read and Examine…………………….. What to Transfer………………………………………… Share Folder, Printer and Set Share Permission… Reading Resources / Instructional Activities Inspect and Test Configured Computer System And Network……………………………………… What to Know……………………………… Safety Precautions………………………… Accident Reports ………………………. Hazardous Substances……………………….. Fire Exits………………………………….. Fire Safety Procedure…………………… Personal Safety While Working with PCs…………. What to Know……………………………….. Guidelines for Testing Configured Computer System and Network………………………….. Testing Your Computer Network ………………… 147 148 150 150 151 152 152 157 157 159 161 161 161 161 162 162 170 171 171 172 173 173 173 174 174 174 174
  • 8. viii Writing a Technical Report on Test Conducted ….. What to Transfer………………………………………… Test the Wireless NIC…………………………….. Summative Test ……………………………………………. Module 4: MAINTAINING COMPUTER SYSTEMS AND NETWORK Introduction …………………………………………………. Learning Competencies / Objectives……………………….. Pre – Diagnostic / Assessment……………………………… Skills Test Reading Resources / Instructional Activities………………… Procedure in Planning and Conducting Maintenance Preventive Maintenance……………………………. Maintenance Procedure…………………………… What to Know………………………………………………….. Diagnosis and Identification of Faulty Computer and Networks Preventing Computer System Failure ………………. Network Problems ………………………………..…… What to Process………………………………………………….. Slide Show of Computer and Network Errors What to Reflect / Understand…………………………………… Pictorial Tour What to Transfer………………………………………………… Video Demo What to Know……………………………………………………… Maintain Computer and Network System Some Downloada What to Process………………………………………………. 176 177 177 182 187 188 190 191 191 192 196 199 203 203 204 204 207
  • 9. ix What to Reflect / Understand…………………………………… Investigative Report What to Transfer……………………………………………….. Magazine Article What to Know……………………………………………………… Computer Specification Understanding Computer Specification What to Process………………………………………………….. Internet Research What to Reflect / Understand…………………………………… Making Checklist What to Transfer………………………………………………… Computer Specifications What to Know……………………………………………………… Networking Hardware Requirements What to Process………………………………………………….. Network Layout What to Reflect / Understand…………………………………… Critical review What to Transfer………………………………………………… Computer Shop Network Layout Reading Resources / Instructional Activities Maintaining Computer System ………………………………. What to Know……………………………………………………… Maintenance of Computer System…………………… Data Backup………… ………………………………… Wh Malware Maintenance/Disk Maintenance…………… What to Process………………………………………………….. Essay activity What to Reflect / Understand…………………………………… 208 208 209 214 215 216 217 220 221 221 223 224 224 225 228 229 230
  • 10. x Research and Investigate What to Transfer………………………………………………… Demonstration What to Know……………………………………………………… Diagnosis and Identification of Faulty System What to Process………………………………………………… Critical Review What to Reflect / Understand………………………………. Slide Show Presentation What to Transfer………………………………………………… Video Tutorials Inspect and Test Conf What to Know……………………………………………………… Diagnostic Software Tools Procedure in Cleaning Hardware Components Cleaning Tools What to Process………………………………………………… Ways To Improve Your Computer Performance To Defragment Your Hard Disk. How to Defragment Your Computer Hard Drive Cleaning Windows Registry Organizing Disk Drive Partition. What to Reflect / Understand…………………………….……. Evaluating Your Needs What to Transfer…………………………………………………. Defragmentation Issue What to Know……………………………………………………… Understanding Partitions Making a Disk Image Backup 230 231 238 238 239 240 253 258 258 259
  • 11. xi What to Process…………………………………………………………… Duplication – Disk Image backup What to Reflect / Understand…………………………….…………..…. Critical Review What to Transfer……………………………………..…………….……. Online Review What to Know…………………………………………………….……… How to Scan Disk What to Process…………………………………………………….…… How to Run Scan Disk in Windows 2000 and Windows XP How to Run Scan Disk in Windows Vista Run Scan Disk on Windows 7 Run CHKDSK Using GUI Run CHKDSK from the DOS Command Prompt What to Reflect / Understand………………………………….….……. What to Transfer……………………………………..…………….……. Concept Mapping Scan Flash Drive What to Know…………………………………………………………….. Delete Temporary Files Unused Software Application What to Process………………………………………………….……… Temporary Internet Files Windows Temporary Files What to Reflect / Understand………………………………….….……. Computer Terminologies What to Transfer…………………………………………….………….. Deleting Temporary Files What to Know…………………………………………………………….. Disk Cleanup 260 263 264 264 265 267 267 268 269 270 271 271
  • 12. xii What to Process……………………………………………. Remove Unnecessary Startup Programs What to Reflect / Understand………………………………….….……… Internet Research What to Transfer…………………………………………….…………….. Activity Maintain Network Systems ……………………………………………… What to Know……………………………………………………………… Procedure on how to maintain Computer System and Networks Perform computer maintenance task regularly General Safety Electrical Safety Fire Safety What to Process………………………………………………..…………… Maintenance Inspection Checklist What to Reflect / Understand………………………….………….….……. Video Tutorial What to Transfer…………………………………..…………….………….. Weekly Maintenance Checklist What to Know………………………………………………….……………. Burn-In Testing Standard Scripts What to Process…………………………….………………………………. Performing Immediate Burn- in Testing Reading Resources / Instructional Activities Inspect Computer Systems and Networks………………………. What to Know……………………………………………………….…….. Maintenance of the Computer System and Networks What to Process…………………………….………………………………. Testing Demonstration 272 274 275 277 277 284 284 284 285 286 291 293 294
  • 13. xiii What to Reflect / Understand………………………….………….….……. Network Diagnostics for Windows XP Tool What to Transfer…………………………………..…………….………….. Schedule and Techniques in Maintaining Systems What to Know……………………………………………………………… Network Monitoring What to Process…………………………………………………………… Testing Network Configuration What to Reflect / Understand………………………….………….….……. Practicing TCP/IP Networking Skills What to Transfer…………………………………..…………….………….. Network Checking What to Know……………………………………………………………… Computer Communications Methods of Connection Commonly Used How Network Works- Computer in network What to Process…………………………………………………………… Set Up a DSL or cable connection What to Reflect / Understand………………………….………….….……. Video Tutorial What to Transfer…………………………………..…………….………….. Network Connection Demo What to Know……………………………………………….………………. Identify Safety Procedures and Potential Hazards for Users and Technician Preparing Technical Reports What to Process…………………………………………………………… Simple Technical Reports What to Reflect / Understand………………………….………….….……. Computer Item Enumeration 294 294 298 299 301 302 303 305 306 307 308 310 312
  • 14. xiv What to Transfer…………………………………..…………….………….. Computer Hardware- Software Tools Report Summative Test ……………………………………………………………... References …………………………………………………………………… Glossary ………………………………………………………………………. 312 313 317 319
  • 15. 1 Module 1 Personal Entrepreneurial Competencies (PECs) Content Standards Performance Standards The learner demonstrates understanding of one’s PECs in Computer Hardware Servicing. The learner independently creates a plan of action that strengthens and/or further develops his/her PECs in Computer Hardware Servicing. Quarter I Time Allotment: 4 hours In this module, you will learn more about entrepreneurship and the entrepreneurial competencies related to Computer Hardware Servicing. You will have a first-hand experience in educational activities leading to assessment of your personal entrepreneurial competencies (PECs) and the entrepreneurial competencies of a successful computer technician within your province. You will also have several activities that will align your competencies with those of successful practitioners. Moreover, this module will encourage you to think about entrepreneurship and its role in the business community as well as in the economic and social development of an individual. To start with this module, let us first understand entrepreneurs and entrepreneurship. Entrepreneurs are those with the skills and capabilities to see and evaluate business opportunities. They are individuals who can strategically identify products or services needed by the community, and have the capacity to deliver them at the right time and at the right place. Entrepreneurs are agents of economic change; they organize, manage, and assume risks of a business. Some of the good qualities of entrepreneurs are: opportunity-seeker, risk-taker, goal-setter, excellent planner, confident problem-solver, hardworking, persistent and committed.
  • 16. 2 Entrepreneurship, on the other hand, is not just a simple business activity but a strategic process of innovation and new product creation. Basically, entrepreneurship is both an art and science of converting business ideas into marketable products or services to improve the quality of living. Now that you have background knowledge about entrepreneurs and entrepreneurship, you can now walk through in assessing your PECs. Always remember that successful entrepreneurs continuously develop and improve their PECs. To begin, let us find out the competencies you will have gained upon completion of this module. At the end of this module, you are expected to:  identify areas for improvement, development, and growth,  align your PECs according to your business or career choice, and  create a plan of action that ensures success in your business or career choice. Now try to take the first challenge in this module, the pre assessment. As part of your initial activity, try to assess your prior knowledge and experience related to personal entrepreneurial competencies. Answer Task 1. Task 1: Matching Type Directions: Match the entrepreneurial competencies in column A with their meaning in column B. Write the letter of the correct answer on the space provided before each number. A B ____1. Creative A. makes wise decisions towards the set objectives ____2. Profit-oriented B. strategic thinking and setting of goals ____3. Disciplined C. trusting in one’s ability Pre-assessment assessmentObjectives
  • 17. 3 ____4. Sound decision maker D. adoptable to change ____5. Possess people skills E. innovates to have an edge over other competitors ____6. Excellent Planner F. solid dedication ____7. Confident G. skillful in record keeping ____8. Hardworking H. always sticks to the plan ____9. Ability to accept change I. work diligently ____10. Committed J. effective and efficient communication skills and relates well to people K. always looking for an opportunity to have/earn income. Task 2: Guide Questions Directions: The following are guide questions which covers the entire module. Write your answers on your assignment notebook. Discuss / share these to the class. A. Explain why entrepreneurial activities are important to social development and economy progress. B. What entrepreneurial activities related to Computer Hardware Servicing do you know and are capable of doing? C. If you were given the opportunity to own a business that relates to Computer Hardware Servicing, do you think you will be confident to manage it? Explain your answer. D. What do you think are the most important competencies one must possess in order to be successful in running a chosen business? E. Name successful entrepreneurs from your province whose businesses are related to Computer Hardware Servicing. Make sure you will be able to share with the class the PECs that made them successful.
  • 18. 4 After all the guide questions are answered, share these with your classmates. You may also compare your insigths, personal knowledge, and relevant experiences on the topic to make the sharing more exciting and engaging. Learning Goals and Targets After understanding the objectives of this module, having gone through pre-assessment, and answering the guide questions, you will be asked to set your own personal goals and targets. These goals and targets will urge you to further achieve the ultimate objective of this module. In the end, these ultimate goals will motivate you to learn more about PECs. Figure 1: Strategic process to achieve the objectives of this module Reading Resources and Instructional Activities After setting your own personal goals and targets in achieving the objectives of this module, check your inherent knowledge of PECs. Answer the following guide questions with the help of your classmates. Task 3: Group Activity Directions: Answer the following guide questions on a separate sheet of paper. Share your answers with the class. 1. Explain the importance of assessing one’s PECs before engaging in a particular entrepreneurial activity. _________________________________________________________ _________________________________________________________ ________________________________________________________. Goals and Targets Learning Activities Ultimate Goal
  • 19. 5 2. Are there other strategies or approaches where you can assess your PECs? Explain how these strategies will become more useful in selecting a viable business venture. _________________________________________________________ _________________________________________________________ ________________________________________________________. 3. What are the desirable personal characteristics, attributes, lifestyles, skills, and traits of a prospective entrepreneur? Why are these important? _________________________________________________________ _________________________________________________________ ________________________________________________________. 4. Why is there a need to assess one’s PECs in terms of characteristics, attributes, lifestyles, skills, and traits before starting a particular business? _________________________________________________________ _________________________________________________________ ________________________________________________________. 5. What is the significance of evaluating PECs of a successful entrepreneur? What helpful insights can you draw from this activity? ________________________________________________________ ________________________________________________________ ________________________________________________________. How was your experience in answering the guide questions with your classmates? Were you able to benefit from them? What were the insights you have realized? This time you’re going to study the different topics that will enrich your knowledge of PECs. Read all the important details about the succeeding topic carefully.
  • 20. 6 Assessment of Personal Entrepreneurial Competencies (PECs) and Skills vis-à-vis a Practicing Entrepreneur in a Province Entrepreneurial competencies refer to the important characteristics that should be possessed by an individual in order to perform entrepreneurial functions effectively. In this module, you will learn some of the most important characteristics, attributes, lifestyle, skills and traits of a successful entrepreneur or an employee to be successful in a chosen career. Below are few important characteristics / traits / attributes of a good entrepreneur:  Hardworking: One of the important characteristics of a good entrepreneur is hardworking. This means working diligently and being consistent about it. Hardworking people keep improving their performance to produce good products and/or provide good services.  Confident: Entrepreneurs have self-reliance in one’s ability and judgment. They exhibit self-confidence to cope with the risks of operating their own business.  Disciplined: Successful entrepreneurs always stick to the plan and fight the temptation to do what is unimportant.  Committed: Good entrepreneurs assume full responsibility over their business. They give full commitment and solid dedication to make the business successful.  Ability to accept change: Nothing is permanent but change. Change occurs frequently. When you own a business, you should cope with and thrive on changes. Capitalize on positive changes to make your business grow.  Creative: An entrepreneur should be creative and innovative to stay in the business and in order to have an edge over the other competitors.
  • 21. 7  Has the initiative: An entrepreneur takes the initiative. You must put yourself in a position where you are responsible for the failure or success of your business.  Profit-oriented: An entrepreneur enters the world of business to generate profit or additional income. The business shall become your bread and butter. Therefore, you must see to it that the business can generate income. Listed below are the important skills of a successful entrepreneur:  Excellent planner: Planning involves strategic thinking and goal setting to achieve objectives by carefully maximizing all the available resources. A good entrepreneur develops and follows the steps in the plans diligently to realize goals. A good entrepreneur knows that planning is an effective skill only when combined with action.  Possesses people skills: This is a very important skill needed to be successful in any kind of business. People skills refer to effective and efficient communication and establishing good relationship to the people working in and out of your business. In day-to-day business transactions, you need to deal with people. A well-developed interpersonal skill can make a huge difference between success and failure of the business.  Sound decision maker: Successful entrepreneurs have the ability to think quickly and to make wise decisions towards a pre-determined set of objectives. No one can deny that the ability to make wise decisions is an important skill that an entrepreneur should possess. Sound decisions should be based on given facts and information and lead towards the pre-determined objectives. To firm up what you have learned and have a better appreciation of the different entrepreneurial competencies, read the PECs checklist below, then answer the same.
  • 22. 8 Task 4: PECs Checklist Directions: Using the PECs checklist, assess yourself by putting a check ( ) mark in either strengths or development areas column. Interpret the results by counting the total number of check marks in each of the columns. After accomplishing the checklist, form a group and share your insights on the result of the personal assessment. Table 1: PECs Checklist Personal Entrepreneurial Competencies (PECs) of an Entrepreneur Personal Assessment in terms of: Strengths Development Areas Hardworking - Works diligently Confident - Self-reliance in one’s ability Disciplined - Always stick to the plan Committed - Solid dedication Ability to accept changes - Adaptable Creative - Innovative to have edge over other competitors Profit-oriented - Always looking for an opportunity to have/earn income Excellent planner - Strategic thinking and setting of goals
  • 23. 9 Possess people skill - Effective and efficient communication skills and relates well to people Sound decision maker - Makes wise decisions towards the set objectives TOTAL Interpretation or Insight: ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ _________________________________________________. How was your experience in discovering the strengths and the areas you need to develop? Did you gain a valuable experience in exchanging insights with your classmates? To learn more and deepen your understanding of PECs, do task 5 below. Task 5: Interview Directions: In your province, interview a successful computer technician or entrepreneur whose type of business is related with computer hardware servicing. Focus your questions on PECs and other business-related attributes that helped them become successful. Analyze the results of the interview and reflect on the similarities and/or differences. Write your answer on a separate sheet of paper.
  • 24. 10 Sample Interview Guide Name of Proprietor/Practitioner: ____________________________________ Age: _______________ Number of Years in Business: _________________ Business Name: ________________________________________________ Business Address: ______________________________________________ 1. What preparations did you make before you engaged in this type of business or job? ________________________________________________________ ________________________________________________________ _______________________________________________________. 2. What special skills and characteristics do you have that are related with your business or job? ________________________________________________________ ________________________________________________________ _______________________________________________________. 3. How did you solve business-related problems during the early years of your business operation? ________________________________________________________ ________________________________________________________ _______________________________________________________. 4. Did you follow the tips from a successful businessman or practitioner before you engaged in your business? ________________________________________________________ ________________________________________________________ _______________________________________________________. 5. What best business practices can you share with aspiring entrepreneurs? ________________________________________________________ ________________________________________________________ _______________________________________________________. 6. What do you think are the salient characteristics, attributes, lifestyle, skills and traits that made you successful in your business or job? ________________________________________________________ ________________________________________________________ ______________________________________________________.
  • 25. 11 Directions: Copy the tables below in your notebook or in a separate sheet of paper. Gather the needed information from the interview to supply answer/s to row 1 in the table below, after which, fill out the second row with your PECs. Personal Entrepreneurial Competencies Characteristics Attributes Lifestyles Skills Traits Successful Entrepreneur in the province My PECs Using the information on the table above, analyze and reflect on the similarities and differences in your answers. Put your reflection on the table you copied in your notebook or in a separate sheet of paper. Write your conclusion on the space provided. Personal Entrepreneurial Competencies Similarities Differences Characteristics Attributes Lifestyles Skills Traits
  • 26. 12 Conclusion: ________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ _____________________________________________________________. After performing the activities on the importance of PECs, let’s determine how much you have learned. Perform task 6 to determine how well you have understood the lesson. Task 6: Preparation of a Plan of Action Directions: Use in a separate sheet of paper / in your notebook the information generated from task 5 (Interview) and prepare an action plan that indicates alignment of your PECs to the PECs of a successful entrepreneur in computer hardware servicing in your province. Objective Area Activities Strategies Time Frame Expected Outcome To align my PECs with the PECs of a successful entrepreneur in Computer Hardware Servicing Characteristics Skills Attribute Traits
  • 27. 13 Task 7: Essential Questions Directions: Read and study the following questions below. You may use a separate sheet of paper or your notebook to write your answers. 1. Why is there a need to compare and align one’s PECs with the PECs of a successful entrepreneur? ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ _______________________________________________________. 2. How does your action plan help sustain your strong PECs and/or address your development areas? ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ _______________________________________________________. 3. What plan of action will you utilize to address your development areas? ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ ________________________________________________________ _______________________________________________________.
  • 28. 14 Module 2 ENVIRONMENT AND MARKET (EM) Content Standards Performance Standards The learner demonstrates understanding of environment and market in Computer Hardware Servicing in one’s province. The learner independently creates a business vicinity map reflective of potential market in Computer Hardware Servicing in a province. Quarter I Time Allotment: 4 hours Aspiring entrepreneur need to explore the economic, cultural, and social conditions prevailing in an area. Needs and wants of the people in a certain area that are not met may be considered business opportunities. Identifying the needs of the community, its resources, available raw materials, skills, and appropriate technology can help a new entrepreneur seize business opportunities. To be successful in any kind of business venture, potential entrepreneurs should look closely at the environment and market. They should always be watchful of existing opportunities and constraints, and to take calculated risks. The opportunities in the business environment are factors that provide possibilities for a business to expand and make more profit. Constraints, on the other hand, are factors that limit business growth, hence reduce the chance of generating profit. One of the best ways to evaluate opportunities and constraints is to conduct a Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis. SWOT Analysis is a managerial tool used to assess the environment. It is used to gather important information which is then used in strategic planning. Strengths and weaknesses are internal in an organization. They relate to resources owned by an organization that you have control over and also the extent of its marketing.
  • 29. 15 Opportunities and threats exist in the external environment. Opportunities relate to the market, new technologies, and the external factors such as government policies, climate, and trends. Threats replace what the competitors are doing. It also includes legal and other constraints. Now that you have read some important considerations to explore to be successful in any business, you are now ready to explore more about the environment and market. To begin with, let’s find out the competencies that you will master as you finish this module. At the end of this module, you are expected to:  identify what is of “value” to the customer,  identify the customer to sell to,  explain what makes a product unique and competitive,  apply creativity and innovative techniques to develop marketable products, and  employ a unique selling proposition (USP) to a product and/or service. Now that you have an idea about the things you will learn, take the first challenge in this module – the pre-assessment. Task 1: Multiple Choice DIRECTIONS: Choose the letter of the best answer. Write your answer on a separate sheet of paper. 1. It is generated by examining the goods and services sold in the community. A. business creation C. business concept B. business pricing D. business idea 2. It is a process of making new products which will be sold to the customers. Objectives Pre-
  • 30. 16 A. product analysis C. product development B. product conceptualization D. product implementation 3. These are luxuries, advantages and desires that every individual considers beyond necessary. A. wants C. requirements B. desires D. needs 4. It is a factor or consideration presented by a seller as the reason that a product or service is different from and better than that of the competition. A. unique selling plan C. unique pricing policy B. unique selling proposition D. finding value-added 5. A stage in which the needs of the target market are identified, reviewed, and evaluated. A. concept development C. project development B. economic analysis D. refine specification 6. It is the introduction of new ideas to make the product and services more attractive and saleable to the target customers. A. new idea C. product development B. creativity D. innovation 7. It is a managerial tool used to assess the environment and to gather important information that can be used for strategic planning. A. scanning C. WOTS Analysis B. SWOT Analysis D. survey analysis 8. It is creating names, symbol, or designs that identifies and differentiates a product from the other products. A. product naming C. branding B. unique selling proposition D. tagline 9. It is a meaningful and unforgettable statement that captures the essence of the brand. A. product naming C. branding B. unique selling proposition D. tagline 10. These are things that people cannot live without. A. wants C. requirements B. desires D. needs
  • 31. 17 Task 2: Guide Questions: Directions: Read and study the guide questions below. Use a separate sheet of paper to write your answer. 1. How does one determine the product or services to be produced and/or to be provided to the target customers? ________________________________________________________ ________________________________________________________ ________________________________________________________ 2. How does one select an entrepreneurial activity? ________________________________________________________ ________________________________________________________ ________________________________________________________ 3. When can one say that a certain product has “value?” ________________________________________________________ ________________________________________________________ ________________________________________________________ 4. Does applying creativity to your product or services important? Why? ________________________________________________________ ________________________________________________________ ________________________________________________________ 5. How can one effectively respond to the needs of the target customer? ________________________________________________________ ________________________________________________________ ________________________________________________________ 6. From the viewpoint of business owner, discuss the importance of scanning the environment and market in generating business ideas. ________________________________________________________ ________________________________________________________ ________________________________________________________
  • 32. 18 7. Using self-assessment, explain the level of your confidence in formulating a business idea. ________________________________________________________ ________________________________________________________ ________________________________________________________ After all the guide questions are answered and skills have been mastered, share insights/ideas with your classmates. Discuss your insights, personal knowledge, and relevant experiences on the topic to make it more exciting and engaging. Learning Goals and Target After reading and understanding the objectives of this module and having gone through the pre-assessment and guide questions, you will be asked to set your own personal goals. These goals will urge you to further achieve the ultimate objective of this module. In the end, these goals will motivate you to learn more about environment and market. Figure 2: Strategic process to reach the objectives of this module Goals and Targets Learning Activities Ultimate Goal
  • 33. 19 After setting your own personal goals and targets in achieving the objectives of this module, you will have the opportunity to read and learn more about environment and market. You will also be given a chance to do practical exercises and activities to deepen your understanding of the topic. Product Development When we talk of product development, we are referring to a process of making a new product to be sold by a business or enterprise to its customers. Product development may involve modification of an existing product or its presentation, or formulation of an entirely new product that satisfies a newly-defined customer’s needs, wants and/or a market place. The term development in this module refers collectively to the entire process of identifying a market opportunity, creating a product to appeal to the identified market, and testing, modifying, and refining the product until it becomes ready for production. There are basic, yet vital questions that you can ask yourself about product development. When you find acceptable answers to them, you may now say that you are ready to develop a product and/or render services. These questions include the following: 1. For whom are the product/services aimed at? 2. What benefit will the customers expect from product/service? 3. How will the product/service differ from the existing brand? From its competitor? In addition, needs and wants of the people within an area should also be taken into big consideration. Everyone has his/her own needs and wants. However, each person has different concepts of needs and wants. Needs in business are the important things that an individual cannot live without in a society. These include: 1. basic commodities for consumption, 2. clothing and other personal belongings, 3. shelter, sanitation and health, and 4. education.
  • 34. 20 Basic needs are essential to an individual to live with dignity and pride in a community. These needs can obviously help you generate business ideas and subsequently to product development. Wants are desires, luxury and extravagance that signify wealth and expensive way of living. Wants or desires are considered above all the basic necessities of life. Some examples of wants or desires are: fashion accessories, expensive shoes and clothes, travels, eating in an expensive restaurant, watching movies, concerts, having luxurious cars, wearing expensive jewelry and perfume, living in impressive homes, among others. Needs and wants of people are the basic indicators of the kind of business that you may engage in because it can serve as the measure of your success. Some other points that might be considered in business undertakings are the kind of people, their needs, wants, lifestyle, culture and tradition, and their social orientation. To summarize, product development entirely depends on the needs and wants of the customers. Another important issue to deal with is the key concepts of developing a product. The succeeding topic shall enlighten you about the procedure in coming up with a product. Concepts of Developing a Product Concept development is a critical phase in the development of a product. In this stage, the needs of the target market are identified, and competitive products are reviewed before the product specifications are defined. The product concept is selected along with an economic analysis to come up with an outline of how a product is being developed. Figure 3 shows the stages of concept development of a product.
  • 35. 21 Figure 3: Stages of Concept Development The process of product development follows the following stages: 1. Identify customer needs: Using survey forms, interviews, researches, focus group discussions, and observations, an entrepreneur can easily identify customers’ needs and wants. In this stage, the information that can be possibly gathered are product specifications (performance, taste, size, color, shape, life span of the product, etc.). This stage is very important because it would determine the product to be produced or provided. 2. Establish target specifications: Based on customers' needs and reviews of competitive products, you can now establish target specifications of the prospective new product and/or services. A target specification is essentially a wish-list. 3. Analyze competitive products: It is imperative to analyze existing competitive products to provide important information in establishing product or service specifications. Other products may exhibit successful design attributes that should be emulated or improved upon in the new product or service. 4. Generate product concepts: After having gone through with the previous processes, you may now develop a number of product Concept Development Identify Customer Needs Plan Remaining Development Project Establish Target Specifications Generate Product Concepts Select a Product Concept Analyze Competitive Products Refine Specifications Perform Economic Analysis
  • 36. 22 concepts to illustrate the types of products or services that are technically feasible and will best meet the requirements of the target specifications. 5. Select a product concept: Through the process of evaluation between attributes, a final concept is selected. After the final selection, additional market research can be applied to obtain feedback from certain key customers. 6. Refine product specifications: In this stage, product or services specifications are refined on the basis of input from the foregoing activities. Final specifications are the result of extensive study, expected service life, projected selling price among others are being considered in this stage. 7. Perform economic analysis: Throughout the process of product development, it is very important to always review and estimate the economic implications regarding development expenses, manufacturing costs, and selling price of the product or services to be offered or provided. 8. Plan the remaining development project: In this final stage of concept development, you can prepare a detailed development plan which includes list of activities, necessary resources and expenses, and development schedule with milestones for tracking progress. Finding Value People buy for a reason. There should be something in your product or service that would give consumers a good reason to go back and buy more. There must be something that will make you the best option for target customers; otherwise, they have no reason to buy what you are selling. This implies further, that you offer something to your customers that will make them value your product or service. The value you incorporate in your product is called value proposition. Value proposition is a believable collection of the most persuasive reasons why people should notice you and take the action you’re asking for. It is what gets people moving, what makes people spend for your product or service.
  • 37. 23 Innovation Innovation is the introduction of something new in your product or service. This may be a new idea, a new method, or a new device. If you want to increase your sales and profit, you must innovate. Some of the possible innovations for your products are change of packaging, improvement of taste, color, size, shape, and perhaps price. Some of the possible innovations in providing services are application of new and improved methods, additional featured services, and possibly freebies. Unique Selling Proposition (USP) Unique Selling Proposition is the factor or consideration presented by a seller as the reason that one product or service is different from and better than that of the competition. Before you can begin to sell your product or service to your target customers, you have to sell yourself in it. This is especially important when your product or service is similar to your competitors. USP requires careful analysis of other businesses' ads and marketing messages. If you analyze what they say or what they sell, not just their product or service characteristics, you can learn a great deal about how companies distinguish themselves from competitors. Here's how to discover your USP and how to use it to increase your sales and profit:  Use empathy: Put yourself in the shoes of your customers. Always focus on the needs of the target customers and forget falling in love with your own product or service. Always remember, you are making/providing this product not for yourself but for the target customers to eventually increase sales and earn profit. Essential question such as what could make them come back and ignore competition, should be asked to oneself. Most possible answers may be focused on quality, availability, convenience, cleanliness, and reliability of the product or service.  Identify customer’s desires. It is very important for you to understand and find out what drives and motivates your customers to buy your product or service. Make some effort to find out, analyze and utilize the information that motivates the customers in their decision to purchase the product or service.
  • 38. 24  Discover customer’s genuine reasons for buying the product. Information is very important in decision making. A competitive entrepreneur always improve their products or services to provide satisfaction and of course retention of customers. As your business grows, you should always consider the process of asking your customers important information and questions that you can use to improve your product or service. To enhance your understanding of the topic previously presented, you will be tasked to form a group and arrange an interview with a successful entrepreneur or practitioner. You have to document this interview and present this to the whole class for reflection and appreciation. Task 3: Interview Directions: Select a successful entrepreneur or practitioner. Conduct an interview using the set of questions below. Document the interview and present it to the class. Use a separate sheet of paper. 1. How did you identify your customers? ________________________________________________________ ________________________________________________________ ________________________________________________________ 2. What were your considerations in selecting your customers? ________________________________________________________ ________________________________________________________ ________________________________________________________ 3. Explain how your product or service became unique to other products. ________________________________________________________ ________________________________________________________ ________________________________________________________ 4. Did you consult somebody before you engaged in this business? Cite / give sample insights that you gained from the consultation. ________________________________________________________ ________________________________________________________ ________________________________________________________
  • 39. 25 5. What were your preparations before you started the actual business? ________________________________________________________ ________________________________________________________ ________________________________________________________ 6. What creative and innovative techniques did you adapt in the development of your product or service? What was the effect of the innovative techniques to the sales and profits of your business? ________________________________________________________ ________________________________________________________ ________________________________________________________ 7. What strategy did you consider to create a unique selling proposition to your product or service? ________________________________________________________ ________________________________________________________ ________________________________________________________ Task 4: Browsing the Internet Directions: To deepen your understanding of the lesson, perform the following tasks: 1. Browse the internet and view the topics related to: a. customers’ needs and wants b. techniques in identifying customers’ needs and wants c. creativity or innovations in products and services d. unique selling proposition e. product development 2. Prepare a short narrative report about these topics and discuss it to the class. You can highlight the aspect that intensifies your knowledge of product development.
  • 40. 26 Task 5: Product Conceptualization Directions: In a separate sheet of paper or in your notebook. Develop your own concept of your product or service by using the figures on this page. Use bullets in every stage of product conceptualization in listing important key ideas. 1. Identify Customers Need - - - 2. Target Specifications - - - - - - - - 3. Analyze a Competitive Product - - - - - - - 4. Generate Product Concept - - - - 5. Select A product Concept - - - - - - 6. Refine Product Specification - - - - - 7. Prepare a Development Plan - - - - - - - -
  • 41. 27 Generating Ideas for Business The process of developing and generating a business idea is not a simple process. Some people come up with a bunch of business ideas that are not really feasible. There are two problems that arise; first is the excessive generation of ideas that can forever remain as a dreaming stage and the second is when they don’t have ideas and don’t want to become entrepreneurs. The most optimal way is to have a systematic approach in generating and selecting a business idea that can be transformed into a real business. Here are some basic yet very important considerations that can be used to generate possible ideas for business: 1. Examine existing goods and services. Are you satisfied with the product? What do other people who use the product say about it? How can it be improved? There are many ways of improving a product from the way it is made to the way it is packed and sold. You can also improve the materials used in crafting the product. In addition, you can introduce new ways of using the product, making it more useful and adaptable to the customers’ many needs. When you are improving the product or enhancing it, you are doing an innovation. You can also do an invention by introducing an entirely new product to replace the old one. Business ideas may also be generated by examining what goods and services are sold outside the community. Very often, these products are sold in a form that can still be enhanced or improved. 2. Examine the present and future needs. Look and listen to what the customers, institutions, and communities are missing in terms of goods and services. Sometimes, these needs are already obvious and identified right away. Other needs are not that obvious because they can only be identified later on, in the event of certain development in the community. For example, a province will have its electrification facility in the next six months. Only by that time will the entrepreneur could think of electrically-
  • 42. 28 powered or generated business such as photo copying, computer service, digital printing, etc. 3. Examine how the needs are being satisfied. Needs for the products and services are referred to as market demand. To satisfy these needs is to supply the products and services that meet the demands of the market. The term market refers to whoever will use or buy the products or services, and these may be people or institutions such as other businesses, establishments, organizations, or government agencies. There is a very good business opportunity when there is absolutely no supply to a pressing market demand. Businesses or industries in the locality also have needs for goods and services. Their needs for raw materials, maintenance, and other services such as selling and distribution are good sources of ideas for business. 4. Examine the available resources. Observe what materials or skills are available in abundance in your area. A business can be started out of available raw materials by selling them in raw form and by processing and manufacturing them into finished products. For example, in a copra- producing town, there will be many coconut husks and shells available as “waste” products. These can be collected and made into coco rags or doormats and charcoal bricks and sold profitably outside the community. A group of people in your neighborhood may have some special skills that can be harnessed for business. For example, women in the Mountain Province possess loom weaving skills that have been passed on from one generation to another. Some communities set up weaving businesses to produce blankets, decorative, and various souvenir items for sale to tourists and lowlanders. Business ideas can come from your own skills. The work and experience you may have in agricultural arts, industrial arts, home economics, or ICT classes will provide you with business opportunities to acquire the needed skills which will earn you extra income should you decide to engage in income-generating activities. With your skills, you may also tinker around with various things in your spare time. Many products are invented this way.
  • 43. 29 5. Read magazines, news articles, and other publications on new products and techniques or advances in technology. You can pick up new business ideas from magazines such as Newsweek, Reader’s Digest, Business Magazines, “Go Negosyo”, Know About Business (KAB) materials, and Small-Industry Journal. The Internet also serves as a library where you may browse and surf on possible businesses. It will also guide you on how to put the right product in the right place, at the right price, and at the right time. Key Concepts of Selecting a Business Idea Once you have identified business opportunities, you will eventually see that there are many possibilities available for you. It is very unlikely that you will have enough resources to pursue all of them at once. You have to select the most promising one among hundreds of ideas. It will be good to do this in stages. In the first stage, you screen your ideas to narrow them down to about few choices. In the next stage, trim down the choices to two options. In the final stage, choose between the two and decide which business idea is worth pursuing. In screening your ideas, examine each one in terms of the following guide questions: 1. How much capital is needed to put up the business? 2. Where should the business be located? 3. How big is the demand for the product? Do many people need this product and will continue to need it for a long time? 4. How is the demand met? Who are processing the products to meet the needs (competition or demand)? How much of the need is now being met (supply)? 5. Do you have the background and experiences needed to run this particular business? 6. Will the business be legal and not against any existing or foreseeable government regulation? 7. Is the business in line with your interest and expertise? Your answers to these questions will be helpful in screening which ones among your many ideas are worth examining further and worth pursuing.
  • 44. 30 Branding Branding is a marketing practice of creating a name, a symbol or design that identifies and differentiates product or services from the rest. It is also a promise to your customers. It tells them what they can expect from your product or service and it differentiates your offerings from other competitors. Your brand is derived from who you are, who you want to be and what people perceive you to be. Branding is one of the most important aspects in any business. An effective brand strategy gives you a major edge in increasingly competitive markets. A good product can: - deliver message clearly, - confirm credibility, - connect to target prospect, - motivate buyers, and - concretize user loyalty. Here are simple tips to publicize your brand:  Develop a tagline. Write a statement that is meaningful, impressive, and easy to remember to capture the essence of your brand.  Design a logo. Create a logo symbolic of your business and consistent with your tagline and displace it strategically.  Write a brand message. Select a key message to communicate about your brand.  Sustain a brand quality. Deliver a promise of quality through your brand.  Practice consistency. Be reliable and consistent to what your brand means in your business.
  • 45. 31 In generating a business idea, you should first identify the type of business suited to your business idea. You should analyze and scan the potential environment, study the marketing practices and strategies of your competitors, analyze strengths, weaknesses, opportunities, and threats in your environment to ensure that the products or services you are planning to offer will be patronized and within easy reach of target consumers. How to conduct SWOT Analysis:  Be realistic about the strengths and weaknesses of your business when conducting SWOT Analysis.  SWOT Analysis should distinguish between where your business is today, and where it can be in the future.  SWOT Analysis should always be specific. Avoid any gray areas.  Always apply SWOT Analysis in relation to your competition, i.e. better than or worse than your competition.  Keep your SWOT Analysis short and simple. Avoid complexity and over analysis.  SWOT Analysis is subjective.
  • 46. 32 Task 6: SWOT Analysis Directions: In a separate sheet of paper or in your notebook list down all your observations for your business idea. Categorize your observations according to strengths, weakness, opportunities and treats. After carefully listing them down, use the stated strategies to come up with a sound analysis, activities and best business idea. Strategies:  SW - Maximize on the Strengths to overcome the internal Weakness.  OW - Capitalize on the Opportunities to eliminate the internal Weakness.  ST - Maximize on your Strengths to eliminate the external Threats.  OT - Take advantage of the available Opportunities to eliminate the external Threats. Analysis: __________________________________________________________________________________ __________________________________________________________________________________ Strength (S) Weaknesses (W) - - - - - - - - - - - - Opportunities (O) Threats (T) - - - - - - - - - - - -
  • 47. 33 __________________________________________________________________________________ __________________________________________________________________________________ Activities: __________________________________________________________________________________ __________________________________________________________________________________ __________________________________________________________________________________ __________________________________________________________________________________ My Best Business Idea: __________________________________________________________________________________ __________________________________________________________________________________ __________________________________________________________________________________ __________________________________________________________________________________ To deepen your understanding of the topics previously discussed, you will be asked to perform the following activities: Task 7: Extra Reading and Video Viewing Reading books and watching videos have been considered as some of the most effective educational activities that can help learners broaden their understanding on a certain topic. In this particular task, you will be asked to conduct extra reading and video viewing on the Internet with the following topics: A. Steps in selecting a business idea B. Criteria of a viable business idea C. Benefits of a good brand D. Ways on developing a brand After successfully performing the assigned task, make a narrative report about it and share it with the class.
  • 48. 34 Task 8: Designing a Logo Directions: In a separate sheet of paper or in your notebook draw a logo that you will use in your business. Provide a simple statement to describe your logo. Tagline Logo
  • 49. 35 Task 9: Making My Own Vicinity Map Directions: In a separate sheet of paper or in your notebook draw a vicinity map reflective of potential market in Computer Hardware Servicing in your province. Provide a simple statement to describe your map. Vicinity Map
  • 50. 36 MODULE 3: CONFIGURING COMPUTER SYSTEMS AND NETWORKS Content Standard Performance Standard The learner demonstrates understanding of the underlying concepts and principles on configuring computer systems and networks. The learner independently demonstrates skills in configuring computer systems and networks as prescribed by TESDA Training Regulations. Number of Sessions (Time Allotment): 72 Hours (2 Quarters) Welcome to the next level of your modular training in Computer Hardware Servicing (CHS) under the Information and Communications Technology (ICT) Course. In this module, you will have a great deal of understanding of Configuring Computer Systems and Networks. At the end of this module you will be able to apply the knowledge and skills on planning and preparing for configuration, configure computer systems and networks and inspecting configured computer systems and networks. Those skills are essential for you to pass the National Certification II in Computer Hardware Servicing. In this module, topics will be introduced progressively for easy understanding. After carefully answering the pre assessment exercises, reading all the lessons, answering all the guide questions, skilfully performing all the activities, showing evidences of learning and finally answering the summative test you will gain a considerable knowledge and skills in configuring computer systems and networks essential to be successful in computer hardware servicing as one of the career option in ICT. Reminder! Just follow the instructions given in this module. Now let us start exploring new things in this module.
  • 51. 37 There are three learning objectives (LO) in this module: (1) plan and prepare for configuration; (2) configure computer systems and networks; and (3) inspect and test configured computer systems and networks. These three learning objectives (LO) contain sub-topics that discuss the details on configuring computer systems and networks. This module has four essential parts, namely: what to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND and finally, what to TRANSFER. The competencies for this module are the following: LO 1. Plan and Prepare for Configuration of Computer Systems and Networks  Follow Occupational Health and Safety (OHS) procedures in planning and preparing for configuration of computer systems and networks;  Prepare computer systems tools, devices, equipment and materials;  Check computer systems and networks configuration against specified requirements; and  Identify the procedures in using the tools and equipment. LO 2. Configure Computer Systems and Networks  Follow OHS procedures in configuring computer systems and networks;  Inspect networking devices, media and connectors;  Create cross-over and straight-through cables;  Assign IP address to clients and servers;  Configure the assigned IP address to clients and servers;  Enable network security to the computer systems; and  Configure file and printer sharing. LO 3. Inspect and Test Configured Computer Systems and Networks  Follow OHS procedures in testing systems and networks;  Test computer systems and networks in accordance with the job requirements; and  Accomplish technical reports on the tests conducted.
  • 52. 38 Before you proceed to the core of this module, challenge yourself first and dig deep into your mind in order to answer the pre assessment exercises prepared for you. Take time to answer it! A. Paper and Pencil Test General Directions: Read the items very carefully. Write your answer in a clean sheet of paper. Test I. True or False Directions: Write TRUE if the statement is correct and FALSE if otherwise. _______1. A safe workplace is clean, organized and well-lit. _______2. One must unplug the power from the source before opening a case and performing services. _______3. It is a best practice that a fire extinguisher and first aid kit be available in the workplace. _______4. You are allowed to open the power supply or a monitor. _______5. You can bring food and drinks inside the laboratory. _______6.The key to a well-tuned computer system is the proper configuration. _______7. Boot log stores all information from the boot process. _______8. Registry is a collection of database of configuration of database of configuration in Windows Operating System. _______9. The shortcut of Microsoft Configuration is Ipconfig. _______10. Configuration is the way a system is set up. In order to master the listed competencies, you must gain knowledge of the topics under what to KNOW, perform activities required under what to PROCESS, accomplish additional tasks under what to REFLECT and UNDERSTAND and finally show some evidences of your learning by transferring what you have learned to a different context under what to TRANSFER. Pre Assessment
  • 53. 39 Test II. Multiple Choice Directions: Write the letter of the correct answer in a clean sheet of paper. 1. What boot configuration utility allows setting the programs that will run at startup? a. Ipconfig c. msconfig b. regedit d. dxdiag 2. What application allows you to edit the registry? a. Ipconfig c. msconfig b. regedit d. dxdiag 3. Which of the following enables you to test sound and graphics output? a. Ipconfig c. msconfig b. regedit d. dxdiag 4. Which of the following is an applet that controls the look of windows? a. Appearance and Themes c. Performance and Maintenance b. Network and Internet d. Sounds, Speech and Audio 5. Which of the following applets does not belong to performance and maintenance category? a. Administrative tool c. Power Options b. Automatic Updates d. System 6. Which of the following is a wizard used to configure MS Windows for vision, hearing and mobility needs? a. Accessibility Option c. Sounds, speech and audio b. Security Center d. User Accounts 7. Which of the following tab in direct X Diagnostic tool displays your current audio settings? a. Input c. Sound b. Music d. System 8. Which of the following networking cable category is the most commonly used? a. Cat3 c. Cat 5 and 5e b. Cat 5 d. Cat 6 9. What copper-cored cable is surrounded by a heavy shielding? a. coaxial cable c. optical fiber b. fiber optics d. twisted pair 10.What Ethernet cable is used to connect two devices directly? a. cross- over c. both A and B b. straight-through d. none of the options 11.Which of the following is a number used to identify a device on a network?
  • 54. 40 a. Default gateway c. IP address b. DNS Server d. Subnet mask 12.In which of the following IP address classes does 192.168.1.105 belong to? a. Class A c. Class C e. Class E b. Class B d. Class D 13.What command is used to test the ability of the source computer to reach a specified destination computer? a. Ipconfig c. Ping b. Msconfig d. Regedit 14.What do you call an approach to computer networking where all computers show equivalent responsibility for processing data? a. Client server c. Peer to client b. Peer to peer d. None of the options 15.Which of the following is an example of a Class A subnet mask? a. 255.0.0.0 c. 255.255.255.0 b. 255.255.0.0 d. 255.255.255.255 Test III. Matching Type Directions: Match Column A with Column B. Write the letter of your answer in a separate paper. A B 1. Copper cabling used for telephone communication 2. Standard Ethernet cable 3. Cable that has a very thin core 4. Cable that has a thicker core 5. Tool used for crimping RJ45 6. Connector for Cat 5e cable 7. Set of rules 8. Indicates the network portion of an IP address 9. Command used find out the IP address 10.Glass or plastic conductor a. Crimping tool b. Cross-over c. Fiber-optic d. Ipconfig e. Multi-mode f. Ping g. Protocol h. RJ45 i. Single-mode j. Straight-through k. Subnet mask l. Twisted pair
  • 55. 41 Test IV. ACRONYMS Directions: Give the complete meaning of the following acronyms. Write your answer in a separate sheet of paper. 1. UTP 2. STP 3. IP 4. TCP /IP 5. HTTP 6. FTP 7. SSH 8. IMAP 9. SMTP 10.DHCP 11.DNS 12.TTL 13.LAN 14.VPN 15.NIC B. Skills Checklist Configuration Skills Directions: Below is a matrix containing the most important skills that one must have to configure computer systems and networks successfully. Check (∕) the appropriate column which describes the level of your confidence in performing the given tasks. Competencies I can do it confidently 3 I can do it confidently but with assistance 2 I am not confident 1 1. I can use the different tools for configuration. 2. I can inspect networking devices and connectors. 3. I can create a cross-over and straight-through Ethernet cable. 4. I can test the functionality of an Ethernet cable. 5. I can assign and
  • 56. 42 configure IP address. 6. I can execute the IPconfig command properly. 7. I can manage to create a peer-to-peer networking. 8. I can configure Network Interface Card using DHCP. 9. I can enable a firewall. 10.I can configure file and printer sharing. TOTAL GRAND TOTAL Add all the scores to get the grand total and then divide it by the total number of items. Refer to the verbal interpretation on the table below to determine your initial competency on configuration of computer systems and networks. Numerical and Verbal interpretation Numerical Value Verbal Interpretation 2.51 – 3.00 Confident 1.76- 2.50 Confident but needs assistance 1.00 – 1.75 Not yet Confident Don’t feel bad if you got a “not yet confident” in all of the competencies. Bear in mind that this is just a pre assessment of the knowledge and skills on the lessons to be presented. Also, it will guide and inspire you to study harder as you go along with the lessons.
  • 57. 43 Lesson 1. Plan and Prepare for Configuration This lesson is intended to develop your skills in planning and preparing for configuration of computer system and networks. At the end of this lesson you are expected to:  Familiarize, follow and apply OHS in configuring computer systems and networks;  Prepare materials and tools for configuration;  Check and adhere to the standard operating procedures and requirements in computer system and network configuration; and  Identify the procedures in using the tools for configuration. Safety Procedures It is essential to maintain safe working conditions to prevent accidents and injury to any person or damage to any object in a work area. New staff and visitors must be informed of the appropriate safety procedures. Any transgression of the procedures must be reported. As an aspiring computer technician, you should be aware of all possible dangers in the workplace. It is a must to follow proper procedures for handling computer equipment. Failure to follow the prescribed safety procedures could result in fines, criminal convictions, and damage to equipment, claims for damage from the owner of the property and data, injury, or death. The following topics familiarize you with the tasks involved in planning and preparing for configuration of computer systems and networks. All you need to do is to carefully read all the topics and apply the skills you have gained through the distinct activities provided in this module. Good luck and have fun while learning!
  • 58. 44 A safe work space is clean, organized, and well-lit. The disposal or recycling of hazardous computer components must be done properly. Make sure to follow regulations that govern how to dispose specific items. When an organization violates these regulations, there can be legal consequences. To keep you safe, this module provides the general and fire safety guidelines that protects the technician and the equipment. General Safety Guidelines Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury. Here are some general safety guidelines:  Remove your watch or any other jewelry and secure loose clothing.  Turn off the power and unplug equipment before opening the case and performing service.  Cover any sharp edges inside the computer case with tape.  Never open a power supply or a monitor.  Do not touch areas in printers that are hot or those which use high voltage.  Know where the fire extinguisher is located and learn how to use it.  Know where the first aid kit is located.  Keep food and drinks out of your workspace.  Keep your workspace clean and free of clutter.  Lift heavy objects with sturdy leg support to avoid back injury. Fire Safety Guidelines Follow fire safety guidelines to protect equipment and lives. Turn off and unplug the computer before beginning a repair to avoid damage to the computer or electric shock to the technician. Fire can spread rapidly and be very costly. Proper use of a fire extinguisher can prevent a small fire from getting out of control. When working with computer components, always consider the possibility of an accidental fire and prepare how to react. If there is a fire, you should follow these safety procedures:  Always have a planned fire escape route before beginning any work.  Never fight a fire that is out of control or not contained.  Get out of the building quickly in case of an out-of-control fire.  Contact emergency services immediately for help.
  • 59. 45 Peer-to-Peer Activity General Directions: Get a partner to perform the next activity. Identify whether each statement is true or false. Gather picture evidences that make it true or false. On the third column, show the effects of not following the safety precautions through a picture presentation. Example: Turn off the power and unplug equipment before opening the case and performing service. Answer Picture Presentation True Evidence Effect TRUE OR FALSE EVIDENCE Effect 1. A safe workplace is clean, organized and well-lit. 2. Before opening the case and performing services, one must unplug the power from the source. 3. It is a best practice that a fire extinguisher and first aid kit be available in the workplace. 4. You are allowed to open the power supply or a monitor. 5. You can eat inside the laboratory.
  • 60. 46 Research and Investigate Directions: Form a group of five members and research on the different safety precautions used in computer laboratory. Interview/Observe a practitioner while lending a quality service in computer hardware servicing. Use a video camera to record the event stressing the safety guidelines and procedures in the laboratory. You will be rated according to the following rubrics: Video Documentation of Computer Laboratory Safety Precautions Criteria Poor (70-75) Good (76-85) Excellent (86- 100) Content/Information (50%)  Technically sound information  Coherence of information The provided information was not necessary or not sufficient to the computer laboratory safety precautions. The provided information was, for the most part, necessary and sufficient to the computer laboratory safety precautions. The provided information was necessary and sufficient to the computer laboratory safety precautions. Quality of Video (30%)  Clarity and cohesiveness of the video  Organization and coherence of ideas It lacks clarity and/or does not present ideas in a coherent way. Most part is well organized, clear and presents ideas in a coherent way. The video was well organized, clear and presents ideas in a coherent way. Interview on practitioner (20%)  Congruency of questions to the topic  Clarity of questions Questions were not congruent with the topic and were not delivered clearly. Most of the questions were congruent with the topic and delivered clearly. All of the questions were congruent with the topic and delivered clearly.
  • 61. 47 Application of Safety Procedures While Accomplishing a Task Directions: After the interview and observation with a practitioner, your group will showcase what you have learned through a role playing. You will be rated based on the Rubrics written below: Rubrics for Role Playing Criteria Excellent 4 Good 3 Fair 2 Weak 1 Content (40%) -Conveys full understanding of the content Enthusiasm (10%) -Facial expression and body language generates strong enthusiasm Interest and Purpose (10%) -Displays interesting purpose Speak Clearly (10%) -Group members speaks clearly at all times Volume (10%) -Loud volume Preparedness (10%) -Group is prepared with props and costumes Cooperation (10%) -displays teamwork
  • 62. 48 Prepare Materials and Tools Used for Configuration A key to a well-tuned, trouble-free system is proper configuration. In order to accomplish this, you must start by understanding its configuration. It can be difficult to figure out all the devices in your system and the resources they are using. To assist in this, several software tools have been created. These are typically called diagnostic utilities or programs. Some of them are built-in to your operating system and others are available either for free download or commercial purchase. Some of the built-in tools used in Microsoft system configuration involves Microsoft System Configuration, Register Edit, Direct X and Control Panel Applets. 1. Microsoft System Configuration: This boot configuration utility allows you to set the programs that will run at startup and to edit configuration files. It also offers simplified control over Windows Services. System Configuration Utility consists of five functional tabs such as General, Boot, Services, StartUp and Tools. The succeeding table describes the use and functionality of each tab: Table 1. General Tab of System Config Utility Tab Function and Description General The general tab is the default tab in the System configuration and shows how the computer will start, by default Normal startup should be selected. List of choices for startup configuration:  Normal Startup. Starts Windows in the usual manner. Use this mode to start Windows after you are done using the other two modes to troubleshoot the problem.  Diagnostic Startup. Starts Windows with basic services and drivers only. This mode can help rule out basic Windows files as the problem.  Selective Settings. Starts Windows with basic services and drivers and the other services and startup programs that you select.
  • 63. 49 Figure 4. General Tab Table 2. Boot Tab of System Config Utility Tab Function and Description Boot This tab allows you to make the same adjustments you can make in the Windows boot.ini file without having to edit the file. It shows configuration options for the operating system and advanced debugging settings, including the following:  Safe boot (Minimal): Boots the Windows graphics user interface in safe mode running only critical system services. Networking is disabled.  Safe Boot (Alternate Shell): Boots the Windows Command Prompt in safe mode running only critical system services. Networking and the graphical user interface are disabled.  Safe Boot (Active Directory Repair): Boots the Windows graphical user interface in safe mode running critical system services and Active Directory.  Safe boot (Network): Boots the Windows graphical user interface in safe mode running only critical system services. Networking is enabled.  No GUI boot. Does not display Windows splash screen when booting.
  • 64. 50  Boot Log. Stores all information from the boot process in the file %SystemRoot% Ntbtlog.txt.  Base Video. Boots to the Windows graphical user interface in minimal VGA mode. This loads standard VGA drivers instead of display drivers specific to the video hardware on the computer.  OS boot information. Shows driver names as drivers are being loaded during the boot process.  Make all boot settings permanent. Does not track changes made in System Configuration. Options can be changed later using System Configuration, but must be changed manually. When this option is selected, you cannot roll back your changes by selecting Normal startup on the General tab. Figure 5. Boot Tab Table 3. Services Tab of System Config Utility Tab Function and Description Services The Services tab allows you to enable or disable any of the Microsoft Windows services or other program services running on the computer. It lists all the services that start when the computer boots, along with their status (Running or Stopped). By checking the "Hide all Microsoft services" box at the bottom of the window, you can see all non-Windows
  • 65. 51 services such as driver services and program services that are often the cause of startup problems. Unchecking a box will disable the service from starting. Warning: Disabling services that normally run at boot time might cause some programs to malfunction or result in system instability. Do not disable services in this list unless you know they are not essential to your computer’s operation. Selecting Disable all will not disable some secure Microsoft services required for the operating system to start. Figure 6. Services Tab Table 4. Start Up Tab of System Config Utility Tab Function and Description Startup The Startup tab is one of the most frequent reasons most Windows users enter the System Configuration utility. In the Startup tab, you will be able to see the list of applications that run when the computer boots, along with the name of their publisher, the path to the executable file, and the location of the registry key or shortcut that causes the application to run. These startup programs are often one of the biggest causes for a computer to startup and run slow. You can clear the check box for a startup item to disable it on your next boot. If you have chosen Selective startup on the General Tab, you must either choose Normal startup on the
  • 66. 52 General tab or select the startup item’s check box to start it again at boot time. If you suspect an application has been compromised, examine the Command column to review the path to the executable file. Windows 8 Microsoft has removed this Startup feature in the System Configuration utility and moved it into the Windows 8 Task Manager. Uncheck any program that you want to disable from starting up each time. Note: Disabling applications that normally run at boot time might result in related applications starting more slowly or not running as expected. Figure 7. Startup Tab Table 5. Tools Tab of System Config Utility Tab Function and Description Tools This Provides a convenient list of diagnostic tools and other advanced tools that you can run.
  • 67. 53 Figure 8. Tools Tab 2. Register edit: This application allows you to edit the registry. The Windows Registry, usually referred to as "the registry," is a collection of databases of configuration settings in Microsoft Windows operating systems. In Windows 2000 and Windows XP, the Registry is stored in several Hives, located in the following path: windowssystem32config and Documents and Settings {username} folders. Structure of the Registry 1. The Registry has a hierarchical structure, like the directories on your hard disk. Each branch (denoted by a folder icon in the Registry Editor, see below) is called a key. Each key can contain other keys, as well as Values. Each value contains the actual information stored in the Registry. There are three types of values: String, Binary, and DWORD - the use of these depends upon the context. 2. There are six main branches (five in Windows 2000 and Windows XP), each containing a specific portion of the information stored in the Registry. They are as follows: o HKEY_CLASSES_ROOT - this branch contains all of your file types as well as OLE information for all your OLE-aware applications.
  • 68. 54 o HKEY_CURRENT_USER - this branch points to the part of HKEY_USERS appropriate for the current user. o HKEY_LOCAL_MACHINE - this branch contains information about all of the hardware and software installed in your computer. Since you can specify multiple hardware configurations, the current hardware configuration is specified in HKEY_CURRENT_CONFIG. o HKEY_USERS - this branch contains certain preferences (such as colors and control panel settings) for each of the users of the computer. In Windows 95/98/Me, the default branch here contains the currently-logged in user. In Windows 2000/XP, the default branch here contains a template to be used for newly- added users. o HKEY_CURRENT_CONFIG - this branch points to the part of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration. o HKEY_DYN_DATA (Windows 95/98/Me only) - this branch points to the part of HKEY_LOCAL_MACHINE, for use with Windows' Plug-&-Play subsystem. 3. Direct X Diagnostic: The Microsoft DirectX Diagnostic Tool provides you with information about the DirectX API components and drivers on your system. It enables you to test sound and graphics output and Microsoft DirectPlay service providers. You can use the diagnostic tool to gather information about your system to use for diagnostic purposes. If you are experiencing problems when running Microsoft DirectX applications, the DirectX Diagnostic Tool can help you find the source of the trouble such as incorrect versions of DirectX components, lack of hardware acceleration, devices that are not connected and unsigned drivers.
  • 69. 55 Figure 9. DX Diagnostic Tool 4. Control Panel applets The names of various applets in the Control Panel differ slightly depending on the version of Windows installed. In Windows XP, the icons are grouped into categories:  Appearance and Themes: Applets that control the look of windows:  Display  Taskbar and Start menu  Folder options  Network and Internet Connections: Applets that configure all the connection types:  Internet options  Network connections  Add or Remove Programs: An applet to add or remove programs and windows components safely  Sounds, Speech, and Audio Devices: Applets that control all the settings for sound:  Sounds and audio devices  Speech  Portable media devices  Performance and Maintenance: Applets to find information about your computer or perform maintenance:  Administrative tools  Power options  Scheduled tasks  System
  • 70. 56  Printers and Other Hardware: Applets to configure devices connected to your computer:  Game controllers  Keyboard  Mouse  Phone and modem options  Printers and faxes  Scanners and cameras  User Accounts: Applets to configure options for users and their e- mail:  E-mail  User accounts  Date, Time, Language, and Regional Options: Applets to change settings based on your location and language:  Date and time  Regional and language options  Accessibility Options: A wizard used to configure windows for vision, hearing, and mobility needs  Security Center: Applet used to configure security settings for:  Internet options  Automatic updates  Windows firewall I. MS Configuration Command Classification Directions: There are five functional tabs in MS Configuration utility, namely General, Boot, Services, Startup and Tools. Classify the following items according to the tabs they belong to. Write your answer on a separate paper. 1. Event Viewer 2. Safe Boot 3. List of services that start when computer boots 4. Make all boot settings permanent 5. Normal startup 6. No GUI Boot 7. OS Boot information 8. Hide All Microsoft Services 9. Convenient List of Diagnostic Tools 10.Base Video
  • 71. 57 II. Applet Grouping Directions: Complete the diagram of various Control Panel Applets with the components included in their category.
  • 72. 58 Research and Explore Directions: Conduct a research that identifies other available tools used for computer system and network configuration. Use some other resources like the World Wide Web and interview a practitioner (preferably an IT specialist or a computer technician) to find out the different tools they use for configuration. Your research will be rated according to the following criteria: Rubrics for Term or Research Paper Qualities & Criteria Poor (70-74) Good (75-79) Very Good (80-89) Excellent (90-100) Format/Layout (15%)  Presentation of the text  Structuring of text  Requirements of length, font and style followed Followed poorly the requirements related to format and layout. Some format and layout related requirements were met. Most format and layout related requirements were met. All the requirements related to format and layout were strictly followed. Content/Information (50%)  All elements of the topics are addressed  The information is technically sound  Information based on careful research  Coherence of information The research was not objective and poorly addresses the issues referred in the proposed topic. The provided information was not necessary or not sufficient to discuss these issues. The research was objective and for some part addresses an in-depth analysis The provided information was, for some part, necessary and sufficient to discuss these issues. The research was objective and for the most part addresses an in-depth analysis of most issues referred in the proposed topic. The provided information was, for the most part, necessary and sufficient The research was objective and addresses with an in- depth analysis all the issues referred in the proposed topic. The provided information was necessary and sufficient to discuss
  • 73. 59 to discuss these issues. these issues. Quality of Writing (25%)  Clarity and cohesiveness of sentences and paragraphs  No errors in spelling, grammar and use of English  Organization and coherence of ideas The essay was not well written, and contains many spelling errors, and/or grammar errors and/or use of English errors. It lacks clarity and/or does not present ideas in a coherent way. The essay was well written for some part, without spelling, grammar or use of English errors. The essay is for some part well organized, clear and presents ideas in a coherent way. The essay was well written for the most part, without spelling, grammar or use of English errors. The essay is for the most part well organized, clear and presents ideas in a coherent way. The essay was well written from start to finish, without spelling, grammar or use of English errors. The essay was well organized, clear and presents ideas in a coherent way. References (10%)  Soundness of references References were not appropriately used and cited. Some of the references were appropriately used and cited. Most of the references were appropriately used and cited. All of the references were appropriately used and cited.
  • 74. 60 Oral Presentation Directions: After the thorough research and exploration, you have to present your work individually in an oral presentation. Your performance will be rated based on the rubrics provided in this section. Rubrics for Oral Presentation CRITERIA B (70- 74) D (75-79) AP (80-84) P (85-89) A (90-100) 1. Gave an interesting introduction 2. Presented clear explanation of topic 3. Presented information in a logical manner 4. Used complete sentence 5. Offered a concluding statement 6. Spoke clearly, correctly, distinctly, and confidently 7. Maintained eye contact 8. Maintained good and proper posture 9. Utilized audio-visual materials 10. Answered questions sufficiently and received comments openly Total Grand Total Legend: B- Beginner D- Developing AP- Approaching Proficiency P- Proficient A- Advance
  • 75. 61 Procedures in Using Computer System Configuration Tools As a future computer technician you must be diligent and eager to know the different procedures in using the tools for computer system configuration. This will help and guide you to carry out a particular job in a proper manner. Once you already identify them, you must also acquire the necessary and appropriate skills to apply them in actual situations. This part of the module present some of the required procedures in computer system configuration. Take note that you need to exert extra effort in finding out some procedures which are not in this module. This is your chance to explore and learn through your own experience. The subsequent sections below present the various procedures in using Computer System Configuration Tools: 1. Accessing and using Microsoft System Configuration  Click on Start Button  In the Search Box, type Run  In the Run window, type msconfig, and press Enter. Figure 10. General Tab of Microsoft system configuration
  • 76. 62 2. Accessing and using Regedit:  Click on Start Button  In the search box, or Run window, type the following: regedit and then press Enter. Figure11. Registry Editor Window Using the Registry Editor The Registry Editor (regedit.exe) is included in Windows to enable you to view and edit the contents of the Registry. When you open the Registry Editor, you will see a window divided into two panes. The left side shows a tree with folders (see Structure of the Registry above), and the right side shows the contents (values) of the currently selected folder (key).  To expand a certain branch, click on the little plus sign [+] on the left of any folder, or just double-click on the folder.  To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side.  You can add a new key or value by selecting New from the Edit menu.  You can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard.
  • 77. 63  Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete. 3. Accessing and Using Direct X Diagnostic You can test Microsoft DirectDraw and Direct3D on each monitor attached to your system. You can also test DirectSound on each wave output device, and DirectMusic on each music port. To run the DirectX Diagnostic Tool (DX Diagnostic Tools Window of Windows XP differs from Windows 7 but it does the same function):  Click on Start Button, type Run on the search box.  On the Run window, Type in dxdiag and click Ok or press Enter, as shown in Figure 9, Run Dialog Box. . Figure12. Run Dialog Box  Next you will see a new window with various tabs. Caution: Using regedt32.exe or regedit.exe incorrectly might cause configuration problems that may require you to reinstall the operating system.
  • 78. 64 Figure13. System Tab of DX Diagnostic Tool  The System tab shows information about your computer and displays the version of DirectX installed on your computer.  The DirectX Files tab shows the file name and the version number for each DirectX file installed on your computer. It also shows the file names and the version numbers of other files that are used by games that are running under DirectX.  The Display tab lists your current display settings, and allows you to disable DirectDraw, Direct3D, and AGP Texture Acceleration. You can also test DirectDraw and Direct3D from the Display tab which will indicate that the DirectX Graphics runtime files are installed and operating correctly. It will also display your device's available memory and can tell you if your video driver has passed Microsoft's Windows Hardware Quality Labs testing standard. The DirectX Diagnostic Tool, however, cannot report memory that is in use at the time that it starts and you may see less memory reported than your video card actually has.
  • 79. 65 Figure14. Display Tab of DX Diagnostic Tool  The Sound tab displays your current audio settings and allows you to test DirectSound. It will tell you if the audio driver are signed, meaning that it has passed Microsoft's Windows Hardware Quality Labs testing standard. The Hardware Sound Acceleration Level slider is used to correct audio glitches that might be caused by some audio drivers. You can adjust the slider settings and see if it provides better results in your application. Be sure not to lower it too much or you may disable some audio features of your system. If the tool detects a problem with your sound settings, a warning message is displayed in the Notes box.  The Music tab displays your current MIDI settings, and allows you to test the DirectMusic component of DirectX. Click on the Test DirectMusic button to perform the test. If the DirectX Diagnostic Tool detects a problem with DirectMusic, a warning message is displayed in the Notes box.
  • 80. 66 Figure15. Sound Tab of DX Diagnostic Tool  The Input tab lists the input devices connected to your computer such as USB and PS2 devices. It also displays the input drivers installed on your computer. If the DirectX Diagnostic Tool detects a problem with an input device or an input device driver, a warning message is displayed in the Notes box.
  • 81. 67 Figure16. Input Tab of DX Diagnostic Tool  The Network tab lists the registered DirectPlay Service Providers. These are the connection methods that DirectPlay will operate across. A registry problem here can normally be resolved by reinstalling DirectX. A registry error here can normally be resolved by removing and reinstalling that application. If the DirectX Diagnostic Tool detects a problem with a DirectPlay Service Provider or Application, a warning message is displayed in the Notes box.  The More Help tab allows you to further troubleshoot problems that the other tabs could not resolve. Features include the DirectX troubleshooter, sound troubleshooter, system information tool and the override tool which will override DirectDraw’s refresh rate.
  • 82. 68 Windows Registry Backup and Recovery Directions: In this activity you will back up a computer registry. You will also perform a recovery of a computer registry. The registry is also called System State data. You will be given 1 hour to accomplish this activity. Recommended Equipment: A computer system running Windows XP is required for this exercise. Procedures: Step 1  Log on to the computer as yourself.  Click Start > Run.  Type ntbackup and then click OK. The “Backup or Restore Wizard” window appears. Figure 17. Backup or Restore Wizard Step 2  Click Advanced Mode.  The Backup Utility window appears.
  • 83. 69 Figure 18. Backup Utility Window Step 3  Click Backup Wizard.  The “Welcome to the Backup Wizard” window appears. Figure 19. Backup Restore Wizard Window Step 4  Click Next.  Click the Only back up the System State data radio button.
  • 84. 70 Figure 20. Choose “Only backup system state data” Step 5  Click Next.  The “Backup Type, Destination, and Name” window appears. Figure 21. Backup Type Destination, and Name” Window Step 6  Click Browse.
  • 85. 71  If you are asked to insert a disk into the floppy disk drive, click Cancel.  The “Save As” dialog box appears. Figure 22. Save As Dialog Box Step 7  Click the My Documents icon on the left side of the “Save As” dialog box.  Click Save.  The “Backup Type, Destination, and Name” window re-appears. Step 8  Click Next.  The “Completing the Backup Wizard” appears.
  • 86. 72 Figure 23. Completing the Backup Wizard Window Step 9  Click Advanced.  The “Type of Backup” window appears. Figure 24. Type of Backup Window  The default backup type is “Normal”. If available, make sure that “Backup Migrated Remote Storage Data” is not checked. Step 10  Click Next.  The “How to Backup” window appears.
  • 87. 73 Figure 25. How to Backup Window Step 11  Click the Verify Data After Backup check box, and then click Next.  The “Backup Options” window appears. Figure 26. Backup Options Window Step 12  Click Replace the existing backups, and then click Next.  The “When to Back Up” window appears.
  • 88. 74 Figure 27. When to Backup Window Step 13  At the “When To Back Up” window, click Now and then click Next.  The “Completing the Backup Wizard” window appears. Figure 28. Completing the Backup Window Step 14  Click Finish.  The “Backup Progress” window appears.
  • 89. 75 Figure 29. Backup Progress Window  The “Backup Progress” window indicates that the backup is complete. Step 15  Click Report.  The Notepad application window appears containing the report.
  • 90. 76 Figure30. Notepad Application Window  Close Notepad.  In the Backup Progress dialog box, click Close.  Close the Backup Utility. Step 16  Click Start >Run.  Type regedit in the “open” field. The Registry Editor window appears. Figure 31. RegEdit Window
  • 91. 77 Step 17  Expand the HKEY_CURRENT_USER Registry Key.  Expand the Control Panel Registry Key.  Expand the PowerCfg Registry Key.  Right-Click the Screen Saver. Stars Registry Key.  Click Delete.  Click File > Exit in the Registry Editor window.  Browse to the “My Documents” folder and locate the “backup.bkf” file.  Double-click the backup file to bring up the Backup Utility Wizard.  Click Next. Step 18  Click the Restore files and settings radio button and then click Next.  The “What to Restore” window appears. Figure 32. What to Restore Window Step 19  Expand the file.  Expand the backup.bkf file.  Click the System State check box.
  • 92. 78 Figure 33. Click System State Check box Step 20  Click Next.  The “Completing the Backup or Restore Wizard” window appears. Figure 34. Completing the Backup or Restore Wizard Window Step 21  Click Advanced.  The “Where to Restore” window appears.
  • 93. 79 Figure 35. Where to Restore Window Step 22  The default restoration location is “Original location”.  Click Next.  The “Restoring System State will always overwrite current System State unless restoring to an alternate location.” Warning window appears.  Click OK. Figure 36. “Restoring System State will always overwrite current System State unless restoring to an alternate location” Warning Window Step 23  Click the Replace existing files if they are older than the backup files radio button.
  • 94. 80 Figure 37. How to Restore Window Step 24  Click Next.  The “Advanced Restore Options” window appears Figure 38. Advanced Restore Options Window
  • 95. 81  Be sure that all three check boxes are selected, and then click Next.  Click Finish.  The system recovery begins by copying the files back to the computer.  When prompted to restart the computer, click Yes. The computer will restart. Step 25  Click start > Run.  Type regedit in the “Open” field.  Click OK.  You should see the “Screen Saver Stars” Registry key in the Registry Editor application window.  Click File > Exit. Finish Performance Rubrics for Windows Registry Backup and Recovery CRITERIA Excellent 4 Good 3 Fair 2 Poor 1 Safety Procedures (15%) -Applied / manifested safety precautions while working Adherence to the Procedures (30%) -Followed the procedures systematically Workmanship (15%) -Utilized organized materials and tools while accomplishing the task and exhibited time management Quality of work (40%) -the windows registry was fully backed up
  • 96. 82 Lesson 2. Configure Computer System and Network System Configuration is the way a system is set up, it is the collection of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows Operating System. Many software products require that the computer has a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory capacity. When you install a new device or program, you sometimes need to configure it, which means that you need to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to technological advancements, such as plug-and-play, much of this configuration is now performed automatically. After dealing with the preparations for configuration, you can now proceed with the next section of this module which is Configuring Computer System and Network. This lesson is designed to give you the proper procedures used in configuring computer systems and networks. At the end of this lesson you should be able to:  Inspect networking devices and connectors;  Create a cross-over and straight-through Ethernet cables;  Assign and configure IP address to clients and servers;  Create a peer-to-peer network;  Enable network security; and  Configure file and printer sharing.
  • 97. 83 Safety Precautions Related to Networks Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be pulled through ceilings and walls where there are obstacles or toxic materials. You should wear clothing such as long pants, a long-sleeved shirt, sturdy shoes that cover your feet, and gloves to protect you from those toxic materials. Most importantly, wear safety glasses. If possible, ask building management, or someone responsible for the building, if there are any dangerous materials or obstacles that you need to be aware of before entering the ceiling area. Safety precautions when using a ladder:  Read the labels on the ladder, and follow any safety instructions written on it.  Never stand on the top rung of the ladder. You could easily lose your balance and fall.  Make sure that people in the area know you will be working there.  Cordon off the area with caution tape or safety cones.  When you are using a ladder that leans up against a wall, follow the instructions written on the ladder, and have someone hold the ladder to help keep it steady. Safety rules when working with cables: The tools required to install copper and fiber-optic cable may cause danger through improper use. When working with cables, strictly follow these safety rules:  Make sure that the tools you are using are in good working condition.  Watch what you are doing, and take your time. Make sure that you do not cut yourself or place anyone in danger.  Always wear safety glasses when cutting, stripping, or splicing cables of any kind. Tiny fragments can injure your eyes.  Wear gloves whenever possible, and dispose any waste properly. Use common sense when installing cables and fixing network problems. Call for assistance for tasks that you cannot do on your own.
  • 98. 84 Fiber-Optic Safety Fiber-optic cables are useful for communications, but they have certain hazards:  Dangerous chemicals  Tools with sharp edges  Light which you cannot see that can burn your eyes  Glass shards produced by cutting fiber-optic cable that can cause bodily harm Specific types of tools and chemicals are used when working with fiber-optic cable. These materials must be handled with care. Chemicals The solvents and glues used with fiber optics are dangerous. You should handle them with extreme care. Read the instructions on the label, and follow them carefully. Also, read the material safety data sheet (MSDS) that accompanies the chemicals to know how to treat someone in case of emergency. Tools When working with any tool, safety should always be your first priority. Any compromise in safety could result in serious injury or even death. The tools used for working with fiber optics have sharp cutting surfaces that are used to scribe glass. Other tools pinch cables with high pressure to fasten connectors to them. These tools can produce shards of glass that can splinter and fly into the air. You must avoid getting them on your skin and in your mouth or eyes. Glass Shards The process of cutting and trimming the strands of fiber-optic cables can produce tiny fragments of glass or plastic that can penetrate your eyes or skin and cause severe irritation. The fibers can be extremely difficult to see on your skin because they are clear and small. When you work with fiber-optic cabling, the working surface should be a dark mat so that you can see the tiny glass or plastic fragments. The mat should also be resistant to chemical spills. You should keep the work area clean and neat. Never pick up fiber- optic fragments with your fingers. Use tape to pick up small fragments, and dispose them off properly. Use a disposable container, such as a plastic bottle with a screw-on lid, to store fiber fragments. Close the lid tightly before disposing the container.
  • 99. 85 Harmful Light Protect your eyes from the harmful light that may be in the fiber-optic strands. The light is a color that humans cannot see. It can damage your eyes before you can feel it. When you use a magnifier to inspect fiber-optic cable and connectors, the light emitted from the fiber could be directed into your eyes. When working with fiber, be sure to disconnect the light source. Use special detectors to help you tell if a fiber is energized. Networking Devices, Media and Connector To make data transmission more extensible and efficient than a simple peer-to-peer network, network designers use specialized network devices such as hubs, switches, routers, and wireless access points to send data between devices. You have already discussed in your Grade 9 CHS class the different devices used in networking and which provides you the knowledge on the common networking cables that are essential in putting up a network. Common Network Cables Until recently, cables were the only medium used to connect devices on networks. A wide variety of networking cables are available. Coaxial and twisted-pair cables use copper to transmit data. Fiber-optic cables use glass or plastic to transmit data. These cables differ in bandwidth, size, and cost. You need to know what type of cable to use based on the job requirements. You also need to be able to troubleshoot and repair problems along the way. Caution: Obtain proper training before you attempt to cut, strip, or splice fiber-optic cable. An experienced technician should supervise you until you become adequately skilled.
  • 100. 86 Twisted Pair Twisted pair is a type of copper cabling that is used for telephone communications and most Ethernet networks. A pair of wires forms a circuit that transmits data. The pair is twisted to provide protection against crosstalk, the noise generated by adjacent pairs of wires in the cable. Pairs of copper wires are encased in color-coded plastic insulation and are twisted together. An outer jacket protects the bundles of twisted pairs. Source: www.lanshack.com Figure 39. UTP and STP Cable When electricity flows through a copper wire, a magnetic field is created around the wire. A circuit has two wires, and in a circuit, the two wires have oppositely-charged magnetic fields. When the two wires of the circuit are next to each other, the magnetic fields cancel each other out. This is called the cancellation effect. Without the cancellation effect, your network communications become slow because of the interference caused by the magnetic fields. The two basic types of twisted-pair cables are as follows:  Unshielded twisted pair (UTP) is the cable that has two or four pairs of wires. This type of cable relies solely on the cancellation effect produced by the twisted-wire pairs that limits signal degradation caused by electromagnetic interface (EMI) and radio frequency interference (RFI). UTP is the most commonly used cabling in networks. UTP cables have a range of 328 feet (100 m).  With shielded twisted pair (STP), each pair of wire is wrapped in metallic foil to better shield the wires from noise. Four pairs of wires are then wrapped in an overall metallic braid or foil. STP reduces electrical noise from within the cable. It also reduces EMI and RFI from
  • 101. 87 outside the cable. Although STP prevents interference better than UTP, STP is more expensive because of the extra shielding. It is also more difficult to install because of the thickness. In addition, the metallic shielding must be grounded at both ends. If it is improperly grounded, the shield acts like an antenna, picking up unwanted signals. Category Rating UTP comes in several categories that are based on two factors:  The number of wires in the cable  The number of twists in those wires 1. Category 3 is the wiring used for telephone systems and Ethernet LAN at 10 Mega byte per second (Mbps). 2. Category 3 has four pairs of wires. 3. Category 5 and Category 5e have four pairs of wires with a transmission rate of 100 Mbps. 4. Category 5 and Category 5e is the most common network cables used. 5. Category 5e has more twists per foot than Category 5 wiring. These extra twists further prevent interference from outside sources and from the other wires within the cable. Some Category 6 cables use a plastic divider to separate the pairs of wires, which prevents interference. The pairs also have more twists than Category 5e cable. Coaxial Cable Coaxial cable is a copper-cored cable surrounded by a heavy shielding. Coaxial cable is used to connect the computers to the rest of the network. Source: www.phoneam.com Figure 40. Coaxial Cable
  • 102. 88 Coaxial cable uses “British Naval Connectors (BNC)” or “Bayonet Neill- Concelman” connectors, at the ends of the cables to make the connection. Several types of coaxial cable exist:  Thicknet (10BASE5) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500 meters.  Thinnet (10BASE2) is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 185 meters.  RG-59 is most commonly used for cable television in the U.S.  RG-6 is higher-quality cable than RG-59, with more bandwidth and less susceptibility to interference. Fiber-Optic Cable An optical fiber is a glass or plastic conductor that transmits information using light. Fiber optic cable has one or more optical fibers enclosed in a sheath or jacket. Because it is made of glass, fiber-optic cable is not affected by EMI or RFI. All signals are converted to light pulses to enter the cable and are converted back into electrical signals when they leave it. This means that fiber-optic cable can deliver signals that are clearer, and can go farther, without compromising the clarity of signals. Source: www.picstopin.com Figure 41. Fiber Optic Cable Fiber-optic cable can reach distances of several miles or kilometers before the signal needs to be regenerated. Fiber-optic cable usually is more expensive to use than copper cable, and the connectors are more costly and harder to assemble. Common connectors for fiber-optic networks are SC, ST, and LC. These three types of fiber-optic connectors are half-duplex, which allows data to flow in only one direction. Therefore, two cables are needed.
  • 103. 89 These are the two types of glass fiber-optic cable:  Multimode is the cable that has a thicker core than single-mode cable. It is easier to make, can use simpler light sources such as Light Emitting Diodes (LEDs), and works well over distances of a few kilometers or less.  Single-mode is the cable that has a very thin core. It is harder to make, uses lasers as a light source, and can transmit signals dozens of kilometers with ease. Creating Ethernet Cable Ethernet cabling has been the standard in networking installation for years. It is the fastest way of connecting PC to a peer or to your router or a central switch. This section of the module will bring you back to the procedures in creating an Ethernet cable specifically straight-through and cross-over. Try to recall the procedures as you go on with the lesson. Fabricating an Ethernet Cross-over and Straight-through Cable In an Ethernet networking environment – like in a home or an office with multiple PCs that are wired – the computers need to be connected to a central router to allow data transfer. The router takes all the bits being sent out by the computers and relays them onto the other devices on the network. The straight-through Ethernet cable is used in local area network to connect a PC to a network hub and router. This is the standard cable used for almost all purposes. A cross-over cable, on the other hand, can be used to connect two network devices directly, without the need for a router in the middle. It simply reverses some of the pins so that the output on one computer is being sent to the input of another. Bear in mind that safety precautions must always be applied and observed during the fabrication of the said cables. Also, materials and tools to be used must always be complete and functional to save time, money and effort. The following items are the materials and tools used for making Ethernet cables:  Ethernet Cable Category 5e or Cat5e- standard wire for cabling;  RJ45 crimpable connectors for Cat5e;  RJ45 Crimping tool;  Wire cutter, stripper or pliers; and  Ethernet cable tester.
  • 104. 90 Cable Fabrication Procedures The picture below will serve as your guide in making the two important Ethernet cables. 1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that will do the trick with practice. 2. Unwind and pair the similar colors. Cross-Over Straight-Through Figure 42. Cross-Over and Straight-Through Color Coding Figure 43. Step 1 Figure 44. Step 2
  • 105. 91 3. Pinch the wires between your fingers and straighten them out as shown. The color order is important to do this correctly. 4. Use wire cutter to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires. 5. Push the wires into the connector. Each wire fits into a slot in the RJ45 connector. Note the position of the blue plastic shielding. Also note how the wires go all the way to the end. 6. Take view from the top. Make sure the wires are all the way in. There should be no short wires. Figure 45. Step 3 Figure 46. Step 5 Figure 47. Step 6
  • 106. 92 7. Crimping the Cable – carefully place the connector into the Ethernet Crimper and cinch down on the handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove the cable from the crimper, that end is ready to use. 8. For a standard "Straight-Through" cable, repeat all steps and wire color order on the other end of cable. For a cross-over cable - the other end will have a different color order as shown by the crossover picture on page 84. 9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite well. Figure 48. Step 7 Figure 49. Step 9
  • 107. 93 Criss-Cross Puzzle Directions: Complete the criss-cross puzzle and familiarize yourself of the cables being described. Write your answer in a clean sheet of paper. CABLES Across 1. each pair of wires is wrapped in metallic foil 3. one or more optical fibers enclosed in a sheath or jacket 5. used to connect two devices directly 6. cable that has two or four pairs of wires 7. the standard cable used for almost all purposes Down 1. cable that has a very thin core 2. cable that has a thicker core 4. used for telephone communications and Ethernet networks 5. copper-cored cable
  • 108. 94 Now that you are equipped with the knowledge on the different cables used in networking, you also need to know that fiber technologies and connectors have changed through the years. In these videos, you will learn about the different fiber connectors, copper connectors and their characteristics. To watch the video presentations just type in the following URL: 1) http://www.professormesser.com/n10-005/copper-connectors/ 2)http://www.professormesser.com/n10-005/copper-connectors/ 3.http://www.professormesser.com/n10-005/utp-stp-and-coaxial-cabling/
  • 109. 95 Here are the questions: 1. What are the different types of fiber connectors? Cite their advantages and disadvantages. _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________. 2. List down the different types of connectors. _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________ 3. What are the characteristics of UTP, STP and coaxial cable? _____________________________________________________ _____________________________________________________ _____________________________________________________ _____________________________________________________ I hope you learned a lot from the video presentations. After watching the videos, answer the following guide questions and submit it to your teacher. Write your answer in a clean sheet of paper. Good Luck!
  • 110. 96 Create your own Ethernet Cable Directions: Prepare the following tools and materials in fabricating your own cross-over and straight-through cables. Materials:  6 meters Ethernet Cable Category 5e or Cat5e-standard wire for cabling;  RJ45 crimpable connectors for Cat5e; Tools:  RJ45 Crimping tool;  Wire cutter, stripper or pliers; and  Ethernet cable Tester / LAN Tester Reminder / Caution: Be careful when using the tools. Follow the procedures cited in this module and apply the safety precautions to avoid injury or any unwanted incident. You will be given 30 minutes to complete the task. You will be rated using the performance rubrics found on the next page. Procedures: 1. Cut into the plastic sheath 1 inch from the end of the cut cable. The crimping tool has a razor blade that will do the trick with practice. 2. Unwind and pair the similar colors. 3. Pinch the wires between your fingers and straighten them out as shown on page 90. The color order is important to do this correctly. 4. Use scissors to make a straight cut across the wires 1/2 inch from the cut sleeve to the end of the wires. 5. Push the wires into the connector. Note the position of the blue plastic shielding. Also note how the wires go all the way to the end. 6. Take view from the top. Make sure the wires are all the way in. There should be no short wires. 7. In crimping the cable – carefully place the connector into the Ethernet Crimper and cinch down on the handles tightly. The copper splicing tabs on the connector will pierce into each of the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight compression fit. When you remove the cable from the crimper, that end is ready to use.
  • 111. 97 8. For a standard straight-through cable, repeat all steps and wire color order on the other end of cable. For a cross-over cable, the other end will have a different color order as shown in the cross-over picture on page 89. 9. Make sure to test the cables before installing them. An inexpensive Ethernet cable tester does this quite well. Performance Rubrics for Creating a Cross-Over and Straight-Through Ethernet Cables CRITERIA Excellent 4 Good 3 Fair 2 Poor 1 Safety Procedures (15%) -Applied / manifested safety precautions while working Adherence to the Procedures (30%) -Followed the procedures systematically Workmanship (15%) -Organized materials and tools while accomplishing the task and has time management Quality of Product (40%) -Produced a fully functional Ethernet Cable
  • 112. 98 Internet Protocols A protocol is a set of rules. A letter sent through the postal system also uses protocols. Part of the protocol specifies where on the envelope the delivery address needs to be written. If the delivery address is written in the wrong place, the letter cannot be delivered. Internet protocol works in a similar way. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages to be exchanged. Timing is crucial to network operation. Protocols require messages to arrive within a certain amount of time so that computers do not wait indefinitely for messages that may have been lost. Therefore, systems maintain one or more times during transmission of data. Protocols also initiate alternative actions if the network does not meet the timing rules. Many protocols consist of a suite of other protocols that are stacked in layers. These layers depend on the operation of the other layers in the suite to function properly. To understand how networks and the Internet work, you must be familiar with the commonly used protocols. These protocols are used to browse the web, send and receive e-mail, and transfer data files. You will encounter other protocols as your experience in IT grows, but they are not used as often as the common protocols described here:  TCP/IP: The Transmission Control Protocol /Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. The main functions of protocols are:  Identifying errors  Compressing the data  Deciding how the data should be sent  Addressing the data  Deciding how to announce sent and received data
  • 113. 99  IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continues to use IPX/SPX.  NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. Figure 50. Commonly Used Internet Protocol
  • 114. 100  AppleTalk: AppleTalk is a protocol suite used to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology. This protocol is also designed to run over major LAN types, notably Ethernet and Token Ring.  HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW). The Internet Engineering Task Force (IETF) developed the standards for HTTP.  FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems.  SSH: Secure Shell is used to securely connect to a remote computer.  Telnet: It is an application used to connect to a remote computer that lacks security features.  POP3: Post Office Protocol is used to download e-mail from a remote mail server.  IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server.  SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server. The more you understand about each of these protocols, the more you will understand how networks and the Internet work. IP Addressing An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices. Network devices are those that move data across the network, including hubs, switches, and routers. On a LAN, each host (device that sends or receives information on the network) and network device must have an IP address within the same network to be able to communicate with each other. A person’s name and fingerprints usually do not change. They provide a label or address for the person’s physical aspect—the body. A person’s mailing address, on the other hand, relates to where the person lives or picks up mail. This address can change. On a host, the Media Access Control
  • 115. 101 (MAC) address is assigned to the host Network Interface Card (NIC) and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network in the same way that fingerprints remain with someone regardless of where he or she goes. An IP address consists of a series of 32 binary bits (1s and 0s). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets. An IP address, even in this grouped format, is hard for humans to read, write, and remember. Therefore, each octet is presented as its decimal value, separated by a decimal point or period. This format is called dotted-decimal notation. When a host is configured with an IP address, it is entered as a dotted-decimal number, such as 192.168.1.5. Table 6. Five Classes of IP Address IP Classes Purpose Class A Used for large networks, implemented by large companies and some countries Class B Used for medium-sized networks, implemented by universities Class C Used for small networks, implemented by ISPs for customer subscriptions Class D Used for special use for multicasting Class E Used for experimental testing Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If you mistyped just 1 bit, the address would be different, and the host may not be able to communicate on the network. The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network, and the second part identifies a host on that network. Both parts are required in an IP address. For example, if a host has an IP address of 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57, identifies the host. This is called hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network, not the location of each individual host.
  • 116. 102 Subnet Mask The subnet mask indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal number. Usually all hosts within a LAN use the same subnet mask. Table 3 shows default subnet masks for usable IP addresses that are mapped to the first three classes of IP addresses:  255.0.0.0: Class A, which indicates that the first octet of the IP address is the network portion  255.255.0.0: Class B, which indicates that the first two octets of the IP address are the network portion  255.255.255.0: Class C, which indicates that the first three octets of the IP address are the network portion Table 7. Default Subnet Masks for Usable IP Addresses Class A Network Host Octet 1 2 3 4 Class B Network Host Octet 1 2 3 4 Class C Network Host Octet 1 2 3 4 Class D addresses are used for multicast groups. There is no need to allocate octet or bits to separate network and host addresses. Class E addresses are reserved for research use only. IpConfig Ipconfig is a command used to find out the IP address of a certain network you are connected to. How to use the ipconfig command? 1) Click on Start Button, then type cmd (command prompt) on the search box. 2) A black screen will appear as shown in the figure below.
  • 117. 103 3) Type ipconfig and press enter. The figure below shows the IP configuration window using the ipconfig command. The information from this window will be useful because it shows the IP address, subnet mask and default gateway of a network you are connected to. Figure 51. Command Prompt Window Figure 52. IP Configuration in CMD Window
  • 118. 104 Assigning a static IP Address In a home network with several computers and devices, it is ideal to assign each of them a specific address. This is for the purpose of avoiding problems when you do troubleshooting which requires figuring out the IP address of each of them. It is also a means to prevent address conflicts between the devices. You can also manage them with ease if you have assigned their own addresses. Here are the procedures in assigning an IP Address on a windows base computer system: 1. Open the Control Panel’s Network Connections icon. 2. Open the icon representing your computer’s network connection. 3. Click the Properties button in the Status dialog box. 4. From the list of items, choose Internet Protocol (TCP/IP). 5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box appears. Figure 53. Wireless Network Connections Properties Dialog Box
  • 119. 105 6. Type the IP address for your computer. Enter the appropriate IP Address in the IP address section. 7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0, but it can be different, such as 255.255.255.127. 8. Type the default gateway address. The default gateway is the router, so type the router’s address. Figure 54 shows an example of assigning an IP Address, Subnet mask and default gateway. Figure 54. TCP / IPV4 Dialog Box Figure 55. Assigning an IP Address
  • 120. 106 9. Type the address for the preferred DNS server. The address should be obtained from your Internet Service Protocol. It is used to help your computer find web pages and other addresses on the internet. 10.Type the address for the alternate DNS server. The alternate Domain Name System (DNS) server’s IP address is something that your ISP provides. 11.Click OK to confirm the settings. 12.Close all other open dialog boxes and windows. Assigning a Dynamic IP Address If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, using a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Dynamic Host Configuration Protocol (DHCP) is a software utility used to dynamically assign IP addresses to network devices. This dynamic process eliminates the need to manually assign IP addresses. A DHCP server can be set up and the hosts can be configured to automatically obtain Figure 56. Assigning a Dynamic IP Address
  • 121. 107 an IP address. When a computer is set to obtain an IP address automatically, the other entire IP addressing configuration boxes are dimmed or disabled. The server maintains a list of IP addresses to assign, and it manages the process so that every device on the network receives a unique IP address. Each address is held for a predetermined amount of time. When the time expires, the DHCP server can use this address for any computer that joins the network. These are the IP address information that a DHCP server can assign to hosts:  IP address  Subnet mask  Default gateway  Optional values, such as a Domain Name System (DNS) server address The DHCP server receives a request from a host. The server then selects IP address information from a set of predefined addresses that are stored in a database. After the IP address information is selected, the DHCP server offers these values to the requesting host on the network. If the host accepts the offer, the DHCP server leases the IP address for a specific period of time. Using a DHCP server simplifies the administration of a network because the software keeps track of IP addresses. Automatically configuring TCP/IP also reduces the possibility of assigning duplicate or invalid IP addresses. Before a computer on the network can take advantage of the DHCP server services, the computer must be able to identify the server on the local network. You can configure a computer to accept an IP address from a DHCP server by clicking the Obtain an IP address automatically option in the NIC configuration window, as shown in Figure 56. If your computer cannot communicate with the DHCP server to obtain an IP address, the Windows operating system automatically assigns a private IP address. If your computer is assigned an IP address in the range of 169.254.0.0 to 169.254.255.255, it can communicate with only other computers in the same range. An example of when these private addresses would be useful is in a classroom lab where you want to prevent access outside to your network. This operating system feature is called Automatic Private IP Addressing (APIPA). APIPA continually requests an IP address from a DHCP server for your computer.
  • 122. 108 Ping The ping is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. The ping command is usually used as a simple way to verify that a computer can communicate over the network with another computer or network device. The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response. How many of those responses are returned, and how long it takes for them to return, are the two major pieces of information that the ping command provides. Table 8. Ping Command Syntax Syntax Description -t Using this option will ping the target until you force it to stop using Ctrl-C. -a - This ping command option will resolve, if possible, the hostname of an IP address target. -n count This option sets the number of ICMP Echo Request messages to send. If you execute the ping command without this option, four requests will be sent. -l size Use this option to set the size, in bytes, of the echo request packet from 32 to 65,527. The ping command will send a 32 byte echo request if you do not use the -l option. -f Use this ping command option to prevent ICMP Echo Requests from being fragmented by routers between you and the target. The -f option is most often used to troubleshoot Path Maximum Transmission Unit (PMTU) issues. -i TTL This option sets the Time to Live (TTL) value, the maximum of which is 255. -v TOS This option allows you to set a Type of Service (TOS) value. Beginning in Windows 7, this option no longer functions but still exists for compatibility reasons. -r count Use this ping command option to specify the number of hops between the computer and the target computer or device that you would like to be recorded and displayed. The maximum value for count is 9 so use the tracert command instead. If you are interested in viewing all hops between two devices. -s count Use this option to report the time, in Internet Timestamp format, that each echo request is received and echo reply is sent. The maximum value for count is 4 which means that only
  • 123. 109 the first four hops can be time stamped. -w timeout Specifying a timeout value when executing the ping command adjusts the amount of time, in milliseconds, that ping waits for each reply. If you do not use the -w option, the default timeout value is used which is 4000, or 4 seconds. -R This option tells the ping command to trace the round trip path. -S srcaddr Use this option to specify the source address. -4 This forces the ping command to use IPv4 only but is only necessary if target is a hostname and not an IP address. -6 This forces the ping command to use IPv6 only but as with the -4 option, is only necessary when pinging a hostname. target This is the destination you wish to ping, which is either an IP address or a hostname. /? Use the help switch with the ping command to show detailed help about the command's several options. Using the ping Command Ping is one of your most important tools in troubleshooting Internet problems. It shows you whether the Domain Name Server is working, whether the computer you are trying to talk to is reachable, and how long it takes to get there. It does this at a very low level — only the most basic Internet functions have to be up and running. 1) Click on Start Button, then type cmd (command prompt) on the search box. 2) A black screen will appear as shown in the figure below. 3) Type ping followed by the IP address you desire to verify. The figure below shows the screen of the ping command and its output.
  • 124. 110 This output shows several things:  Decoding names to network addresses — A domain name server (DNS) resolves machine names to numeric addresses. A single machine can have many names, all of which resolve to the same Internet address. In the example just given, the name www.google.com resolves to the Internet address 122.2.152.23.  Round-trip response time — The parts of the replies that say things like time=105ms show you how long it took from the time the client machine sent out the ping message until a reply came back (1 ms is 1 millisecond, or one thousandth of a second). The variability in the times Figure 57. Step 3 Figure 58. Pinging
  • 125. 111 you see reflects that networks do not always respond identically. Differing amounts of traffic on the communication lines or differing loads on the server are common causes. You will see very different response times depending on the access equipment you use.  Routing hop count — The part of the replies that says TTL=50 tells you about the route the message took from one point to another. The acronym TTL stands for Time to Live, which is a measure of how many rerouting from one point to another the packet has to go through before IP declares it undeliverable. The number following TTL (called the hop count) is a number that usually starts at 255 and counts down by one every time the message gets rerouted through an intermediary computer. I. Protocols Directions: In this worksheet, write the name of the protocol and the default port(s) for each protocol definition in the table. Do this on your notebook. Be prepared to discuss your answers in front of the class. Protocol Definition Protocol Default Port(s) Provides connections to computers over a TCP/IP network Sends e-mail over a TCP/IP network Translates URLs to IP address Transports Web pages over a TCP/IP network Automates assignment of IP address on a network Securely transports Web pages over a TCP/IP network Transports files over a TCP/IP network
  • 126. 112 II. Identifying IP Address Classes Directions: In this worksheet, your teacher will write several IP addresses with their appropriate subnet masks. You will copy the IP address and Subnet Mask. You will write which IP Address Class is appropriate in the IP Address Class column in the chart below. An example has been provided for you. Be prepared to discuss the IP Address Class you select. IP Address Subnet Mask IP Address Class 10.0.0.0 255.0.0.0 A To deepen your understanding with regard to the Internet Protocols, IP Address and subneting, utilize the Internet and the website www.professormesser.com, watch and learn from the video presentations. Use the URLs below: 1. http://www.professormesser.com/n10-005/binary-math-2/ 2. http://www.professormesser.com/n10-005/ip-classes/
  • 127. 113 3. http://www.professormesser.com/n10-005/networkingprotocols/ 4. http://www.professormesser.com/n10-005/subnetting/ Reflection on the video presentations Directions: Answer the essential questions below based on the video presentations you had watched. Write your answer in a clean sheet of paper. 1. What are the procedures involved in calculating IP address and the procedures in converting IP address to binary and vice versa? ________________________________________________________ ________________________________________________________ ________________________________________________________ What are the different IP Classes? Discuss each briefly and give examples. ________________________________________________________ ________________________________________________________ ________________________________________________________ 2. What are the distinguished Internet Protocols? Describe each. ________________________________________________________ ________________________________________________________ ________________________________________________________ 3. What are the necessary procedures in calculating subnet mask or simply subneting? Show an example solution for the calculation. ________________________________________________________ ________________________________________________________ ________________________________________________________
  • 128. 114 Configure an Ethernet NIC to use DHCP Directions: Configure an Ethernet NIC to use DHCP to obtain an IP address. You need to follow the procedures given below and apply safety precautions in accomplishing this task. While doing the activity, you have to answer activity questions written after every step. Write your answer in a clean sheet of paper. Your performance will be rated based on the performance rubrics. Rubrics for Configuration Criteria B (70-74) D (75-79) AP (80-84) P (85-89) A (90-100) Total (=score x %) Proper Configuration (30 %) (The configured hardware was properly configured according to job specification.) Adherence to the Procedures (30%) (The specified job was done by following the procedures. Safety measures were observed during the activity.) Quality of Work (30%) (The device was configured properly.) Comprehension (10%) (Interview / Guide questions were answered correctly according to the job requirements.) Grand Total
  • 129. 115 Legend: B- Beginner D- Developing AP- Approaching Proficiency P- Proficient A- Advance Recommended Equipment  Linksys 300N router  A computer running Window XP Professional  Ethernet patch cable Procedures: Step 1  Plug one end of the Ethernet patch cable into “Port 1” at the back of the router.  Plug the other end of the Ethernet patch cable into the network port on the NIC in your computer.  Plug in the power cable of the router if it is not already plugged in.  Turn on your computer and log on to Windows as an administrator.  Click Start.  Right-click My Network Places, and then choose Properties.  The “Network Connections” window appears. Figure 59. My Network Places
  • 130. 116 Step 2  Right-click Local Area Connection, and then choose Properties.  The “Local Area Connection Properties” window appears. Activity Questions: 1. What is the name and model number of the NIC in the “Connect using:” field? 2. What are the items listed in the “This connection uses the following items:” field? Step 3  Choose Internet Protocol (TCP/IP).  Click Properties.  The “Internet Protocol (TCP/IP) Properties” window appears. Figure 60. Local Area Connection Properties
  • 131. 117 Activity Question: 3. What is the IP address, Subnet mask, and Default gateway listed in the fields of the “Use the following IP address:” area? Answers may vary. If the computer is configured to obtain an IP address automatically, there will be no information in the fields.  Click the Obtain an IP address automatically radio button.  Click OK. The “Internet Protocol (TCP/IP) Properties” window closes. Figure 61. Internet Protocol (TCP/IP) Properties
  • 132. 118  Click OK.  Restart your computer. Step 4  Log on to Windows as an administrator.  Check the lights at the back of the NIC. These lights will blink when there is network activity.  Choose Start > Run.  Type cmd and click OK.  Type ipconfig/all, and then press the Enter key. Figure 62. Local Area Connection Properties Window Figure 63. Run Window
  • 133. 119 Activity Questions: 1. What is the IP address and subnet mask of the “Ethernet Adapter Local Area Network Connection”? 2. What is the IP address of the DHCP server? 3. On what date was the Lease obtained? 4. On what date will the Lease expire? Figure 64. ipconfig all window
  • 134. 120 Task 2 Configure Wireless Router Directions: Configure and test the wireless settings on the LinksysWRT300N. Recommended Equipment  A computer with Windows XP Professional / Windows 7  A Wireless NIC installed  An Ethernet NIC installed  Linksys WRT300N Wireless Router  Ethernet patch cable Step 1  Connect the computer to one of the Ethernet ports on the wireless router with an Ethernet patch cable.  Plug in the power of the wireless router. Boot the computer and log in as an administrator. Step 2  Choose start > Run, and type “cmd”. Press the Return key.  Type ipconfig.  What is the default gateway for the computer? Step 3  Open your browser. Type “192.168.1.1” in the “Address” field, and then press Return.  The “Connect to 192.168.1.1” window appears. Figure 65. Browser Window
  • 135. 121  Type “admin” in the “Password” field.  The Setup screen appears. Step 4  Click the “Wireless” tab.  Choose “Mixed” in the “Network Mode” drop-down box.  Type “CHS#” in the “Network Name (SSID)” field, where # is the number assigned by your instructor. Figure 66. Connect to 192.168.1.1 Window Figure 67. Wireless Tab Window
  • 136. 122  Click Save Settings.  The “Settings are successful” screen appears.  Click Continue, and then close the browser window. Step 4  Unplug the Ethernet patch cable from the rear of the computer.  Choose Start, and then right-click My Network Places. Choose Properties.  Double-click the wireless adapter, and then select View Wireless Networks.  Choose CHS, and then click the Connect button.  Open Internet Explorer, and then connect to the wireless router.  Log in to the wireless router.  Close Internet Explorer. Figure 67. Settings are Successful Window
  • 137. 123 Peer-to-Peer Network In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them, as shown in Figure 68. In this type of network, each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. Because of that, the network has no central point of control or administration. It allows certain files and folders to be shared with everyone or with selected users. Peer-to-peer networks are quite common in small offices that do not use a dedicated file server. Files and folders can be configured to allow network users to copy them, but not alter them in their original location, which is a common safety precaution. However, files and folders can also be assigned a "read/write" status that allows either selected users or all users on the network to change them. Figure 68. Peer-to-Peer Network
  • 138. 124 Peer-to-peer networking differs from client-server networking, where certain devices have responsibility for providing or "serving" data and other devices consume or otherwise act as "clients" of those servers. Setting up a peer-to-peer network in Windows XP The steps described below are provided as a general guide that will work for most home networking situations. However, it may not work for all scenarios. Do the following steps to set up your own inclusive home network: 1. Make sure both systems have Network Interface Cards (NICs) installed and are using the proper cables. 2. For PCs with Windows XP, the home networking wizard can be used to set up Windows for your network. a. Click Start, and then Control Panel. b. Select Network and internet connections. c. Double-click Network setup wizard and follow the on-screen instructions. . 3. Click Start, Control Panel, Network and Internet Connections, and then Network Connections. At Network Connection Windows, you will see the Local Area Connection Icon, Right click it and select Properties. Local Area Connection window appears. NOTE: For a direct network cable connection between two PCs (not with a hub, switch or router), you need to have a cross-over cable. NOTE: If the Network setup wizard is unsuccessful, continue with the steps below.
  • 139. 125 4. Click on the General tab. Figure 69. Network Connection Window Figure 70. LAN Properties General Tab
  • 140. 126 5. A device name should appear under "connect using." If not, there is a hardware issue and Windows is not recognizing the network hardware. This issue must be fixed before continuing. a. At the General Tab, Put a check mark at the following: - Client for Microsoft Network - File and Printer Sharing for Microsoft Network - Internet Protocol (TCP/IP) b. Put a check mark saying Show icon in notification area when connected. c. Select the Internet Protocol (TCP/IP) and click the Properties button NOTE: If any of the above component is not installed, install them by selecting Add or Install, and then selecting the missing component, and clicking Add. Figure 71. TCP/IP- Properties
  • 141. 127 d. At the IP Address tab, select Specify IP Address. e. Enter 192.168.0.1 as the unique IP Address for the first machine. For each other PC add one to the last number in the IP address. For example,  KIDSPC1 = 192.168.0.1 ,  MOMSPC2 = 192.168.0.2 ,  and WORKPC3 = 192.168.0.3 . NOTE: 192.168.0.x is an IP Address reserved for private networks and is not routable to the Internet. Figure 72. Assigning IP Address and Subnet Mask
  • 142. 128 6. In the Subnet mask field enter: 255.255.255.0 All PCs on the same network use the same subnet mask. Click the Ok button to finish configuration and to close the Local Area Connection Properties windows. Click Start, right-click My Computer, and then select Properties. 7. Click the Computer Name tab and click the Change button. 8. Enter a name that describes the PC in the Computer Description field. For example, KIDSPC1, MOMSPC2, or WORKPC3. 9. Enter the workgroup name for your network. Use the same workgroup name for all PCs on the network. Spelling is important in this step. 10.Repeat these steps for each PC on the network. 11.Wait two minutes after Windows opens on all PCs, and then double-click the Network Neighborhood icon on the desktop. If all went well, you should see all the PC names on the network when files and folders are being shared. If you do not see them, press F5 to refresh the screen. 12.If after refreshing the network window, the other PCs still do not appear, check the firewall settings that may be interfering with the communication. Note: The Domain Name System (DNS) is optional. If you have a DNS system and your connected to ISP you can input an IP address which came from the DNS server.
  • 143. 129 Setting up a Peer-to-Peer network in Windows 7 If you are going to work with Windows 7 operating system, the following procedures are used to set up a peer-to-peer network: 1. On Desktop ==> Select My Computer ==> Right Click ==> Select properties. 2. Select Change Setting (administrative permission will be required in this procedure). Figure 73. Step 1 Figure 74. Step 2
  • 144. 130 3. Click or select Change. 4. Change computer name and workgroup name. Then, click OK. Figure 76. Step 4 Figure 75. Step 3
  • 145. 131 5. Save the change (A Reboot will be required). 6. After Reboot ==> Right Click on My Network Place ==> Properties. 7. Turn on Network discovery, File sharing, Printer Sharing. Figure 77. Step 5 Figure 78. Step 6 Figure 79. Step 7
  • 146. 132 8. Click on Manage network connections. 9. Select Local Area Connection ==> Properties 10.Select Internet Protocol version 4 (TCP/IPv4) ==> properties. Figure 80. Step 8 Figure 81. Step 9
  • 147. 133 11.Now enter the assigned IP address and then click OK. Figure 82. Step 10 Figure 83. Step 11
  • 148. 134 12. Now open My network place ==> Click to change then Select Turn on network discovery and file sharing. 13.If you could see all computers in My Network place, you have successfully configured a workgroup. Figure 84. Step 12 Figure 85. Step 13
  • 149. 135 Client-Server Network In a client/server network, the server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines, such as sorting through a database before delivering only the records requested by the client. One example of a client/server network is a corporate environment in which employees use a company e-mail server to send, receive, and store e- mail. The e-mail client on an employee computer issues a request to the e- mail server for any unread e-mail. The server responds by sending the requested e-mail to the client. In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to Figure 86. Client/Server Network
  • 150. 136 the network resources. All the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that he or she is permitted to use. For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup. Comparison Directions: Using the table below, cite the features of peer-to-peer and client /server network. Peer-to-peer Network Client/Server Network 1. 2. 3. 4. 5. Peer-to-peer study Directions: Have a partner. Using different references available such as articles, books, internet and publications, investigate and search for the advantages and disadvantages of peer-to-peer network. You will present your output in front of the class and you will be rated according to the rubrics for research and rubrics for oral presentation.
  • 151. 137 Rubrics for Research Study Qualities & Criteria Poor (0-74) Good (75-79) Very Good (80-89) Excellent (90-100) Format/Layout (15%)  Presentation of the text  Structuring of text  Requirements of length, font and style followed Followed poorly the requirements related to format and layout. Some format and layout related requirements were met. Most format and layout related requirements were met. All the requirements related to format and layout were strictly followed. Content/Information (50%)  All elements of the topics are addressed  The information is technically sound  Information based on careful research  Coherence of information The research was not objective and poorly addresses the issues referred in the proposed topic. The provided information was not necessary or not sufficient to discuss these issues. The research was objective and for some part addresses an in depth analysis The provided information was, for some part, necessary and sufficient to discuss these issues. The research was objective and for the most part addresses an in-depth analysis of most issues referred in the proposed topic. The provided information was, for the most part, necessary and sufficient to discuss these issues. The research was objective and addresses with an in- depth analysis all the issues referred in the proposed topic. The provided information was necessary and sufficient to discuss these issues.
  • 152. 138 Quality of Writing (25%)  Clarity and cohesiveness of sentences and paragraphs  No errors in spelling, grammar and use of English  Organization and coherence of ideas The essay was not well written, and contains many spelling errors, and/or grammar errors and/or use of English errors. It lacks clarity and/or does not present ideas in a coherent way. The essay was well written for some part, without spelling, grammar or use of English errors. The essay is for some part well organized, clear and presents ideas in a coherent way. The essay was well written for the most part, without spelling, grammar or use of English errors. The essay is for the most part well organized, clear and presents ideas in a coherent way. The essay was well written from start to finish, without spelling, grammar or use of English errors. The essay was well organized, clear and presents ideas in a coherent way. References (10%)  Soundness of references References were not appropriately used and cited. Some of the references were appropriately used and cited. Most of the references were appropriately used and cited. All of the references were appropriately used and cited.
  • 153. 139 Rubrics for Oral Presentation CRITERIA B (70- 74) D (75-79) AP (80-84) P (85-89) A (90-100) 1. Gave an interesting introduction 2. Presented clear explanation of topic 3. Presented information in logical manner 4. Used complete sentence 5. Offered a concluding summary 6. Spoke clearly, correctly, distinctly, and confidently 7. Maintained eye contact 8. Maintained acceptable posture. 9. Utilized audio-visual aids 10. Handled questions and comments confidently Total Grand Total Legend: B- Beginner D- Developing AP- Approaching Proficiency P- Proficient A- Advance
  • 154. 140 Hands-on Activity Directions: Follow and perform the prescribed procedures in setting up a peer-to-peer and client/server network for Windows XP and Windows 7. You will be rated base on the performance indicators below: Performance Indicators for Setting- up a peer-to-peer and client/server network Indicators Poor (70- 74) Fair (75-79) Good (80-84) Very Good (85-89) Excellent (90-100) Total (score x %) Safety Procedures (15%) -Applied / manifested safety precautions while working Adherence to the Procedures (30%) -Followed the procedures systematically Workmanship (15%) -Organized materials and tools while accomplishing the task and has time management Quality of Service (40%) -Had set-up a fully functional peer-to- peer and client/server network. Grand Total
  • 155. 141 Network Security As a future Computer Technician you need to understand computer and network security. Failure to implement proper security procedures can affect users, computers, and the general public. Private information, company secrets, financial data, computer equipment, and items about national security are placed at risk if proper security procedures are not followed. The Importance of Security in Computer System and Networks Computer and network security help keep data and equipment safe by giving only the appropriate people access. Everyone in an organization should give high priority to security, because everyone can be affected by a lapse in security. Theft, loss, network intrusion, and physical damage are some of the ways a network or computer can be harmed. Damage or loss of equipment can mean a loss of productivity. Repairing and replacing equipment can cost the company time and money. Unauthorized use of a network can expose confidential information and reduce network resources. An attack that intentionally degrades the performance of a computer or network can also harm an organization’s production. Poorly implemented security measures that allow unauthorized access to wireless network devices demonstrate that physical connectivity is not necessary for security breaches by intruders. A technician’s primary responsibilities include data and network security. A customer or an organization may depend on you to ensure that their data and computer equipment are secure. You will perform tasks that are more sensitive than those assigned to the average employee. You may have to repair, adjust, and install equipment. You need to know how to configure settings to keep the network secure, but still keep it available to those who need to access it. You will ensure that software patches and updates are applied, antivirus software is installed, and antispyware software is used. You may also be asked to instruct users on how to maintain good security practices with computer equipment.
  • 156. 142 Security Attacks To successfully protect computers and the network, a technician must understand both of the following types of threats to computer security:  Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.  Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information. Threats to security can come from inside or outside an organization, and the level of potential damage can vary greatly. Potential threats include the following:  Internal: Employees who have access to data, equipment, and the network. Internal attacks can be characterized as follows:  Malicious threats are when an employee intends to cause damage.  Accidental threats are when the user damages data or equipment unintentionally.  External: Users outside an organization who do not have authorized access to the network or resources. External attacks can be characterized as follows:  Unstructured attacks, which use available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize.  Structured attacks, which use code to access operating systems and software. Physical loss or damage to equipment can be expensive, and data loss can be detrimental to your business and reputation. Threats against data are constantly changing as attackers find new ways to gain entry and commit their crimes. Viruses, Worms, and Trojan Horses Computer viruses are created with malicious intent and sent by attackers. A virus is attached to small pieces of computer code, software, or document. The virus executes when the software is run on a computer. If the virus spreads to other computers, those computers could continue to spread the virus. A virus is transferred to another computer through e-mail, file transfers, and instant messaging. The virus hides by attaching itself to a file on the computer. When the file is accessed, the virus executes and infects the computer. A virus has the potential to corrupt or even delete files on your
  • 157. 143 computer, use your e-mail to spread itself to other computers, or even erase your hard drive. Some viruses can be exceptionally dangerous. The most damaging type of virus is used to record keystrokes. Attackers can use these viruses to harvest sensitive information, such as passwords and credit card numbers. Viruses may even alter or destroy information on a computer. Stealth viruses can infect a computer and lay dormant until summoned by the attacker. A worm is a self-replicating program that is harmful to networks. A worm uses the network to duplicate its code to the hosts on a network, often without any user intervention. It is different from a virus because a worm does not need to attach to a program to infect a host. Even if the worm does not damage data or applications on the hosts it infects, it harms networks because it consumes bandwidth. A Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does another. Trojans often are disguised as useful software. The Trojan program can reproduce or replicate like a virus and spread to other computers. Computer data damage and production loss could be significant. A technician may be needed to perform the repairs, and employees may lose or have to replace data. An infected computer could be sending critical data to competitors while at the same time infecting other computers on the network. Security Procedures You should use a security plan to determine what will be done in a critical situation. Security plan policies should be constantly updated to reflect the latest threats to a network. A security plan with clear security procedures is the basis for a technician to follow. Security plans should be reviewed each year. Part of the process of ensuring security is conducting tests to determine areas where security is weak. Testing should be done on a regular basis. New threats are released daily. Regular testing provides details of any possible weaknesses in the current security plan that should be addressed. A network has multiple layers of security, including physical, wireless, and data. Each layer is subject to
  • 158. 144 security attacks. The technician needs to understand how to implement security procedures to protect equipment and data. Virus protection software, known as antivirus software, is software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a computer. Antivirus software becomes outdated quickly, however. The technician is responsible for applying the most recent updates, patches, and virus definitions as part of a regular maintenance schedule. Many organizations establish a written security policy stating that employees are not permitted to install any software that is not provided by the company. Organizations also make employees aware of the dangers of opening e-mail attachments that may contain a virus or worm. Data Encryption Encrypting data involves using codes and ciphers. Data encryption can help prevent attackers from monitoring or recording traffic between resources and computers. It may not be possible to decipher captured data in Source: www.computerflu.com Figure 87. Most Commonly Known Anti Virus Software
  • 159. 145 time to make any use of it. A security alert may inform you that you are using an encrypted connection. A virtual private network (VPN) is an encryption system that protects data as though it resides on a private network. The data actually travels over the Internet or another unsecured public network. Port Protection Every communication using TCP/IP is associated with a port number. HTTPS, for instance, by default uses port 443. A firewall is a way of protecting a computer from intrusion through the ports. With port protection, the user can control the type of data sent to a computer by selecting which ports will be open and which will be secured. Data being transported on a network is called traffic. How to Enable Firewall for Windows XP? The proceeding section provides the procedures for enabling windows XP firewall: 1. Click Start Button then choose Control Panel. 2. Click the "Network and Internet Connections" option. Figure 88. Control Panel Figure 89. Control Panel Window
  • 160. 146 3. Then click the "Network Connections" option. 4. Double click the icon labeled "Local Area Connection". The icon may have a number after it, for example "Local Area Connection 5". Click on Properties button. 5. On the "Advanced" tab, select "Protect my computer and network by limiting or preventing access to this computer from the Internet". Figure 90. Network and Internet Connections Figure 91. Local Area Network Connection Properties Window Properties Button
  • 161. 147 6. Click Settings, then on the ICMP tab select "Allow Incoming echo request". Enabling Windows 7 Firewall 1. Open Windows Firewall by clicking the Start button , and then clicking Control Panel. In the search box, type firewall, and then click Windows Firewall. Figure 92. Local Area Network Connection Advance Tab Figure 93. ICMP Tab Figure 94. Windows 7 Control Panel
  • 162. 148 2. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. Turn Windows Firewall on or off link in Windows Firewall. 3. Click Turn on Windows Firewall under each network location that you want to help protect, and then click OK. If you want the firewall to prevent all programs from communicating, including programs that you have previously allowed to communicate through the firewall, select the Block all incoming connections, including those in the list of allowed programs check box. Wireless Security Techniques Traffic flows through radio waves in wireless networks, so it is easy for attackers to monitor and attack data without having to connect to a network physically. Attackers gain access to a network by being within range of an unprotected wireless network. A technician needs to know how to configure access points and wireless network interface cards (WNIC) to an appropriate level of security. When installing wireless services, you should apply the following wireless security techniques immediately to prevent unwanted access to the network:  Wired Equivalent Privacy (WEP) was the first-generation security standard for wireless network. Attackers quickly discovered that 64-bit WEP encryption was easy to break. Monitoring programs could detect the encryption keys used to encode the messages. After the keys were obtained, messages could be easily decoded. In an attempt to overcome this weakness, most users employ a 128-bit key for WEP.  Change the default administration password.  Disable the broadcasting of the Service Set Identifier (SSID) to hide it from other users.  Use MAC filtering to protect the network from other users.  Change the default values of the SSID by entering the setup program for the access point and renaming the SSID.  Update to the latest available firmware.  Install or activate a firewall, and adjust the settings to eliminate all traffic except the desired network settings.  Update to the latest available firmware.
  • 163. 149  Install or activate a firewall, and adjust the settings to eliminate all traffic except the desired network settings. An attacker can access data as it travels over the radio signal. However, you can use a wireless encryption system to encode data and thereby prevent unwanted capture and use of the data. Both ends of every link must use the same encryption standard. The following list describes the different levels of wireless security, from most secure to least secure:  Lightweight Extensible Authentication Protocol (LEAP): Also called EAP-Cisco, LEAP is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA. LEAP is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux.  Wi-Fi Protected Access (WPA): An improved version of WEP. It was created as a temporary solution until 802.11i (a security layer for wireless systems) was fully implemented. Now that 802.11i has been ratified, WPA2 has been released. It covers the entire 802.11i standard.  WEP 128: An enhanced encryption protocol combining a 104-bit key and a 24-bit initialization vector.  WEP 64: The first-generation security standard for wireless network. It could be exploited because of an encryption key that was vulnerable to decoding.  No security: Although you can elect to implement no security whatsoever, you leave your wireless network completely vulnerable to attack. In addition, Wireless Transport Layer Security (WTLS) is a security layer used in mobile devices that employ the Wireless Applications Protocol (WAP). Mobile devices do not have a great deal of spare bandwidth to devote to security protocols. WTLS was designed to provide security for WAP devices in a bandwidth-efficient manner. To manually create a network profile using WEP shared key authentication: 1. Open Network and Sharing Center by clicking the Start button , and then clicking Control Panel. In the search box, type network, and then click Network and Sharing Center. 2. Click Set up a new connection or network.
  • 164. 150 3. Click Manually connect to a wireless network, and then click Next. 4. On the Enter information for the wireless network you want to add page, under Security type, select WEP. 5. Complete the rest of the page, and then click Next. 6. Click Change connection settings. 7. Click the Security tab, and then, under Security type, click Shared. 8. Click OK, and then click Close. Short Quiz Test I. Modified true or false Directions: Write SECURITY if the underlined word on the subsequent statement makes it true and VIRUS if it is makes the statement a false one then write the correct term/word to correct it. (2 points each). Write your answer in a separate sheet of paper. 1. Computer and network security help keep data and equipment safe. 2. A technician’s secondary responsibilities include data and network security. 3. Threats to security can come from inside and outside the organization. 4. Computer viruses are created and sent by attackers who have malicious intent. 5. A virus is transferred to another computer through e-mail, file transfer and instant messaging. Test II. Matching Type Directions: Match column A with column B in order to identify the term / word being described. A B 1. when an employee intends to cause damage 2. when user damages data or equipment unintentionally 3. attached to small pieces of computer code, software and documents 4. a self-replicating program that is harmful to network 5. it is technically a worm a. Accidental threats b. Antivirus software c. Data encryption d. Firewall e. Malicious threats f. Traffic g. Trojan horse h. Virus i. VPN j. WPA
  • 165. 151 6. software designed to detect, disable and remove viruses 7. it involves using codes and ciphers 8. a way of protecting a computer from intrusion through the ports 9. an encryption system that protects data 10. data being transported on a network k. WEP l. Worm Test IV. Acrostic Direction: Give the meaning of the acronyms given below: 1. VPN- ____________________________________________ 2. SSID- ___________________________________________ 3. WEP- ___________________________________________ 4. WPA- ___________________________________________ 5. WTLS- __________________________________________ Research Firewalls Directions: In this activity, you will use the Internet, newspaper, or a local store to gather information about hardware and software firewalls. 1. Using the Internet, research two different hardware firewalls. Based on your research, complete the table below. 2. Which hardware firewall would you purchase? List reasons for your choice. 3. Using the Internet, research two different software firewalls. Based on your research, complete the table below. Company/Hardware Name Website URL Cost Subscription Length (Month/Year/Lifetime) Hardware Features Company/Software Name Website URL Cost Subscription Length (Month/Year/Lifetime) Software Features
  • 166. 152 4. Which software firewall would you purchase? List reasons for your choice. Configure Windows XP Firewall Directions: In this hands-on activity you will explore the Windows XP Firewall and configure some advanced settings. There are essential questions that you need to answer while performing the activity. Step 1  Navigate to the Windows XP Firewall:  Start > Control Panel > Security Center  The Firewall indicator shows the status of the firewall. The normal setting is “ON”.  Access the controller for the firewall by clicking Windows Firewall at the bottom of the window. Figure 96. Windows Security Center
  • 167. 153 Step 2 Essential Questions: In the space below, state why turning off the Windows Firewall is not advised. Step 3  From the Windows Firewall control menu select the Exceptions tab. Programs and services that Windows Firewall is not blocking will be listed with a checkmark. Figure 97. Windows Firewall General Tab Window
  • 168. 154  You can add applications to this list. This may be necessary if your customer has an application that requires outside communications but for some reason the Windows Firewall cannot perform the configuration automatically. You must be logged on to this computer as an administrator to complete this procedure. Essential Question: Creating too many exceptions in your Programs and Services file can have negative consequences. Describe a negative consequence of having too many exceptions. _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ Step 4  From the Windows Firewall control menu select the Advanced tab to view the Network Connection Settings. Network Connection Settings displays the different connections configured for your computer. Figure 98. Windows Firewall Exceptions Tab Window
  • 169. 155  Click the Settings button in the Network Connection Settings area. The Advanced Settings window has two tabs: Services and ICMP. Click the Services tab. Essential Question: In the space below, list the services that are available. ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ Step 5  There are many applications that users do not normally see that also need to get through the Windows Firewall to access your computer. These are the network level commands that direct traffic on the network and the Internet.  Under the ICMP heading, click the Settings button. You will see the menu where ICMP exceptions are configured. Figure 99. Windows Firewall Advance Tab Window
  • 170. 156  In the example here, allowing incoming echo requests is what allows network users to “ping” your computer to determine if it is present on the network and how fast information travels to and from it. Essential Question: In the space below, list the requests for information that your computer will respond to. _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ Figure 100. ICMP Settings Window
  • 171. 157 File and Printer Sharing File Sharing is sharing of or offering access to digital information or resources, including documents, multimedia (audio/video), graphics, computer programs, images and e-books. It is the private or public distribution of data or resources in a network with different levels of sharing privileges. File sharing can be done using several methods. The most common techniques include the following:  Removable storage devices  Centralized file hosting server installations on networks  World Wide Web-oriented hyperlinked documents  Distributed peer-to-peer networks Sharing Resources and Accessing Shared Resources 1. Open My Computer, double-click the C: drive, and create a new folder on the C: drive. Name it Shared. Right-click the Shared folder and select Properties. 2. In the Shared Properties dialog box, select the Sharing tab.  Notice that the Select the Share This Folder button.  Type the Share Name. Click Apply and the computer you are linked to should be able to view your Shared folder. 3. Right-click My Network Places, which should be located on your desktop. Select Properties. 4. Right-click your connection (look for a name like Local Area Connection) and again select Properties. 5. In your Local Area Connection Properties dialog box, select File and Print Sharing for Microsoft Networks and click OK. If you don’t see an option for File and Print Sharing, click Install and select a service and then click Add. Now select the File and Print Sharing option. Figure 101. My Computer
  • 172. 158 6. Open My Network Places- double-click the icon- and select the Entire Network option under Other Places at the left of the window. In the main (right-hand) pane, you should see one or more options. Double-click the Microsoft Windows Network icon. Local Disk (C:PC 1) Figure 102. Shared Document Properties Window Figure 103. Microsoft Windows Network Window
  • 173. 159 7. You’re now at the main network screen, where you should see what’s called a workgroup. A workgroup is a basic group of computers connected to the same Ethernet network. Double-click the workgroup to see all the computers connected to your Ethernet network. At this point, you can access any of the other computers and see what folders they have shared. If you don’t see any computer but your own, just wait a few minutes and refresh your screen. If you don’t see other computers, then it’s time to troubleshoot the network problems. Printer Sharing One of the primary reasons that networks were developed was to allow groups of computer users to share peripheral devices such as printer. Sharing a single printer among a group of users costs much less than buying a printer for each computer. Low-cost printers usually require a separate print server to allow network connectivity because these printers do not have built-in network interfaces. The computer that is connected to the printer can serve as the print server. Most personal computer operating systems have built-in printer sharing capability. Figure 104. Shared Documents Window
  • 174. 160 Setting up printer sharing is simple with Windows XP. The following steps enable a computer to share a printer: Step 1. Choose Start > Printers and Faxes. Step 2. Right-click the printer, and choose Properties. Step 3. Click the Sharing tab. Step 4. Click the Share this printer radio button. Step 5. Keep or change the share name. Step 6. Click Apply. All the computers that use the shared printer must have the correct drivers installed. Drivers for other operating systems can be installed on the print server. To connect to the printer from another computer on the network, choose Start > Printers and Faxes > Add Printer. The Add Printer Wizard appears. Follow the steps using the wizard.
  • 175. 161 Essay Writing Directions: Give an explanation on how you understand the subject. Provide at least 5 sentence response per item. 1. Cite the importance of file sharing and give an example scenario where its worth was proven. ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ 2. Cite the advantages and disadvantages of printer sharing. Advantages Disadvantages Example Situation Example Situation Read and Examine Directions: Use other reference to understand more about printer sharing. Present your answer to the class. 1. What is a print server? 2. What are the functions of a print server? 3. What are the different types of print servers? Describe each.
  • 176. 162 Share a Folder, Share a Printer, and Set Share Permissions Directions: In this activity, you will create and share a folder, share a printer, and set permissions for the shares. You will be given 30 minutes to complete the task. You will be rated based on the performance criteria provided below. Recommended Equipment  Two computers running Windows XP Professional that are directly connected to each other or through a switch or hub.  A printer installed on one of the two computers. Procedures: Step 1  Choose My Computer > Tools > Folder Options  Click the View tab.  Uncheck the “Use Simple File Sharing (Recommended)” checkbox, and then click OK. Step 2  Right-click the desktop, and then choose New > Folder.  Type Example, and then press the Return key. Figure 105. Folder Options Window
  • 177. 163  Open WordPad. Type “This is an example document”.  Save the file in the “Example” folder with the name “Brief.doc”, and then close WordPad. Step 3  Right-click the Example folder, and then choose Sharing and Security.  Click the Share this folder radio button, and then click OK.  What is the icon of the “Example” folder?  On the computer with the shared folder, right-click My Computer, and then click the Computer Name tab. Step 4  On the other computer, choose Start > Run…  Type computernameExample, where computer name is the name of the computer with the “Example” folder, and then press the Enter key.  Open the “Brief.doc” file.  Delete the text in the “Brief.doc” file, and then choose File > Save. Figure 106. Sharing Tab Window
  • 178. 164  Click OK. Close WordPad, and then choose NO when prompted to save changes to the file. Step 5  Return to the computer with the shared folder.  Right-click Example folder > Sharing and Security, and then click Permissions. Step 6  Open the Control Panel on the computer with the attached printer.  Choose Printers and Other Hardware > Printers and Faxes.  Right-click the icon of the installed printer, and then choose Sharing….  Click the Share this printer radio button, and then click OK. Step 7  Return to the computer that is not directly connected to a printer.  Open the Control Panel. Choose Printers and Other Hardware > Printers and Faxes.  Choose File > Add Printer on the screen below. Figure 107. Sharing Printer Tab Window
  • 179. 165  The “Add Printer Wizard” window appears.  Click Next.  The Local or Network Printer of the Add Printer Wizard window appears. Click the A network printer, or a printer attached to another computer radio button, and then click Next. Figure 108. Printer and Faxes Window Figure 109. Add Printer Wizard Window
  • 180. 166  The “Specify a Printer” window appears.  Click the Connect to this printer radio button, and then click Next.  The Browse for a Printer window appears. Figure 110. Local or Network Printer Option Window Figure 111. Specify a Printer Window
  • 181. 167  Expand “Shared printers”.  Choose the printer from the list, and then click Next.  The “Default Printer” screen of the “Add Printer Wizard” appears. Click Next.  The “Completing the Add Printer Wizard” window appears. Figure 112. Browse for Printer Window Figure 113. Default Printer Screen
  • 182. 168  Click Finish. Step 8  Choose Start > Printers and Faxes.  Right-click the printer you installed, and then choose Properties.  The “Printer Properties” window appears.  Choose the General Tab, and then click Print Test Page. Figure 114. Completing the Add Printer Wizard Screen Figure 115. Printers and Faxes General Tab
  • 183. 169  Click OK in the confirmation dialog box, and then click OK to close the printer properties window. Step 9  To test the functionality of file and printer sharing, you must be able to print a document or try the sample print feature of a printer. Performance Rubrics for Sharing Files and Printer CRITERIA Excellent 4 Good 3 Fair 2 Poor 1 Safety Procedures (15%) -Applied/Observed safety precautions while working Adherence to the Procedures (30%) -Followed the procedures systematically Workmanship (15%) -Had organized materials and tools while accomplishing the task and has time management Functionality (40%) -Had set up a functional file and printer sharing system and was able to come up with a printed hard copy through it
  • 184. 170 Lesson 3. Inspect and Test Configured Computer System and Network In general, testing is finding out how well something works. For human beings, testing tells what level of knowledge or skill has been acquired. In computer hardware and software development, testing is used at key checkpoints in the overall process to determine whether objectives are being met. For example, in software development, product objectives are sometimes tested by product user representatives. When the design is complete, coding follows and when finished, this is then tested at the unit or module level by each programmer; at the component level by the group of programmers involved; and at the system level when all components are combined together. At early or late stages, a product or service may also be tested for usability. After having completed the configuration phase, you are now ready to face final chapter of configuration which is inspecting and testing configured computer system and networks. The lessons in this segment will focus on the guidelines and methods on inspecting and testing of computer system and networks. So at the end of this lesson you should be able to:  follow OHS procedures in testing configured computer system and networks;  testing configured computer system and networks; and  accomplish a technical report.
  • 185. 171 Safety Precautions Occupational Health and Safety (OHS) Policy – An Information and Communication technology (ICT) student should know how to behave when working in the computer laboratory, and to accomplish task safely. Safety practices should be learned early and always adheres in working with any electrical and electronic device, including personal computers and its peripherals. This is for your protection as well as to the people working with you, and for the devices that you are using. Occupational safety and health (OSH) is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. Health and safety procedure is the responsibility of all persons in the computer and technology industries. You must identify the hazards where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk that it presents. Occupational Health and Safety standards Each student has a responsibility to their colleagues and their organization to report and act upon any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present in their work environment. Procedure 1. Identify the hazard. 2. Clear the area close to the hazard. 3. Partition the hazard off or clearly identify the area to protect other people from harm. 4. If the hazard can be easily and safely cleared, then do so. If not… 5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance. 6. After clearing the hazard, fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards.
  • 186. 172 All hazards must be reported using an Accidental Report form. This enables us to track the kinds of hazards we have in our workplace, and take action when necessary to make it safer for all student and clients. Accident Reports Forms are used to give specific details with regards to accidents that happened in the laboratory during experiments. Accident reports contain the following details:  Name of the person injured  Date and time of the accident  Type of injury  First aid given  Action taken to prevent further accidents Accident Report Sample Form Form No: Accident Report Form Date: Rm. No: Name: Yr/Sec: Type of Injury Cause of Injury Remedy
  • 187. 173 Hazardous substances If the workplace hazard appears to be dangerous to staff and clients and professional assistance is required: A. Call the supervisor or manager and advise them of the problem and the urgency of the matter. B. Depending on the risk, an evacuation may be called. C. Follow the evacuation procedure. D. The supervisor or manager will call in the fire brigade or specialized personnel who will deal with the spill. Fire Exits All fire exits should be kept clear from any obstacles. All students have a responsibility to make sure that chairs, empty boxes or any other type of obstacle are not placed in or near fire exit doorways. All corridors also need to have equipment stored on one side only to ensure that in the event of an emergency there is a clear exit. Fire Safety Procedure Each work area has a designated fire warden, who in the event of a fire will take charge. They are recognized by the use of the red hard hat they wear. If you find the fire:  Assess the danger prior to doing anything.  If it is safe, assist anyone to move away from the vicinity of the fire.  If it is possible, close the door to the fire area.  Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.  Break the glass section of the fire alert call point.  Call to the switch; ensure you know where the fire is, any other details that may be of assistance to the fire brigade. Details could be size of the fire, cause or type of fire, any people hurt or trapped, has anyone tried to put it out.  If it is safe to do so, put out the fire with the correct extinguisher or fire hose.
  • 188. 174 If the designated fire officer is not present, someone quickly needs to take responsibility and: 1. Locate the source of the fire. 2. Locate any people. 3. Remove all people from the building. 4. Once outside, do a head count. 5. Notify the authorities. Personal Safety While Working with PCs Computer equipment can be dangerous, and you or others can be injured or even killed if you don’t follow proper safety guidelines when working along with PCs. The following are some precautionary measures to take before working with any computer equipment:  Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or seriously injured in an electrical accident.  Do not work on components that are plugged into their power source.  Do not remove expansion cards from a computer when it is turned on.  Remove jewelries when working inside any computer-related equipment.  Be sure not to pour water on electronic components. Guidelines for Testing Configured Computer System and Network Testing Your Computer Network You've set up all your network switches, plugged in all the cables, and configured all your computers. One task remains before you can declare your network is finished: You must verify that the network works as expected. Here are a few simple tests you can conduct to make sure your network is functional:  Check the physical connections. Check that the Link light — the little red or green light next to the RJ-45 port — is lit on every computer. You must check this light both on the computer itself and on the switch or router the computer is plugged into. If this light is not on, you have a connection problem — most likely a bad cable.
  • 189. 175  Verify that you can log in. When you're sure the physical connections are good, you should attempt to log in to each of your network computers using a valid domain user account.  Check the network configuration. Click the Start button, type cmd and press Enter. Then, enter the command ipconfig /all and press Enter. This command will spit out numerous lines of information. The line you're looking for should resemble this: IPv4 Address. . . . . . . . . . . : 192.168.1.125 (Preferred) If this part of the output does not show a valid IP address, you need to check that your IP configuration is set correctly and that your DHCP server is working.  Verify that the computers can ping each other. Another basic test you should perform is to use the ping command from a command prompt to make sure that the computers on your network can contact one another. Do several ping tests. First, make sure that TCP/IP is up and running by having the computer try to ping itself. Open a command prompt and type ping local host. The output from this command will indicate whether or not the ping was successful. Next, try to ping your servers by name. For example, if your file server is named FileServer01, use the command ping FileServer01.
  • 190. 176 Writing a Technical Report on Test Conducted Technical Report is any document that records the procedure adopted and results obtained from a scientific or technical activity or investigation. Use the following format for a technical report for your recently conducted test. TECHNICAL REPORT ON TEST CONDUCTED Name of Technician:________________________________________ Date of Inspection: __________________ Time: _________________ Device Tested: Specification: Diagnosis: Action Taken: Remarks:
  • 191. 177 Testing the Wireless NIC Directions: In this activity, you will check the status of your wireless connection, investigate the availability of wireless networks, and test connectivity. After accomplishing the task you need to write a technical report regarding the test conducted. Recommended Equipment  A computer with Windows XP Professional installed  A wireless NIC installed  An Ethernet NIC installed  Linksys WRT300N Wireless Router  Internet connectivity Step 1  Disconnect the Ethernet patch cable from your computer.  A red “X” appears over the “Local Area Connection” icon.  Hover over the “Wireless Network Connection” icon in the tray.  Open a command window.  Ping 127.0.0.1. Figure 116. Local Area Connection- A Network Cable is Unplugged Figure 117. Wireless Network Connection Icon in System Tray
  • 192. 178  Use the ipconfig command.  Get IP address of the default gateway. Figure 118. Ping 127.0.0.1 Figure 119. Ipconfig window
  • 193. 179  Ping the default gateway.  A successful ping indicates that there is a connection between the computer and the default gateway. Step 2  Open a web browser.  Type www.google.com in the “Address” field, and then press Return. Step 3  Open the Network Connections window. Figure 120. Ping the Default Gateway
  • 194. 180  Right-click the wireless connection and choose Properties.  Click the Wireless Networks tab.  Click the View Wireless Networks button. Figure 121. Network Connections Window Figure 122. Wireless Networks Tab
  • 195. 181 TECHNICAL REPORT ON TEST CONDUCTED Name of Technician:_______________________________________ Date of Inspection: __________________ Time: _______________ Device Tested: Specification: Diagnosis: Action Taken: Remarks:
  • 196. 182 A. Paper and Pencil Test General Directions: Read the items very carefully. Write your answer in a clean sheet of paper. Test I. True or False Directions: Write TRUE if the proceeding statement is correct and FALSE if otherwise. _______1. A safe workplace is clean, organized and well-lit. _______2. One must unplug the power from the source before opening a case and performing services. _______3. It is a best practice that a fire extinguisher and first aid kit must be available in the workplace. _______4. You are allowed to open the power supply or a monitor. _______5. You can bring food and drinks inside the laboratory. _______6.The key to a well-tuned computer system is proper configuration. _______7. Boot log stores all information from the boot process. _______8. Registry is a collection of database of configuration in Windows operating system. _______9. The shortcut of Microsoft Configuration is ipconfig. _______10. Configuration is the way a system is set up. Test II. Multiple Choice Direction: Write the letter of the correct answer. 1. What boot configuration utility allows setting the programs that will run at startup? a. Ipconfig c. msconfig b. regedit d. dxdiag 2. What application allows you to edit the registry? a. Ipconfig c. msconfig b. regedit d. dxdiag 3. Which of the following enables you to test sound and graphics output? a. Ipconfig c. msconfig b. regedit d. dxdiag 4. Which of the following is an applet that controls the look of windows? a. Appearance and themes c. Performance and Maintenance b. Network and Internet d. Sounds, Speech and Audio
  • 197. 183 5. Which of the following applets does not belong to Performance and maintenance category? a. Administrative tool c. Power Options b. Automatic Updates d. System 6. Which of the following wizard is used to configure windows for vision, hearing and mobility needs? a. Accessibility Option c. Sounds, speech and audio b. Security Center d. User Accounts 7. A tab in direct X Diagnostic tool that displays your current audio settings. a. Input c. Sound b. Music d. System 8. Which of the following is the most commonly used networking cable category? a. Cat3 c. Cat 5 and 5e b. Cat 5 d. Cat 6 9. What do you call a copper-cored cable surrounded by a heavy shielding? a. coaxial cable c. optical fiber b. fiber optics d. twisted pair 10.What Ethernet cable is used to connect two devices directly? a. Cross-Over c. both A and B b. Straight-through d. None of the options 11.Which of the following is a number used to identify a device on a network? a. Default gateway c. IP address b. DNS Server d. subnet mask 12.In which of the following IP address does 192.168.1.105 belong? a. Class A c. Class C e. Class E b. Class B d. Class D 13.What command is used to test the ability of the source computer to reach a specified destination computer? a. Ipconfig c. Ping b. Msconfig d. Regedit 14.What do you call an approach to computer networking where all computers show equivalent responsibility for processing data? a. Client server c. Peer-to-client b. Peer to peer d. None of the options 15.Which of the following is an example of Class A subnet mask? a. 255.0.0.0. c. 255.255.255.0 b. 255.255.0.0. d. 255.255.255.255
  • 198. 184 Test III. Matching Type Direction: Match Column A with Column B. A B 1. Copper cabling used for telephone communication 2. Standard Ethernet cable 3. Cable that has a very thin core 4. Cable that has a thicker core 5. Tool used for crimping RJ45 6. Connector for Cat 5e cable 7. Set of rules 8. Indicates the network portion of an IP address 9. Command used find out the ip address 10.Glass or plastic conductor a. Crimping tool b. Cross- over c. Fiber- optic d. Ipconfig e. Multi- mode f. Ping g. Protocol h. RJ45 i. Single- mode j. Straight-through k. Subnet mask l. Twisted pair Test IV. ACRONYMS Direction: Give the complete meaning of the following acronyms. 1. UTP 2. STP 3. IP 4. TCP /IP 5. HTTP 6. FTP 7. SSH 8. IMAP 9. SMTP 10.DHCP 11.DNS 12.TTL 13.LAN 14.VPN 15.NIC
  • 199. 185 B. Skills Checklist Configuration Skills Directions: Listed below are the most important skills one must have in order to configure computer systems and networks. The matrix lists the skills expected you to master. Check the appropriate column which describes the level of your confidence with the given skills. Configuration Skills I can do it confidently 3 I can do it but with assistance 2 I am not confident 1 1. I can use the different tools for configuration. 2. I can inspect networking devices and connectors. 3. I can create a cross- over and straight- through Ethernet cable. 4. I can test the functionality of an Ethernet cable. 5. I can assign and configure IP address. 6. I can execute the ipconfig command properly. 7. I can manage to create a peer-to-peer networking. 8. I can configure Network Interface Card using DHCP. 9. I can enable firewall 10.I can configure file and printer sharing. TOTAL GRAND TOTAL Add all the scores to get the grand total and then divide it by the total number of items. Refer to the verbal interpretation on the next page to determine your initial configuration ability.
  • 200. 186 Numerical and Verbal interpretation Numerical Value Verbal Interpretation 2.51 – 3.00 Confident 1.76- 2.50 Confident but needs assistance 1.00 – 1.75 Not yet Confident
  • 201. 187 MODULE 4: MAINTAINING COMPUTER AND NETWORK SYSTEMS Content Standard Performance Standard The learner demonstrates understanding of the underlying concepts and principles on configuring computer systems and networks. The learner independently demonstrates skills in configuring computer systems and networks as prescribed by TESDA Training Regulations. Number of Sessions (Time Allotment):60 HOURS Computer Hardware Servicing: This course provides an excellent introduction to the Information and Communications Technology (ICT) industry and in-depth exposure to personal computers, hardware, and operating systems in accordance to local industry requirements and standards. You will learn the functionality of various hardware and software components and best practices in maintenance and safety issues. In this module, topics will be introduced progressively, for easy understanding. After carefully answering the pre- assessment, reading all the lessons, answering all the guide questions, performing all the activities, showing pieces of evidences of learning and answering the summative test, you will have a considerable knowledge and skills in installing computer systems and networks essential to be successful in computer hardware servicing as one of the career options in ICT.
  • 202. 188 There will be three (3) major topics that you will encounter: (1) will be maintaining computer systems; (2) maintaining network systems; (3) inspecting and testing configured/repaired computer systems and networks. The three major topics contains sub-topics which the ultimate goal to teach you how to maintain computer and network systems. This module contains what to KNOW, what to PROCESS, what to REFLECT and UNDERSTAND as well as what to TRANSFER. The competencies for this module are: LO 1. Plan and prepare for the maintenance of computer system and networks  Plan on how to maintain computer systems and networks  Identify tools in maintaining computer systems and networks  Inspect testing equipment and devices  Check PC specifications  Verify network functions and specifications LO 2. Maintain computer systems  Identify faulty computer systems  Test normal functions of computer systems  Perform repair and replacement of faulty computer systems  Adhere to the recommended schedule and techniques in maintaining and cleaning computer systems  Respond to sudden breakdowns of computer systems in accordance with established procedures LO 3. Maintain network systems  Follow OHS procedures in maintaining network systems  Identify procedures in maintaining network systems  Check or run the diagnostic software  Adhere to the recommended schedule and techniques in maintaining and cleaning network systems  Respond to sudden breakdowns of network systems in accordance to established procedures  Run the burn-in test on computer systems
  • 203. 189 LO 4. Inspect and test configured/repaired computer systems and networks  Maintain the computer systems and networks to ensure safe operations  Run or conduct computer-to-computer communications  Connect computer systems to the internet  Check computer system and network to ensure safe operations  Run the burn-in test on computer systems  Conduct final inspection on the tests undertaken  Prepare technical reports that comply with the job requirements In order to master the above listed competencies, you must be knowledgeable of the topics under what to KNOW, perform activities required under what to PROCESS, accomplish additional meaningful tasks under what to REFLECT and UNDERSTAND and finally show some pieces of evidence of your learning by transferring what you have learned in a different context under what to TRANSFER.
  • 204. 190 You will be challenged to dig deeper into your prior knowledge and previous experiences about computer hardware servicing. SKILLS TEST Directions: Listed below are some of the most important skills that you must master in order to render quality service when you enter the industry of Computer Hardware Servicing. Read the skills carefully. Write “YES” if you can do the skill and “NO” if not. Feel free to answer each skill. Write your answers in your notebook. I can… YES NO plan and prepare work to ensure occupational health and safety (OHS) policies and procedures are followed. obtain materials, tools, equipment and testing devices needed to conform with job requirements. interpret work instructions according to job requirements. obtain computer components/ devices/ systems and determine its location prior to installation. install equipment / devices / systems in accordance to job requirements. check / test devices / systems and / or installations to determine the conformity to job requirements. check computer systems and networks for configuration in accordance with specifications and requirements. diagnose fault or problem in the computer systems and networks in line with standard operating procedures (SOP). configure the identified systems and networks based on specifications and job requirements. inspect and test configured computer systems and networks in conformity with manufacturer's instructions / manual. correct / adjust components or parts of computer systems and networks in accordance with job requirements.
  • 205. 191 test computer systems and networks to ensure safe operation. perform scheduled / periodic maintenance in accordance with manufacturer's requirements. make needed repairs / replacements in accordance with established procedures, when necessary. clean and clear worksite of all surplus/excess materials in accordance with company SOP. Lesson 1. Procedures in Planning and Conducting Maintenance Preventive Maintenance Preventive maintenance can be described as maintenance of equipment or systems before fault occurs. It can be divided into two subgroups: Planned Maintenance and Conditioned-Based Maintenance. Planned Maintenance (PM) is any variety of scheduled maintenance to an object or item of equipment. Specifically, PM is a scheduled service visit carried out by a competent and suitable agent, to ensure that an item of equipment is operating correctly to avoid any unscheduled breakdown and downtime of an equipment. Condition Based Maintenance (CBM) is a maintenance strategy that uses the actual condition of the asset to decide what maintenance needs to be done. CBM dictates that maintenance should only be performed when certain indicators show decreasing performance or upcoming failure. Checking a machine for these indicators may include non-invasive measurements, visual inspection, performance data and scheduled tests. Condition data can be gathered at certain intervals, or continuously. The purpose of systematic inspection, detection and correction of existing / future problems is very important to maintain equipment / facilities in satisfactory condition before it may cause major problem. Maintenance, including tests, measurements, adjustments, and parts replacement, performed specifically to prevent faults from occurring. Maintenance is divided into two (2) general type. Preventive maintenance is given for maintaining equipment and facilities in satisfactory operating condition to extend the life of the equipment. Corrective maintenance is task performed to identify, isolate and rectify a fault so that the failed equipment or system can be restored to an operational conditions within the tolerances or limits.
  • 206. 192 Common methods of determining what preventive (or other) failure management policies should be applied are: Original Equipment Manufacturer (OEM) recommendations, requirements of codes and legislation within a jurisdiction, what an "expert" thinks ought to be done, or the maintenance that is already done to similar equipment, and most important measured values and performance indications. Maintenance Procedures In preparing maintenance procedure, you also have to consider designing a systematic plan for both for hardware and software. This saves time, money and frustration and ensures safe conditions to prevent injury to people and damage to computer equipment. Planning Maintenance Procedures for Computer System and Networking: A. Design a systematic maintenance plan for hardware. 1. Design a monitoring, evaluating and updating plan. 2. Place your computer in a well-ventilated area. 3. Schedule the use of computer for its longer life. 4. Move the computer only when it is turned off and unplugged. 5. Treat your computer properly. B. Design a systematic maintenance plan for your software. 1. Backup your files. 2. Install or secure passwords. 3. Delete temporary files. 4. Update anti-virus and spyware. Figure 123. Computer Inspection
  • 207. 193 Design a systematic monitoring, evaluating and updating plan for hardware. Computers have significantly changed the working environment, simplifying and speeding up many tasks across many work areas. However, with these advances are some potential problems and maintenance issues. These guidelines describe how computer technicians, students and computer users can work together to achieve a productive workplace environment. The guidelines reflect current knowledge and best practice for the use of computers so you can achieve maximum efficiency and safety in your workplace. SAMPLE MONITORING PLAN Date: Comp 1 Comp 2 Comp 3 Comp 4 Comp 5 Recommendations Monitor is functional. Printer Cartridges are replaced. Storage devices are functional. Optical Drives are functional. Place your computer in a well-ventilated area.  This will allow proper circulation of air inside the computer unit. Schedule the use of computer for its longer life.  This will help lessen the attacks of viruses and increases the life span of your computer. Figure 124. Computer Laboratory Figure 125.Computer Usage
  • 208. 194 Move the computer only when it is turned off and unplugged.  To avoid damage to the computer unit always turn off and unplugg it when transferring the computer to another location. Treat your computer properly.  This means taking care of your computer. PCs and laptops should be properly turned off. Do systematic maintenance plan for your computer software. Back-up your files  Protecting your files means creating backups, storing your file backups on your hard drive or any removable storage device regularly. Figure 126. Unplugged Power Cable Figure 128.Backup Media Figure 127. Computer care
  • 209. 195 Install or secure passwords.  Installing passwords makes your files more secure. Delete temporary files.  Deleting the temporary files on your computer will enhance its speed and will create more disk space for your files. Update anti-virus and spy ware.  Regularly update your anti-virus for your computer protection against viruses. Figure 129. Installing Passwords Figure 130. Deleting Temporary Files Figure 131.Updating Anti-Virus
  • 210. 196 Diagnoses and Identification of Faulty Computer and Network Systems The following topics will familiarize you with planning and preparing for installation; installing equipment and devices; and conducting test on the installed computer system. Read carefully all the topics and apply the skills you have gained from the lessons provided in this module. A. Preventing Computer Systems Failure Computers, in general, are pretty stable, and you can usually rely on them to not fail you. However. If you develop some basic habits, you can postpone serious computer problems, if not avoiding them entirely. 1. Computer issues. Know that your computer is going to fail. You need to treat your computer as if it were a doomed failure. Always assume that failure is imminent. A fatal error results in data loss, damage to your computer and/or its ability to function, hardware failure, or other serious issues. Signs of imminent failure might include regular poor performance, frequent errors and/or popups, unknown programs being installed, frequent power loss (the computer shuts down automatically frequently), frequent crashes, or certain parts not working. Figure 132. Computer issues
  • 211. 197 2. Dust issues. Preventing failure means making sure your computer is physically clean in its operations. Make sure that there is not too much dust inside, especially on the fans. Dust can reduce performance and cause overheating. 3. RAM issues. Know your computer's specifications and its limits. RAM runs even the PC is running idly. It consumes RAM storages capacity making you difficult to open a program if RAM storage had been consumed. 4. Malware issues. Make sure that your anti-virus software is updated to be able to scan unnecessary files that enter your PC. Do not install programs that you’re not familiar with or if do not fully trust. 5. Hardware issues. When something is not working properly, either diagnose the problem yourself and fix it, to prevent further damage or contact a professional and have them look at it for you. Take advantage of warranties on parts if they fail. Figure 133. Inside the System Unit Figure 134. Random Access Memory Figure 135.Hardware
  • 212. 198 6. Warning issues. If the same error message shows up every time you log in, be sure to investigate it. Although unlikely, these errors could be important. 7. Usage issues. Give your computer a break. Believe it or not, your computer likes rest, too. Leaving it on all of the time wears out hardware, and puts unnecessary wear and tear on the hardware. Giving your computer a break also saves you money (electrical bills). 8. Warranty issues. Always take advantage of warranties. Get a warranty to protect your hardware, so it can be replaced in case of failure. 9. Backup issues. Back-up everything. Run regular backup of your important files to other disks, computers, or an online backup service. Figure 137. Power Off Figure 139. Storage Media Figure 136.Error Messages Figure 138. Warranty Sticker
  • 213. 199 10. Error message issues. If your PC fails to function, diagnose the problem. Write down the necessary info such as error messages or things don’t work properly. If you know how to fix it, do it, to avoid further damage but if not then seek for professional help. Network Problems When you suddenly cannot connect to the Internet, any of several things could be wrong. Use this checklist to find and solve common Internet connection problems. 1. Unplugged Network Cable Unplugged or loose network cables are one of the most common reasons why you might suddenly find yourself unable to connect to the Internet. That's a problem on wireless networks, but on most laptops the wireless-fidelity (Wi-Fi) radio can be inadvertently shut off instead. On home networks, it's also possible that someone unplugged the router. Action: Ensure your wired or wireless network hardware is switched on and plugged in. 2. Website Temporarily Offline What may seem to be a network problem connecting to the Internet is sometimes simply a Web site (or whatever server is on the other end of the connection) being temporarily offline. Action: Before assuming your Internet connection is faulty, try visiting several popular Web sites rather than just one. 3. IP Address Conflicts If your computer and another on the network both have the same IP address, the conflict between them will prevent either from working properly online. Figure 140. Error Messages
  • 214. 200 Action: To resolve an IP conflict, follow these instructions to release and renew your IP address. If your network uses static IP addresses, manually change your IP to a different number. Windows XP Step 1: Click Start > Run. In the Run window, enter “cmd” then click OK. Step 2: On the command prompt, enter “ipconfig/release” then press [Enter]. Step 3: Once the IP address becomes 0.0.0.0, enter “ipconfig/renew” then press [Enter]. 4. Computer Firewall Malfunctions Firewall software running on most computers is intended to prevent unwanted network traffic from disrupting its operation. Unfortunately, these software firewalls can malfunction and start blocking valid Internet traffic. When two software firewalls, such as Windows Firewall plus a third-party
  • 215. 201 product, are installed on the same computer, contention between the two can also incorrectly block traffic. Action: If you have recently installed or upgraded software firewalls on your computer, temporarily disable them to determine whether it may be the cause of Internet connection problems. 5. Outside Wireless Signal Range The performance of Wi-Fi network connections depends on distance between the device and the wireless access point. The farther away a Wi-Fi device is, the slower the local connection generally runs, until it breaks altogether. Wireless signal interference in the area can also limit the effective range of a Wi-Fi connection. Whenever you are unable to reach the access point, you also cannot connect to the Internet, obviously. Action: Use one of the options written below to measure the strength of your wireless signal and try these ideas to expand the range of your Wi-Fi. Ideally, you should place the router at a height in some central location and away from other cordless devices. Make sure that the router is not placed near something metallic (like an almirah or window grills) as that will weaken the wireless signals. Avoid mirrors as they can reflect the wireless signals away from the desired direction. Wireless routers generally ship with omni-directional antennas but you can replace them with more powerful uni-directional antennas and that will keep the signal from getting broadcast in all directions. 6. Wireless Network Configuration Wi-Fi networks with encryption options like WPA or WEP turned on require computers to use matching security keys when connecting. If someone changes the encryption keys or password on the access point, devices that worked before will suddenly be unable to establish sessions and Internet connections. Likewise (though less likely), if the access point settings are changed to require using a specific Wi-Fi channel number, some computers may be unable to discover it. Action: Confirm that the Wi-Fi channel number and encryption keys on your router have not recently changed (check with the network administrator if necessary). When using a hotspot, follow the provider's instructors for signing in carefully.
  • 216. 202 7. Broadband Router or Access Point Malfunctions Home networks that use broadband routers are easier to manage than those without one, but technical glitches with the router can also prevent computers from connecting to the Internet. Router failures are caused by overheating, excessive traffic, or simply a faulty unit. Typical symptoms of a flaky router include computers on the network not being able to obtain IP addresses, or the router console not responding to requests. Action: Check the router's lights and console if possible to ensure it is running and responding properly. Troubleshoot and reset the router if necessary. Change the old router if necessary. 8. Blocked By Your Service Provider Internet Service Providers (ISPs) can choose to block access from your account if you fail to make payment or otherwise violate the provider's Terms of Service. Especially when using paid hotspots that charge by the hour or day, sometimes people forget to keep their subscription updated. Other common reasons an ISP might block your account include exceeding bandwidth caps, sending spam e-mail, and downloading illegal or inappropriate content. Action: Contact your ISP if you suspect your account has been blocked. 9. Computer Glitches Computers suffer from technical glitches or malfunctions. Although relatively uncommon nowadays, a computer's network adapter hardware might suddenly fail due to overheating or age. Failures in the operating system software that control the adapter, on the other hand, can occur frequently especially with computers that are heavily used. Viruses and worms also may disable or block a computer's network interfaces from functioning properly. If using a laptop or other mobile device, transporting it from one location to another can corrupt the state of its network. Action: Check the computer and remove any malware that you will find. On Windows computers, try resetting the network connection. Reboot the computer if necessary. 10. Network Downtime Those using satellite Internet service may notice they canot connect to the Internet during periods of very bad weather. Providers in dense urban areas (including cellular Internet carriers) sometimes are unable to support
  • 217. 203 peaks in network traffic that causes sporadic outages for some customers. Finally, those who subscribe to newer or more complex forms of Internet services (such as fixed wireless broadband) may experience more downtime than others as providers encounter more issues with relatively less mature equipment. Action - If all else fails, contact your Internet provider to verify whether they are experiencing an outage. Some providers also give advice on troubleshooting problems connecting to their network. Slide Show Computer and Network Errors Directions: In this worksheet, you will write the computer errors/problems, error messages and the network problems you encountered. Create a Powerpoint presentation. Be prepared to discuss your answers. Computer Problems Network Problems Pictorial Tour Directions: Form a group of five members and make an additional research on the different diagnoses on faulty computer and network systems. Visit computer shops in your community. You can also interview/observe a practitioner while lending a quality service in computer hardware servicing.
  • 218. 204 Video Demo Application of Diagnosis on Faulty Computer and Network Systems Directions: After the interview and observation with a practitioner, your group will showcase what you have learned through video demo. You can use a video camera to record the event stressing the diagnosis on faulty computers and networks system. This event will be presented through a video presentation using projectors or monitors. You will be rated based on the rubrics written below: CRITERIA PERCENTAGE SCORE Accuracy (Role and function of a device was accurately shown) 30% Presentation (Organization or sequence of the play and appropriate gestures were used) 30% Clarity (Diagnosis clearly delivered) 30% Team work (Cooperation of each member was evident) 10% Performance Rating Maintain Computer and Network System As a future computer technician, you must be diligent and eager to know the different procedures in using the tools for configuring computer and network systems because this will guide you to carry out a particular job in a proper manner. Once you already identify the competencies, you must also acquire the appropriate skills to apply it in real time situations. This part will help you to find out some of the required procedures in computer system configuration. Some of them are intentionally not included so that you will have a chance to explore and learn through your own experience and study. The subsequent statements below describe the varied procedures in using Action Center in the Control Panel:
  • 219. 205 Windows and other Microsoft products have their own built-in troubleshooting tools that bear little or no resemblance to the Fix It troubleshooters. Windows 7's Action Center Control Panel applet alerts you to system problems via an icon in the taskbar's notification area. You can also use the Action Center to view the machine's security and maintenance status. Go to the Action Center's link to the Control Panel's Troubleshooting applet to find about a dozen options for fixing problems related to program compatibility, hardware and audio, networking, security, Windows Update, performance, and power usage. (Information for troubleshooting Vista and Windows XP is available on Microsoft's TechNet site.) Here is how: 1) Click on the Start Button. 2) Choose Control Panel. 3) Select System and Security. 4) Choose Action Center. 5) On the Action Center, browse and check all the options for systems check.  Security (View Anti-Spyware Programs, update virus protection)  Maintenance (Perform System Maintenance, Check for Solutions for unreported problems, Setup Backup)  Troubleshooting  Recovery Figure 141. Control Panel Figure 142. System and Security
  • 220. 206 Windows Security Center can help enhance your computer's security by checking the status of several security essentials on your computer, including firewall settings, Windows automatic updating, anti-malware software settings, Internet security settings, and User Account Control settings. If Windows detects a problem with any of these security essentials (for example, if your antivirus program is out of date), Security Center displays a notification and places a Security Center icon Picture of the red Security Center shield in the notification area. Click the notification or double-click the Security Center icon to open Security Center and get information about how to fix the problem. When it comes to problems with Office applications, you are not likely to find much help in the programs' built-in help systems. (Note that Office 2007 apps include a built-in diagnostic routine. See the Microsoft Support site for more information.) You could attempt to sort through the links on Microsoft's support site for Office 2007 and 2010 or the equivalent site for Office 2003, but if the Office Fix It solutions do not help, your best bet may be to use the repair feature of the Office installer. Figure 143.Action Center Dialogue Box
  • 221. 207 To do so, open the Control Panel Programs and Features applet (Add or Remove Programs in Windows XP), select your version of Office, click the Change button at the top of the list, then select Repair button in the wizard that opens, and follow the wizard's instructions. The Microsoft Support site provides more information about repairing Office 2010, Office 2007, and Office 2003. Even if your system appears to be running well, you may benefit from using Microsoft's Fix It and other diagnostic tools. Most PC users rely on automatic updates of their system, security, and application software. But programs sometimes conflict in ways their vendors cannot predict. Few of these software glitches slam the brakes on your system but they are likely to slow it down a little or a lot. Investigate and Interpret: Computer Systems Check Directions: In this worksheet, you will check and write down the current status of your computer systems before the updates and after the updates with regard to the different area listed below. Be prepared to discuss your answers and the updates made. Area Status (Before Updates) Status (After Updates) Security 1) Anti-Spyware Programs 2) Anti-Virus Maintenance 1) System Maintenance
  • 222. 208 Investigative Report Directions: To deepen your understanding about computer systems status, search online or you can also interview a practitioner while rendering a quality service in computer hardware servicing. Present your report to the class. Ask their Profile (Name, Job description, Age, Business Name). 1. Interview them about procedures in maintaining their computer and network systems or usual problems they encountered. CRITERIA PERCENTAGE SCORE Accuracy (Details in maintaining computer and network systems were elaborated well). 30% Clarity (Clearly delivered each topic) 30% Presentation (Organization or sequence of information) 10% Performance Rating Magazine Article Directions: Make an article regarding to the effects of ignoring computer problems. Use the questions below as your guide in writing your article. Use striking title and be creative. Be ready for an oral presentation. 1. What is the risk of turning off messages about spyware and related protection? 2. What is the risk of turning off messages about virus protection? Contents Excellent (5) Good (3) Poor(1) Spelling Almost all words spelled correctly Capitalization Begins all sentences but one with uppercase letters. Punctuation Correct ending punctuation in every
  • 223. 209 sentence but one. Grammar Simple sentences are grammatically correct. Handwriting Legible. Good spacing and alignment. Total Points COMPUTER SPECIFICATIONS What is Specification? The specification or ‘spec’ is a list of the key components that make up the computer. It is provided by retailers to help buyers decide which PC, and which combination of features, they need. When buying a PC you start by deciding what you want your PC to do. This tells the specification you actually need. When reviewing a computer specification, the most important component to take are the processor, the size of RAM and the size of the hard drive as these are central to the overall capability of the system. If it is planned to use specialized programs for students with special needs, it is advisable to purchase a suitable specification computer to meet the system requirements for these programs.
  • 224. 210 Understanding a Specification Sample specification for a certain desktop computers: Processors Two companies - Intel Inc. and AMD Inc. – are the manufacturers of most of today’s PC processors and both offer a range that balances price and performance. Processors are generally defined by their speed, in megahertz (MHz) or in gigahertz (GHz), and this relates to the number of operations they can perform per second. The higher the value, the faster the PC will perform and the more expensive it is. More recent and more powerful processors use a 64 Bit architecture, rather than the previous 32 Bit models. Memory (RAM)
  • 225. 211 The main working memory in a computer is called random access memory or RAM. The processor uses this memory to run programs. RAM is measured in megabytes (MB). Most modern computers use DDR 2 RAM. A minimum of 2024 MB (2GB) of RAM is recommended for general purpose PCs. 2048 MB (2GB) of RAM is also sufficient for PCs running multimedia applications, i.e., those on which digital music, digital video or high-end graphics are being created/edited. Storage – The Hard Drive The hard drive is the computer’s primary storage area. It stores the applications and programs that run on the PC, as well as any work created by users. From a school’s perspective, the capacity of the hard drive, measured in gigabytes (GB), is a key criterion and should be given due consideration when reviewing PC specifications. A hard drive capacity of at least 80GB is recommended for general purpose PCs. A hard drive capacity of 200GB or more is recommended if working with multimedia applications where large graphics and digital audio/video files are being created and stored. Other Specifications Monitors The older Cathode Ray Tube (CRT) have been largely replaced by Liquid Crystal Display (LCD) and Light Emitting Diode (LED) flat-screens. A 15” LCD/LED has the same viewing area as the older 17” CRT. Average entry-level PCs usually come with a 17” flat-screen and this is adequate for most general purpose applications. Larger 19” flat-screens are available and may be appropriate if video editing and advanced graphics work is being carried out. Teachers of students with special needs may want to consider using larger monitors with their students. Optical Drives CD R/W drives are standard on PCs and allow the information on a compact disc (either data or audio) to be read and written to by the PC. It is defined by its speed (i.e., 48x or 48 speed). DVD drives can read both CDs and DVDs. Standard on entry level computers are 48x DVD-ROM/CD_RW drives and allows you to copy blank CDs. High performance computer use 52x DVD-RWs. Educational software is being developed in both DVD and CD formats, but a DVD can hold over 25 times more data than a CD.
  • 226. 212 Graphics and Sound Cards These cards are installed inside a PC and are responsible for determining the quality of the audio and visuals (graphics and video) output by the computer. They hold their own memory (in MB), which is why they add to a computer’s capability. An integrated graphics card with 256MB of memory is recommended for general purpose PCs. Computers running high-end applications generally require a separate 256MB graphics card. A sound card generally comes as standard in most PCs purchased today. If students intend to work extensively with digital music, the school should consider getting a high-end sound card as this will create greater depth, complexity and realism of sound. Speakers and Headphones Most computers come with either built-in or external speakers. Schools may also consider buying headphones to control sound levels within a classroom or computer room. Cheap ‘headphone splitters’ can also be purchased — these enable two sets of headphones to be used per computer. Network Interface Card (NIC) It is recommended that all PCs be purchased with a suitable network interface card (NIC). A network card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per second) card is the standard network card today. Few school networks currently operate at speeds higher than 100Mbps. Operating Systems (OS) PCs are generally purchased with an operating system pre-installed. It is worth checking that your existing software will still work with the operating system of any new systems being purchased. It may be possible to choose a particular operating system and, if so, this may help standardize new machines with existing school PCs. At present, Microsoft’s newer OS is Vista, which generally performs the same functions as Win XP. Microsoft XP Professional is still the most common and recommended OS found in schools that meets their general needs very well and is recommended for schools. As Vista operating system can come in various types and configurations, schools should check that the version of Vista will be suitable and compatible for the software and network infrastructure of the school. Vista Home or XP home versions are not recommended for use in schools, however when ordering computers schools need to specify a base operating system. The choice of base operating system should be made along with their choice of operating system license. Operating system license costs depend on a number of factors including type of school, or type of license, example once off purchase via Microsoft’s select
  • 227. 213 agreement or purchasing software per year via Microsoft’s schools agreement. Linux is an open source free operating system which is not widely used by schools at present, though it may be suitable for schools who are aware of its capabilities. The most widely used open source data base is Ubuntu. It is a Linux based operating system and is distributed free along with the source code. Its desktop looks somewhat similar to that of Windows, with window controls and icons. There is reasonable large software support available on Ubuntu; the common applications include Mozilla Firefox web browser, LibreOffice office application suite, GIMP image editor. OpenSolaris is a computer operating system developed by Sun Microsystems. It runs well on desktops, laptops, servers and data centers. OpenSolaris is GUI based like Ubuntu and has rich graphical desktop and windows for easy navigation. It is now available in version 11 and can be downloaded without any cost from the Oracle website. Purchasing Considerations Consider the following points when purchasing PCs • What is the intended use of the PC and will the chosen specification fulfill these aims? • Is the PC compatible with existing computer equipment and software? • Is the technical support service satisfactory? • a minimum 1 year warranty including replacement if needed and full parts and labor is recommended • Will added peripherals be required such as headphones, and optical mice. • Easy access of multiple USB ports • Operating System licensing options
  • 228. 214 Internet Research In this worksheet, you will use the Internet, a newspaper, or a local store to gather information about the components you will need to complete your customer’s computer. Be prepared to discuss your selections. Instructor Note: All the components a student chooses must be compatible with the components provided. (For example, the selected CPU and RAM must work in the provided motherboard) No budget has been given. Answers may vary. Your customer already owns the case described in the table that follows. Brand and Model Number Features Cost Cooler Master ATX Mid Tower CAC-T05-UW ATX, Micro ATX compatible form factor 2 External 5.25" drive bays 2 External 3.5" drive bays 2 Internal 5.25" drive bays 7 Expansion slots USB, FireWire, audio ports Search the Internet, a newspaper, or a local store to research a power supply compatible with the components that your customer owns. Enter the specifications in the table that follows: Brand and Model Number Features Cost Sea Sonic 550 watt SS-550HT Dual +12V SLI Certified Up to 88% efficiency ATX12V/EPS12V form factor Brand and Model Number Features Cost GIGABYTE LGA 775 GIA-965P-DS3 DDR2 800 PCI Express X16 SATA 3.0 Gbps interface 1.8V-2.4V RAM Voltage 1066/800/533 MHz Front side bus 4 memory slots Dual-channel memory supported ATA 100 connector RAID 0/1 4 USB 2.0 ports ATX form factor
  • 229. 215 Answer the following: 1. List three components that must have the same or compatible form factor. 2. List three components that must conform to the same socket type. 3. List two components that must use the same front side bus speed. 4. List three considerations when choosing memory. 5. What component must be compatible with every other component of the computer? Making a Checklist Directions: Make a market study on components, its brand, functionality and cost. You can ask computer vendors of the price lists and inquire of its specifications. Choose two brands then make comparisons. Be ready for an oral presentation. Components Brand No.1 Cost Cost Strengths Weakness Processor Motherboard Memory Graphic Card Sound Card Components Brand No.2 Cost Cost Strengths Weakness Processor Motherboard Memory Graphic Card Sound Card
  • 230. 216 Performance Score Card Score Reference: 0 = Some facts are clearly inconsistent with source material 1= Some facts are questionable/unrealistic 2 = All facts seem accurate/good. Computer Specifications Directions: In this activity, you will create a complete list of specifications of a one set desktop computers including its brand name and cost. Total all the amount and present it to the class. Performance Score Card Score Reference: 0 = Some facts are clearly inconsistent with source material 1= Some facts are questionable/unrealistic 2 = All facts seem accurate/good. Details Points Brand model is precisely given Cost is based on the market selling price Strength/weakness are accurate Presentation skills (Clarity of the voice) TOTAL Details Points Brand Model is precisely given Cost is based on the market selling price Complete list of the given hardware were enumerated well Presentation (Clarity of the thought and voice) TOTAL
  • 231. 217 Networking Hardware Requirements Although setting up a home network is not necessarily an expensive or difficult project, you just need to have few basic pieces of hardware to connect your computers, printers, gaming consoles, and assorted gadgets to each other — and to the Internet. Need Purpose DSL or Cable Modem A DSL or cable modem connects your computer to a high-speed DSL or cable Internet connection. Although dial-up modems are still available for slower dial-up Internet connections, the connection speeds are far too slow for a home network. Wired or wireless router A wired or wireless router connects your DSL or cable modem to your home network. Many DSL/cable modems now have built-in routers that allow you to connect your network directly to your Internet connection. Wired or wireless network adapters A wired or wireless network adapter is the device in your computer (or printers, gaming consoles, and other networking equipment) that connects your computer to your network. Ethernet cabling Ethernet cabling is used to connect your wired network adapters to a router or network switch. Even if you are using a wireless router, you will need at least one Ethernet cable to connect your wireless router to your DSL or cable modem. In a network, computers and other devices are connected to share resources. Network connections vary in many ways depending on the setup the user would want to, availability of the network devices and the location or map area of links. One may either use wireless throughput or wired throughput. The next lesson will guide you on how to setup these connections.
  • 232. 218 Router Basics Your router is the glue that holds your home network together. It connects all your computers to one another, either through Ethernet cables or a wireless connection. A router is different than a modem: your modem connects you to the internet, while your router connects your computers to one another. When you hook up your router to the modem, however, you are then able to share that internet connection with all of the computers on your network. Sometimes modems come with built-in routers. Devices that connect to your router—that is, the computers, tablets, smartphones, DVRs, game systems, and so on—are called clients. Each client on the network is given an IP address, which helps your router direct traffic. Clients within the network get a local IP address, while your modem gets a global IP address. Global IP addresses are like street addresses, while local IP addresses are like apartment numbers: one lets you find the building in relation to the rest of the world, while the other lets you find the specific location within the complex. These addresses make sure the right information from the outside world gets to the right computer on your network. Routers have a number of different features, so we'll go through some of the most common router specs and how they affect your home network. Most people have a mix of wired and wireless devices on their network, so most of the discussion will focused on wireless routers. Since wireless routers allow for both wired and wireless connections, you can wire up when necessary, and connect over Wi-Fi everywhere else. Wireless Throughput Throughput is the speed at which a router can transfer data. The transfer speed of your wireless connection is dependent on the wireless standard it uses. The most common standards today are 802.11g and 802.11n (also known as "wireless G" and "wireless N", Figure 144. Wireless Throughput
  • 233. 219 respectively). Wireless N is faster than wireless G, though routers that support wireless N are also more expensive. Most new devices—like smartphones and laptops—support the faster wireless N. Wired Throughput The wired half of your router will come in one of two speeds: 10/100 Mbps and 10/100/1000 Mbps (also known as "gigabit"). 10/100 routers are cheaper, but will not transfer data between computers as quickly as gigabit routers will. If you are only using your router to connect to the internet, 10/100 is fine, since your internet connection is probably slower than 100Mbps, meaning you will not be able to actually take advantage of the router's full speed. If you are transferring data between computers, however, you may want to go with a gigabit router, since it will transfer that data much faster than a 10/100 model. Range Wireless routers can only reach a limited area of distance. If you have a big house and have the router on one side, you might not be able to access the network from the other side of the house. Your range, like your speed, is determined by the wireless standard you use. Wireless N has a longer range than wireless G, so if range is important you will want to use wireless N. That said, there are many other ways to connect to your network from afar. Wireless extenders (also called wireless repeaters) are products you can buy that do exactly what the manuals say to extend your network further. Alternatively, you can buy a powerline adapter, which lets you use your home's electrical wiring to hook a distant device up to your router with an Ethernet cable (and thus get a faster connection than wireless would allow for). Number of Ports Routers have two types of ports in the back: LAN ports and WAN ports. Your WAN port hooks up to your modem (which, again, is what connects to the internet), while the LAN ports hook up to your computers and other clients. Most routers have one WAN port, but you will need as many LAN ports as the wired devices you have. If Figure 144.Router ports
  • 234. 220 you have more wired devices than can fit on a router, you can plug them all in using a wired switch. A switch is like a power strip for your router: it lets you plug in more devices than the router originally allowed. Wireless Security Unless you do not mind strangers eating your bandwidth and potentially accessing your networked files, you should always protect your wireless network with a password. WPA2 is currently the most secure type of wireless encryption, so make sure you use WPA2 if you can. Some old wireless devices do not support WPA, in which case you will have to use the less secure WEP instead. Basically, every devices made in the last four years supports WPA2 encryption. Sample Network Components Specifications Item Minimum Requirements Recommended Modems Cable Cat-5 UTP Cat-5 UTP network adapters Ethernet 100Base-TX Ethernet 1000Base-T Hub/Switch 100 Megabit Hub 1.0 Gigabit Switch Power Surge Protector Surge Protector & UPS Network Layout Directions: In a short coupon bond, draw a simple schematic diagram of a computer connected to a network. Label the parts and present your drawing to the class. Your work will be rated according to the following criteria: Figure 145. Wireless Security
  • 235. 221 CRITERIA Excellent 4 Good 3 Fair 2 Poor 1 Adherence to the proper network setup (50%) -drew the diagram with right setup Workmanship (20%) -organized materials and tools while accomplishing the task and exhibited effective time management Quality of work (30%) -presented the final output neatly. Critical Review Directions: Make a market study on network hardware equipment, its brand, functionality and costs. You can ask computer vendors of the price lists and inquire of its specifications. Choose two brands then make comparisons. Be ready for an oral presentation. Components Brand No.1 Cost Brand No.2 Functionality Cost Router Hub 8-port UTP cable Rj45 connector Sound Card
  • 236. 222 Performance Score Card Score Reference: 0 = Some facts are clearly inconsistent with source material 1= Some facts are questionable/unrealistic 2 = All facts seem accurate/good Computer Shop Network Layout Directions: Draw on a short bond paper, layout plan of a computer café connected to a network. Write the specifications of the network hardware and incorporate the following requirements. Draw your diagram in a short coupon bond.  one computer server  20 client computers  one DSL modem  UTP cables  hub Performance Rubrics Details Points Brand Model is precisely given Cost is based on the market selling price Complete list of the given hardware were enumerated well Presentation (Clarity of the thought and voice) TOTAL CRITERIA Percentage Score 1. Originality of network layout 40% 2. Neatness of the drawing 40% 3. Proper use of equipment and materials is observed. 10% 4. Observance of Safety Precautions. 10% PERFORMANCE RATING
  • 237. 223 Lesson 2: Maintaining Computer Systems This lesson is intended to develop your skills in planning and preparing for installation of computer devices and operating system. At the end of this lesson, you are expected to:  Follow OHS procedures in maintaining computer systems  Diagnose and identify faulty computer systems  Test normal functions of computer systems  Perform repair and replacement of faulty computer systems  Adhere to the recommended schedule and techniques in maintaining and cleaning computer systems  Respond to sudden breakdowns of computer systems in accordance with established procedures As a future computer technician you must be diligent and eager to know the different procedures in maintaining computer system because this will guide you in carrying out a particular job in a proper manner. Once you already identify the procedures, you must also be able to apply it in real life situations. Safety Precautions Occupational Health and Safety (OHS) Policy –An Information and Communication Technology (ICT) student should know how to behave when working in the computer laboratory, as well as implement a safe way of accomplishing every task. Safety practices should be learned early and always adheres in working with any electrical and electronic device, including personal computers and its peripherals. This is for your protection as well as to the people working with you, and for the devices that you are using. The basis for this process begins with Occupational Health and Safety Policies.
  • 238. 224 Occupational Health and Safety standards Each student has a responsibility to their colleagues and their organization to report and act upon any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present in their work environment. Procedure 1. Identify the hazard. 2. Clear the area close to the hazard. 3. Partition the hazard off or clearly identify the area to protect other people from harm. 4. If the hazard is can be easily and safely cleared, then do so. 5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance. 6. After clearing of the hazard, fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards. MAINTENANCE OF COMPUTER SYSTEM Perhaps you have handpicked the finest computer with the selected fastest processor and graphic card and with a few gigabytes of memory. So you thought to yourself that your machine is probably going to sustain you for the next five (5) years. But little did you discover that some six months down the road, your computer is behaving like a Pentium 2 computer, perpetually flustering you with its choppy images, frustrating pop-ups and tremendously slow disk access. Gradually, your computer crashes and all your data is lost on one fine afternoon. One thing you have probably missed out is the need for system maintenance. The basic routine maintenance comprises of the 3 basic processes: 1. Data Backup 2. Malware Maintenance 3. Disk or File System Maintenance
  • 239. 225 Let us address each of the processes in detail so that you can better understand how you can apply them in your system to extend its longevity. DATA BACKUP Backing up basically means creating a redundant copy of a data so that in case anything happens to the original data, you have a spare copy. This is typically a simple thing to do. First, you must ask yourself why should you back up the data or system? If you feel that you should backup your valuable data, then you should decide and select what are the data to be backup. Depending on your needs, you may choose to backup your windows registry, or your Outlook Express mail data, or even your windows security keys. Windows operating system's friendly interface allows you to drag and drop computer files from one storage device to another. And this can be as simple as copying a document file from your desktop into a thumb drive. But when these files gradually occupies a lot of disk space, you may need to seek help from archiver utilities such as Winzip which enables you to compact your files into a single compressed file. You can then break up this large file into several pieces to be stored in several mediums such as a span of CD or DVD-Recordable. Winzip also allows you to protect your file with encryption and a software password to prevent any unauthorized access. There are a number of backup methods you could use. Figure 146. Data Backup
  • 240. 226 How to backup files in Windows XP: 1. To use the built in Windows XP backup tool, follow the instructions. 2.Click the Start button > All Programs > Accessories > System Tools > Backup. 3. The Windows XP backup tool allows backing up all user files in just one task. If you select the option of the My Documents backup, it will copy the entire contents of the Documents and Settings folder including MS Outlook/Outlook Express messages and settings as well as your profile settings. The Windows XP backup tool allows backing up all user files in just one task. If you select the option of the My Documents backup, it will copy the entire contents of the Documents and Settings folder including MS Outlook/Outlook Express messages and settings as well as your profile settings. 4. However, in most situations full backup is not necessary. In all likelihood the My Documents folder of your computer will be large in size and contain a Figure 147. Step No.2 How to Backup your files Figure 148. Step No.3
  • 241. 227 lot of irrelevant information. If this is the case, Windows XP backup tool suggests that you manually specify files that you want to include or exclude from the backup set. 5. Lastly, do not forget to back-up your Internet Explorer favorites from within IE. You can export them from the Menu. Figure 149. Step No.4 Figure 150. Step No.5
  • 242. 228 MALWARE MAINTENANCE Malware refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more. When you are infected, you can lose your privacy, confidential data and access to your system when software and hardware are damaged. Fortunately, there are a couple of preventive measures you can take to protect yourself from malware. One thing you can do to scan the file for any virus infection before you attempt to open it. If the scan shows nothing, it is probably a safe file. But then again, it may be a new virus yet to be updated in your virus scan. You can either wait and apply the next virus signature update and perform a second scan or risk it all and open the file. DISK MAINTENANCE Did anyone tell you that your hard disk is a pretty tricky machine? When you first installed your operating system, you may be pleased to know how smooth and efficient your software applications are running. But gradually, it slows down and this bothers you. What truly causes the decline in performance? You may argue that your disk is just a couple of months old. This has much to do with the way you operate on your system. Try to imagine a big tool bucket filled with gadgets. Initially, the bucket only contains a few spanners, a hammer and some screws. So every time you search for a particular item, it is relatively easy to find. But soon as you keep filling the bucket with all sorts of items and especially when the amount of items grows, you will discover that you may need more time just to search Figure 151. Anti-Malware Application
  • 243. 229 for a particular screw head. In such cases, uninstall any unnecessary software and defragment your disk. Typically, your system performance will decline when the amount of data in your hard disk starts to grow. Essay Writing Activity Directions: Write an essay about the importance of Data Backup. Relate your statements to the most treasured skills you acquired in the lesson. Give also your own title for the essay (minimum of 400 words). Contents Excellent (3) Good (2) Poor(1) Spelling Almost all words spelled correctly Capitalization Begins all sentences but one with uppercase letters. Punctuation Correct ending punctuation in every sentence but one. Grammar Simple sentences are grammatically correct. Handwriting Legible. Good spacing and alignment. Total Points Figure 152. Disk Cleanup Window
  • 244. 230 Research and Investigate Directions: Form a group of five members and make a research on the different advantages and disadvantages of data backup, malware maintenance and disk maintenance. You can also interview/observe a practitioner while lending a quality service in computer hardware servicing. Report this to the class. Demonstration Application on Maintenance of Computer System Directions: After the interview and observation with a practitioner, your group will showcase what you have learned through a demonstration. You will be rated base on the rubrics below: Criteria Excellent 4 Good 3 Fair 2 Poor 1 Content (40%) -Conveys full understanding of the content Enthusiasm (10%) -Facial expression and body language generates strong enthusiasm Interest and Purpose (10%) -Displays interesting purpose Speak Clearly (10%) -Group members speaks clearly at all times Volume (10%) -Loud volume Preparedness (10%) -Group is prepared with props and costumes Cooperation (10%) -displays teamwork
  • 245. 231 DIAGNOSIS AND IDENTIFICATION OF FAULTY SYSTEM More than 70% of all computer problems are related to cabling and connections. Ensure all cables are connected and connected firmly. IDE and floppy ribbon cables and power cables can often go loose. Ensure microprocessor, memory modules, and adapters such as video card are inserted correctly and do not "pop-up" due to vibration. Problem 1: System has no power at all. Power light does not illuminate, fan inside the power supply does not turn on, and indicator light on keyboard does not turn on. PROBABLE CAUSE DIAGNOSIS SOLUTION Power cable is unplugged Visually inspect power cable. Make sure power cable is securely plugged in. Defective power cable Visual inspection or try another cable. Replace cable. Power supply failure Power cable and wall socket are OK, but system is still dead. Contact technical support. Faulty wall outlet; circuit breaker or fuse blown Plug device into socket and test. Use different socket, repair outlet, reset circuit breaker or replace fuse. Problem 2: System is inoperative. Keyboard lights are on, power indicator lights are lit, and hard drive is spinning. PROBABLE CAUSE DIAGNOSIS SOLUTION Expansion card is partially dislodged from expansion slot on the motherboard. Turn off computer. Remove the cover of the system unit. Check all expansion cards to ensure they Using even pressure on both ends of the expansion card, press down firmly on
  • 246. 232 are securely seated in slots. expansion card. Defective floppy disk drive or tape drive Turn the system off. Disconnect the cables from one of the floppy drives. Turn on the system, check to see if the keyboard operates normally. Repeat until you have located defective unit. Contact Technical Support. Defective expansion card Turn the computer off. Remove an expansion card. Make sure expansion card is secure in expansion socket. Problem 3: System does not boot from hard disk drive, but can be booted from floppy disk drive. PROBABLE CAUSE DIAGNOSIS SOLUTION Connector between hard drive and system board is unplugged. When attempting to run the FDISK utility described in the HARD DISK section of the manual you get a message, INVALID DRIVE SPECIFICATION Check cable running form disk to disk controller on the board. Make sure both ends are securely plugged in; check the drive type in the Standard CMOS Setup (in your motherboard manual). Damaged Hard Disk or Disk Controller Format hard disk; if unable to do so, the hard disk may be defective. Contact Technical Support. Hard Disk directory or FAT is scrambled Run the FDISK program, format the hard drive(See HARD DRIVE section of manual). Copy your Backing up the hard drive is extremely important. All Hard Disks are capable of breaking down at any
  • 247. 233 backup data back onto hard drive. time. Problem 4: System only boots from Floppy Disk. Hard Disk can be read and applications can be used, but booting from Hard Disk is impossible. PROBABLE CAUSE DIAGNOSIS SOLUTION Hard Disk boot program has been destroyed. Corrupted system files Back up data and applications files. Reformat the Hard Drive as described in the Hard Drive section of the manual. Re-install applications and data using backup disks. Problem 5: Error message reading "SECTOR NOT FOUND" or other error messages indicators that certain data is not allowed to be retrieved. PROBABLE CAUSE DIAGNOSIS SOLUTION Sector Not Found Error Hard drive is likely bad itself. You may be able to resolve this issue by running scandisk and having scandisk mark the sectors as bad. Problem 6: Disk formatted on IBM PS/2 will not operate with this system. PROBABLE CAUSE DIAGNOSIS SOLUTION The IBM PS/2 uses a different format than other computers. IBM PS/2 disk format will not work in an AT type computer. Format disk in the AT type computer. Insert disk into the IBM PS/2 and copy the files you wish. Problem 7: After installing an expansion card (network card, tape drive card, etc.), the system no longer works properly.
  • 248. 234 PROBABLE CAUSE DIAGNOSIS SOLUTION Monitor has no power. All or part of the system may be inoperable. The new card may work but a mouse or COM port may not work. Change the interrupt or RAM address on the new expansion card. See the documentation that came with the new card in order to change pin settings. Many expansion devices come with proprietary software that will assist you in doing this. Problem 8: Screen message says "Invalid Configuration" or "CMOS Failure." PROBABLE CAUSE DIAGNOSIS SOLUTION Incorrect information has entered into the configuration (setup) program. Check the configuration program. Replace any incorrect information. Review system's equipment. Make sure correct information is in setup. Problem 9: Screen is blank. PROBABLE CAUSE DIAGNOSIS SOLUTION Monitor has no power. Power connectors may be loose or not plugged in. Check the power connectors of the monitor and the system. Make sure monitor is connected to display card, change I/O address on network card if applicable. Monitor is not connected to computer. See connections of the video cable from the video adapter card going to the monitor.
  • 249. 235 Problem 10: System does not boot from hard disk drive, but can be booted from floppy disk drive. PROBABLE CAUSE DIAGNOSIS SOLUTION Connector between hard drive and system board unplugged. When attempting to run the FDISK utility described in the HARD DISK section of the manual you get a message, INVALID DRIVE SPECIFICATION. Check cable running form disk to disk controller on the board. Make sure both ends are securely plugged in; check the drive type in the Standard CMOS Setup (in your motherboard). Problem 11: Memory Module Problem PROBABLE CAUSE DIAGNOSIS SOLUTION Memory problem, display card jumpers one not set correctly. Loose installation of the RAM on the memory slot Reboot computer. Re- install memory, make sure that all memory modules are installed in correct sockets. Check jumper and switch settings on display card. See display card section for information of settings. Computer virus Computer system becomes too slow and experiencing hang-up. Use anti-virus programs (McAfee/PC-cillin, E-port, etc.) to detect and clean viruses. Problem 12: Screen goes blank periodically. PROBABLE CAUSE DIAGNOSIS SOLUTION Screen saver is enabled. Disable screen saver.
  • 250. 236 Problem 13: Keyboard failure PROBABLE CAUSE DIAGNOSIS SOLUTION Keyboard is disconnected. Loose keyboard cable connection Reconnect keyboard. Check keys again if there is no improvement, replace keyboard. Problem 14: No color on screen PROBABLE CAUSE DIAGNOSIS SOLUTION Faulty monitor If possible, connect monitor to another system. If no display, replace monitor. Problem 15: Floppy drive light stays on. PROBABLE CAUSE DIAGNOSIS SOLUTION Floppy Drive cable is not connected correctly. Shorted power wire for floppy Reconnect floppy cable making sure PIN1 on the Floppy Drive corresponds with PIN1 on floppy cable connector. Problem 16: Error reading drive A: PROBABLE CAUSE DIAGNOSIS SOLUTION Bad floppy disk Try new floppy disk. Floppy disk is not formatted. Format floppy disk (type ENTER)
  • 251. 237 Problem 17: Windows system drive failure PROBABLE CAUSE DIAGNOSIS SOLUTION SETUP program does not have correct information. Boot from drive A: using DOS system disk. Input correct information to SETUP program. Hard Drive cable is not connected properly. Check Hard drive cable. Problem 18: Cannot boot system after installing second hard drive. PROBABLE CAUSE DIAGNOSIS SOLUTION Master/Slave jumpers are not set correctly. Set master /slave jumpers correctly. The Hard Drive is incompatible. Run SETUP program and select correct drive types. Call drive manufacturers for compatibility with other drives. Problem 19: Missing operating system on Hard Drive PROBABLE CAUSE DIAGNOSIS SOLUTION CMOS setup has been changed. Run setup and select correct drive type. Problem 20: Certain keys do not function. PROBABLE CAUSE DIAGNOSIS SOLUTION Keys are jammed or defective. Replace keyboard.
  • 252. 238 Problem 21: Keyboard is locked, no keys function. PROBABLE CAUSE DIAGNOSIS SOLUTION Keyboard is locked. Unlock keyboard. Critical Review: Problems Encountered Directions: In this activity, list down at least five (5) problems, error messages or incidents you encountered while working or using a computer and the actions taken in every problem/error message or incidents encountered. Problems Encountered Actions Taken 1. 2. 3. 4. 5. Slide Show Presentation Directions: In this activity, you will learn how useful the Internet can be for a Personal Computer (PC) support technician. 1. Using a personal computer, pretend that the motherboard manual is not available and you need to replace a faulty processor. Identify the manufacturer and model of the motherboard by looking for the manufacturer’s name and model number stamped on the board. Research the Web site for that manufacturer. Print the list of processors the board can support. Afterwards, make a slide show presentation and report it to the class.
  • 253. 239 Video Tutorials Application on Diagnosis of Faulty Systems Directions: In this activity, your class will be grouped into three (3) and will make an interview and observation with a practitioner. The group will showcase what they have learned through a video demo or tutorials. Use digital cameras or cellphones on recording the video. You will be rated based on the rubrics written below: Criteria Excellent 4 Good 3 Fair 2 Weak 1 Content (40%) -Conveys full understanding of the content Enthusiasm (10%) -Facial expression and body language generates strong enthusiasm Interest and Purpose (10%) -Displays interesting purpose Speak Clearly (10%) -Group members speaks clearly at all times Volume (10%) -Loud volume Preparedness (10%) -Group is prepared with props and costumes Cooperation (10%) -Displays teamwork
  • 254. 240 Diagnostic Software Tools Diagnostic software is used to identify problems on a computer or piece of equipment. These programs test the onboard systems for issues and help to alert users of potential problems or breakdowns. Over the years, these programs have gone from very basic to complex and highly specialized. With this increase in technology, the skill required to use the software has actually decreased to the point where most people can use this software with little or no training. Programs that provide diagnostic information are common everywhere. Something as simple as the oil light on a car dashboard is a type of diagnostic software. These hard-coded diagnostic tools usually monitor one specific part of a larger piece of equipment and typically are always operating. While these types of diagnostic programs are the most common, they are usually the least versatile. When people think of true diagnostic software, they usually think of the types used on computers. These programs monitor the computer for problems involving every aspect of the machine, from hardware to software—far more complex and versatile than the change oil light. Since the introduction of diagnostic software, it has evolved in many ways. The original type could only find the most major of problems. There should be strong indicators or physical damage in order for the software to recognize and report the problem. When computers became more common in people's homes, particularly with the rise of Disc Operating Systems, commonly known as DOS, diagnostic software became more common. Small built-in programs, such as Checkdisk (CHKDISK), allowed users to perform Figure 149: Defragmentation and Optimization of hard drive
  • 255. 241 basic diagnostic routines on their systems. These early programs would often output technical information and esoteric error codes instead of readable information. In recent years, the output reports have changed considerably. The basic outputs are now readable by most users, and they often contain tips or warnings telling users what they should or should not do, all in plain language. Technological advances have even made Web page-based diagnostic software available for home users. With minimal Web searching, nearly any home user can find a wide range of websites offering to speed up their computer or diagnose problems. Many of these sites are scams, so consumers should perform proper research before using them. General Internet searches can provide a number of resources to check a company's credibility. Some Downloadable Diagnostic Tools Yet Another Cleaner Protects your PC from browser hijacker, malicious plug-ins, malwares, adware, various viruses ARO 2013 Repairs registry errors, remove "junk" files, and ensure your PC is fully protected RegDoctor Improves your system performance and stability by repairing and cleaning the Windows Registry Wise Registry Cleaner Cleans the registry portion of the hard drive Advanced System Care Tunes up and maintains your PC, with anti-spyware, privacy protection, and system cleaning functions. CPU-Z Accesses various information's about your computer
  • 256. 242 Advanced System Care Pro Tunes up and maintains your PC automatically Free Window Registry Repair Scans, repairs, and optimizes your Windows registry Disk management tools:  Fdisk - creates and deletes disk partitions.  Format - prepares a hard drive prior to use.  Scandisk or Chkdsk - checks for physical errors on the disk surface.  Defrag - optimizes use of space on a disk.  Disk Cleanup - removes unused files.  Disk Management - creates partitions and formats disks (GUI interface).  System File Checker (SFC) – scans the operating system critical files. Procedure in Cleaning Hardware Components Cleaning your computer and its components and peripherals helps keep the in good working condition and helps keep the computers from spreading germs. Figure 150: Cleaning Schedule
  • 257. 243 How often should I clean my computer? The frequency of how often you should clean your computer varies on several different factors. To help you determine how often you need to clean your computer, we have created the chart below. Check the appropriate boxes below that apply to your computer’s environment to determine how often it should be cleaned. General Cleaning Tips Below is a listing of general tips that should be taken when cleaning any of the components or peripherals of a computer, as well as tips to help keep a computer clean. 1. Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component. 2. You can use a vacuum to clean up dirt, dust, or hair around the computer on the outside case. However, do not use a vacuum for the inside of your computer as it generates a lot of static electricity that can damage the internal components of your computer. If you need to use a vacuum to clean the inside of your computer, use a portable battery powered vacuum designed to do this job or try using compressed air. 3. When cleaning a component or the computer, turn it off before cleaning. 4. Be cautious when using any cleaning solvents; some individuals may have allergic reactions to chemicals in cleaning solvents and some solvents can even damage the case. Try to always use water or a highly diluted solvent. 5. When cleaning, be careful not to accidentally adjust any knobs or controls. In addition, when cleaning the back of the computer, if anything is plugged in, make sure turn off the PC and unplug the power cable. 6. When cleaning fans, especially the smaller fans within a portable computer or laptop it is suggested that you either hold the fan or place something in-between the fan blades to prevent it from spinning. Spraying compressed air into a fan or cleaning a fan with a vacuum may cause damage or back voltage to be generated. 7. Never eat or drink around the computer area.
  • 258. 244 Cleaning Tools Although many companies have created products to help improve the process of cleaning your computer and peripherals, you can also use household items to clean your computers and peripherals. Below is a listing of items you may need to use while cleaning your computer or computer peripherals. Keep in mind that some components in your computer may only be cleaned using a product designed for cleaning that component.  Cloth - A cloth is the best tool used when rubbing down a component; although paper towels can be used with most hardware, we recommend using a cloth whenever possible. Caution: It is recommended that you use a cloth when cleaning components such as the outside of the case, a drive, mouse, etc. You should not use a cloth to clean any circuitry such as the RAM or motherboard since they can generate Electro Static Discharge (ESD) that can damage electronics.  Water or rubbing alcohol - When moistening a cloth, it is best to use water or rubbing alcohol. Other solvents may be bad for the plastics used with your computer.  Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, and other particles out of a computer can be one of the best methods of cleaning a computer. Over time, these items can restrict the airflow in a computer and cause circuitry to corrode. Do not use a standard vacuum as it can generate a lot of static electricity that can damage your computer.  Cotton swabs - Cotton swabs moistened with rubbing alcohol or water are good for wiping hard to reach areas in your keyboard, mouse, and other peripherals.  Foam swabs - It is Always better to use lint-free swabs such as foam swabs. Procedures in Cleaning Hardware Components Case cleaning Why do we need to clean the computer case regularly? It keeps the appearance of the computer looking new. During cleaning, if ventilation locations are found, these can be cleaned helping the case keep a steady
  • 259. 245 airflow to the computer, keeping components cool and in good working condition. Procedures: 1) The plastic case that houses the PC components can be cleaned with a lint-free cloth that has been slightly dampened with water. For stubborn stains, add a little household detergent to the cloth. It is recommended that you never use a solvent cleaner on plastics. 2) Make sure all vents and air holes are hair and lint free by rubbing a cloth over the holes and vents. It is also helpful to take a vacuum around each of the hole, vents, and crevices on the computer. It is safe to use a standard vacuum when cleaning the outside vents of a computer. However, if you need to clean the inside of the computer, use a portable battery powered vacuum to prevent static electricity. CD-ROM, DVD, and other disc drive cleaning Why do we need to clean disc drives? A dirty CD-ROM drive or other disc drives can cause errors when reading discs. These read errors could cause software installation and other issues while running the program. Procedure: To clean the CD-ROM drive, it is recommend to purchase a CD-ROM cleaner from your local retailer. Using a CD-ROM cleaner should sufficiently clean the CD-ROM laser from dust, dirt, and hair. In addition to cleaning the drive with a special disc designed to clean drives, you can also use a cloth dampened with water to clean the tray that ejects from the drive. Make sure however, that after the tray has been cleaned, it has to be completely dried before putting the tray back into the drive. Figure 151. Disk Cleaner Figure 152. Disc Cleaning
  • 260. 246 CD and DVD disc cleaning Why do we need to clean disc? Dirty CDs can cause read errors or total malfunction. Procedure: Cleaning CDs and DVDs should be done with a cleaning kit but can also be done with a normal clean cotton cloth or shirt. When doing this with a clean cotton cloth or shirt, wipe against the tracks, starting from the middle of the CD or DVD and wiping towards the outer side as shown in the below picture. Never wipe with the tracks; doing so may put more scratches on the disc. It is recommended to use water when cleaning a CD. However, if the substance on a CD cannot be removed using water, pure alcohol can also be used. Hard drive cleaning Why do we need to clean a hard drive? While hard drives cannot be cleaned physically, they can be cleaned with various utilities on the computer to help it run fast and more efficiently. Disk Management is one of the utilities that will prevent the hard drive from slowing down. Procedure: Disk Management can be accessed in the Control Panel, look for Administrative Tools, then double-click on the Computer Management icon. In the System and Security window, click on the Administrative Tools. In the Administrative Tools window, double-click on the Computer Management icon. When Computer Management opens, click on Disk Management on the left side of the window, located under Storage. After a brief loading period, Disk Management should now appear on the right side of the Computer Management window. Keyboard cleaning Why do we need to clean the keyboard? The computer keyboard is often the most germ infected item in your computer. Often, it will contain more bacteria than your toilet seat. Cleaning it can help remove any dangerous
  • 261. 247 bacteria. Dirt, dust and hair can also build up causing the keyboard to malfunction. Procedure: Before cleaning the keyboard, turn off the computer or unplug the USB keyboard. Not unplugging the keyboard can result in causing other computer problems as you may press keys that cause the computer to perform an unwanted task. Many people clean the keyboard by turning it upside down and shaking. A more effective method is to use compressed air. Compressed air is pressurized air contained in a can with a very long nozzle. Aim the air between the keys and blow away all of the dust and debris that has gathered there. A vacuum cleaner can also be used, but make sure the keyboard does not have loose "pop off" keys that could possibly be drawn up by the vacuum. After the dust, dirt, and hair had been removed spray a disinfectant onto a cloth or use disinfectant cloths and rub each of the keys on the keyboard. As mentioned in our general cleaning tips, never spray any liquid onto the keyboard. Substance spilt into the keyboard Below are a few recommendations to help prevent a keyboard from malfunctioning once a substance has been spilt within it. If anything is spilt onto the keyboard turn the computer off immediately or at the very least disconnect it from the computer. Then, flip the keyboard over helping to prevent the substance from penetrating the circuits. While the keyboard is upside down, shake the keyboard over a surface that can be cleaned later. While still upside down, use a cloth to help clean out what can be reached. After you have cleaned it to the best of your ability, leave the keyboard upside down for at least one night allowing it to dry. Once dry, continue cleaning the keyboard with any remaining substances. If after cleaning the keyboard you have keys that stick, remove the keys and clean below the keys and the bottom portion of the key. Finally, if the keyboard still works but remains dirty or sticky, try washing the keyboard in the dishwasher.
  • 262. 248 If after doing all the above steps the keyboard does not function properly or at all, it is recommended you buy a new keyboard. LCD screen cleaning Why do we need to clean the LCD screen? Dirt, dust, and finger prints can cause the computer screen to project blurry images/texts. Procedure: Unlike a computer monitor, the LCD or flat-panel display is not made of glass, it therefore requires special cleaning procedures. When cleaning the LCD screen, it is important to remember not to spray any liquids onto the LCD directly. Press gently while cleaning, and do not use a paper towel as it may cause the LCD to gather scratches. To clean the LCD screen, use a non-rugged microfiber cloth, soft cotton cloth, or swiffer duster. If a dry cloth does not completely clean the screen, you can apply rubbing alcohol to the cloth and wipe the screen with the damp cloth. Rubbing alcohol is used to clean the LCD before it leaves the factory. Monitor cleaning Why do we need to clean the monitor? Dirt, dust, and fingerprints can cause the computer screen to project blurry images/texts. Procedure: The glass monitor screen can be cleaned with ordinary household glass cleaner. Be sure to remove power from the monitor and spray the cleaner onto a lint-free cloth so the fluid does not leak into the electrical components inside the monitor. Vacuum off any dust that has settled on top of the monitor, and make sure no books or papers have been placed on the air vents. Obstructed monitor vents can cause the monitor to overheat or even catch fire. Caution: We suggest using a cloth dampened with water when cleaning monitor or a screen that is not made of glass or has any anti-glare protection on the screen. Using ordinary household glass cleaner on special screens, especially cleaners with ammonia can remove anti-glare protection or other special surfaces.
  • 263. 249 Other good cleaning tools  Microfiber Towels  Swiffer Dusters Motherboard cleaning Why do we need to clean the motherboard? Dusts can build up and corrode circuitry causing various problems such as computer lockups. Caution: When working with interior computer parts (e.g. motherboard), take the necessary ESD precautions and avoid unplugging any cables or other connections. Procedure: Compressed air is recommended when cleaning the motherboard from dust, dirt, or hair. When using compressed air, hold it in the up-right position; otherwise, it is possible that chemicals may come out of the container that could damage or corrode the motherboard or other component within the computer. Also, make sure to always blow the dust or dirt away from the motherboard, or out of the case. Another good alternative to compressed air is to use a portable battery powered vacuum that can effectively remove the dust, dirt, and hair from the motherboard completely and prevent it from getting trapped within the case. However, do not use a standard electric vacuum as it can cause a lot of static electricity that can damage the computer. When using the vacuum, it is vital that you stay a couple of inches away from the motherboard and all other components to help prevent contact as well as to help prevent anything from being sucked into the vacuum. Ensure that you do not remove any small components with the vacuum such as jumpers. Optical Mouse cleaning Why do we need to clean optical mouse regularly? A dirty mouse (mouse with a ball) can be difficult to move. It can also cause strange mouse movement. Figure 153. Optical Mouse
  • 264. 250 Procedure: To clean the optical mouse, you must first wipe the bottom cover of the mouse. Turn the mouse upside down to look at the lens. If there is a smudge on the lens, gently clean the area with a plain cotton-tipped swab. If there is debris in the lens, gently blow the debris away from the area. Check the surface on which you are using the mouse. Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's mouse movement. Why? To help keep a mouse clean and germ free it can be helpful to clean the mouse. Procedure: Use a cloth moistened with rubbing alcohol or warm water and rub the surface of the mouse and each of its buttons. Mechanical mouse cleaning Why is it important to clean an optical mouse? A dirty optical-mechanical mouse (mouse with a ball) can be difficult to move. It can also cause strange mouse movement. Procedure: To clean the rollers of an optical-mechanical mouse, you must first remove the bottom cover of the mouse. To do this, examine the bottom of the mouse to see what direction the mouse cover should be rotated. As you can see in the illustration below, the mouse cover must be moved counter clockwise. Place two fingers on the mouse cover and push the direction of the arrows. Figure 154. Cleaning Optical Mouse Figure 155. Mechanical Mouse
  • 265. 251 Once the cover has rotated about an inch, rotate the mouse into its normal position, covering the bottom of the mouse with one hand and the bottom should fall off including the mouse ball. If this does not occur, attempt to shake the mouse gently. Once the bottom cover and the ball are removed, you should be able to see three rollers located within the mouse. Use a cotton swab, finger, or fingernail to remove any substance. Usually, there will be a small line of hair and dirt in the middle of the roller, remove as much as this substance as possible. Once you have removed as much dirt and hair as possible, place the ball back within the mouse and place the cover back on. If the mouse still appears to be having the same issue, repeat the above process. If after several attempts the mouse is still having the same issues, it is likely that your mouse has other hardware issues and we recommend that it be replaced. Note: Cleaning your mouse pad with a damp cloth can also help improve a computer's mouse movement. Why do we need to do this? To help keep a mouse clean and germ free. Procedure: Use a cloth moistened with rubbing alcohol or warm water and rub the surface of the mouse and each of its buttons. Printer cleaning With some printers it may be necessary to clean the inside of the printer to help keep the printer running smoothly. Figure 157. Printer Cleaning Figure 156. Mouse Opening
  • 266. 252 Why do we need to do this? Cleaning the outside of a printer can help keep the printer's appearance looking good; and in the case of a printer that is used by many different people, it will keep the printer clean and free from germs. Procedure: First, make sure to turn off the printer before cleaning it. Dampen a cloth with water or rubbing alcohol and wipe the case and each of the buttons or knobs on the printer. As mentioned earlier, never spray any liquid directly onto the printer. Scanner cleaning Why do we need to do this? Flatbed scanners commonly become dirty with dust, fingerprints, and hair. When a scanner is dirty, the images may have distortions. Procedure: Clean a flatbed scanner's surface by spraying a window cleaner onto a paper towel or cotton cloth and wipe the glass until clean. As mentioned earlier, never spray a liquid directly onto the component. To clean the outside of the scanner, the same towel or cotton cloth can be used. Miscellaneous Cleaning Steps Below are listings of miscellaneous computer hardware that is rarely used today, but some people who will use it and therefore need to know how to clean their devices. Floppy drive cleaning Why do we need the floppy drive? Because dirty read/write heads on the floppy drive can cause errors during the reading or writing process. Figure 158. Scanner Cleaning
  • 267. 253 Procedures: The floppy drive can be cleaned in two different ways. The first method of cleaning a floppy drive; (and our recommended method) is to purchase a kit at your local retail store designed to clean the read/write heads on your floppy drive. The second method of cleaning the floppy drive is only recommended for experienced computer users. Open the floppy drive casing and physically swab the read/write heads with a lint-free foam swab soaked in pure alcohol, or trichloroethane. When performing these steps, be extremely careful when cleaning the heads to ensure that you do not lock them out of alignment causing the floppy drive not to work. To help prevent the heads from becoming out of alignment, use a dabbing motion lightly putting the swab on the head and removing it, do not perform a side-to-side motion with the swab. Ways to Improve your Computer's Performance Disk Defragmentation Fragmentation makes your hard disk do extra work that can slow down your computer. Removable storage devices such as USB flash drives can also become fragmented. Disk Defragmenter rearranges fragmented data so your disks and drives can work more efficiently. Disk Defragmenter runs on a schedule, but you can also analyze and defragment your disks and drives manually. When you store data into the hard disk, the data will normally occupy the disk in continuous manner if there is sufficient data space on disk. Imagine if you delete some data files, this will then leave some "gaps" in data space. When new data files need to be stored and if the size of these data files could not fit into a single gap, the data files will be segmented and fitted across several gaps with interval. Your hard disk progressively becomes fragmented after excessive usage of writing, deleting and storing of data into your disk.
  • 268. 254 A file is typically broken into several small parts and stored in various areas on a hard disk. When a read request is executed, the disk will search for the multiple pieces, process and link them and finally present it on screen from the computer when you read a file or execute an application. Besides improvement in system performance, disk defragmentation will also improve data recovery yield in case your disk needs to be sent in for recovery process. For a similar reason, you should not perform defragmentation after accidental data deletion as this will overwrite the deleted data when data blocks are moved or replaced. To defrag your hard disk, follow these steps: 1. Open Disk Defragmenter by clicking the Start button. In the search box, type Disk Defragmenter, and then, in the list of results, click Disk Defragmenter. 2. Under Current status, select the disk you want to defragment. 3. To determine if the disk needs to be defragmented or not, click Analyze disk. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. Once Windows is finished analyzing the disk, you can check the percentage of fragmentation on the disk in the Last Run column. If the number is above 10%, you should defragment the disk. 4. Click Defragment disk. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. Disk Defragmenter might take from several minutes to a few hours Figure 159. Disk Defragmenter
  • 269. 255 to finish, depending on the size and degree of fragmentation of your hard disk. You can still use your computer during the defragmentation process. Notes:  If the disk is already in exclusive use by another program or is formatted using a file system other than NTFS file system, FAT, or FAT32, it cannot be defragmented.  Network locations cannot be defragmented.  If a disk that you are expecting to see under Current status is not showing up there, it might be because it contains an error. Try to repair the disk first, then return to Disk Defragmenter to try again. Cleaning Windows Registry Registry is a system-defined database which is used by an Operating System to store all the information needed to configure the Windows settings for 1 or more users, applications and hardware devices. Information contained in registry includes user's profiles, application installed on the computer, types of documents that are created, setting of properties sheet for each application folder and icon, existing hardware in the system, and all the ports that are being used. Why Cleaning the registry is important When using the computer, users may have experienced quite a number of problems relating to registry issues that may result in severe consequences such as error messages pop-up, noticeably slow performance of a system or even system crash. The reasons leading to these problems, however, are mainly caused by missing or invalid registry key(s) from the Windows registry. Usually, when any particular application is uninstalled from Windows, it is recommended that you should use Add or Remove Programs feature to proceed (Start menu>Control Panel >Add or Remove Programs) However, if you delete any program manually without using this function, you might mistakenly move away the registry key in the OS or even leave behind the orphaned registry key. This, of course, will cause the problem of missing/ invalid registry entries. Other actions include deletion of startup programs, installation of software embedded with spyware or changes in hardware. And because of the above reasons, cleaning Windows registry has become an essential and crucial action that you need to implement regularly.
  • 270. 256 Do it regularly or you might experience losing all important data due to the system breakdown. Can I Delete The Registry By Myself? The answer is "No". When you attempt to remove the registry by your own, the risk that you may remove the valid registry is high because without the registry cleaner software, it is not easy to determine which registry belongs to which application. Therefore this may cause the system to crash or the software to malfunction. How Do I Clean Windows Registry? You can either buy Windows Registry cleaner software available in the market or download a free trial package from the Internet to try out before paying a full version. When run, this software will first identify the problems with your Windows registry such as missing/invalid key references. After that, it will proceed to probe your request for registry removal. Below are some basic and useful features that you must consider when choosing the Registry Cleaner software:  ability to scan for the whole computer system for invalid/ orphan registry  ability to backup all the current registry in the system  have an "undo" feature to restore the cleaning action  options on which to choose registry key(s) to be deleted  online updating of the software should be available Now, with the software running regularly, it will have saved up a large amount of disk space for your PC. The system then will run as smoothly and efficiently like before. Organizing Disk Drive Partition What is Disk Partitioning? Partitioning creates a logical file structure on your hard disk so as to divide various portions of a hard disk to be used for different purposes such as a dual operating systems, storage or organizational purposes.
  • 271. 257 Why Partition Your Disk? Partitioning your hard disk helps categorize your files into logical groupings so that you can search for files and make changes more effectively. Folders are made for the same reason too. But partitioning provides better security. Security Most default primary partition is the C drive. This is the drive where your operating system and most other software applications are installed in. A useful way of protecting your data is to store your personal information into a separate disk partition. For example, if you are using a 80GB hard disk, you might want to partition it into two drives - drive C & drive D. Drive C will contain your operating system files and software applications such as your Microsoft Office Suite, Adobe Acrobat, Antivirus, Photoshop etc., while drive D can be configured as a storage drive to store all your document files, JPEG, MP3 and other personal data. It is understood that your most important files are those that are difficult or virtually impossible to replace. For example, if Microsoft Word crashes, you can always reinstall the application to make it work again. However, if your document files are corrupted by a virus or worm, you may need to spend money and precious time trying to recover your data. In some cases, you may not be able to recover them if the damage is too severe. Statistics have shown that most viruses and worms are more likely to infect executable and system files compared to your MP3 or excel spreadsheets. Therefore, if one partition corrupts, only that partition suffers and hopefully not the whole drive. Convenience Another reason for storing your document files in a separate drive is the ease of manageability. Say in a scenario where your computer needs to be reformatted due to severe corruption, you can easily reformat drive C and be assured that all your documents in drive D remains intact. This will save you time trying to backup your documents, then restoring them back in your local drive after your computer is reformatted and starts working. In this way, should you decide to refresh your operating system or application, the stored data will not be affected.
  • 272. 258 Dual Operating System You may wish to install more than one operating system into your computer. For example, you need to use a Windows and Linux operating system. But both are unable to be installed in the same partition. By partitioning the disk, you separate two logical spaces to include each individual OS. Evaluating your Needs Ask yourself the following questions to help you determine the kind of partitions to create: 1. Do you work more on documents than on software? 2. Does your job require you to install multiple software applications? 3. Does the size of your software exceed that of your documents? The objective here to is to study the space ratio to allocate for each partition. The choice of how you partition your disk is important because it affects both disk performance and efficiency. If you are a designer or sound engineer given a computer with 80GB of disk space, you probably would want to assign 25GB of capacity to your primary disk and 55GB to a secondary drive to contain all your media files. You can always adjust this ratio according to your needs. On the other hand, if you are a software tester or a hardcore gamer, you would probably choose to assign 50GB to your primary disk and 30GB to the secondary drive for storage. Again, there is no fixed rule or a standard template and much is directly dependent on your needs and how you operate. Defragmentation Issue Direction: In this activity, you will list down at least five importance of defragmentation and partitioning and its effect a computers performance.
  • 273. 259 UNDERSTANDING PARTITIONS The master boot record is the first register that resides in your hard disk. It is located at the first sector of the disk and the first program that runs each time you power up your computer. The master boot record contains two important structures - the master boot code and the master partition table. Both provide instruction and information and how your computer boots up. Due to its structure, a single hard disk is limited to four primary partitions. One of it will be assigned as the active partition to contain your operating system. Simply, You can create four primary partitions, or three primary partitions and one extended partition which can be subdivided into multiple logical partitions. For example, you may want to split your 80GB disk as follows:  40GB primary partition for your OS and software applications  10GB for MP3 files  15GB for Document files  5GB for Miscellaneous files  10GB for Archival files First, you create a 40GB primary partition. This will occupy the first of the 4 partitions. Then you can create a 40GB extended partition. And within the extended partition, you create four logical partition - 10GB, 15GB, 5GB & 10GB. So the result of this will be a C drive (40GB), D drive (10GB), E drive (15GB), F drive (5GB) and an H drive (10GB). MAKING A DISK IMAGE BACKUP Making a duplicate image or cloning a drive is often used in data recovery to ensure that the original media where data has been lost is untouched while recovery is done on the cloned drive. It can also be used as a backup procedure. However, it is risky because all the data duplicated will be along with whatever viruses and malware that infected the drive.
  • 274. 260 BACKUP Creating a backup of files is one of the most important things people do not do, even though it should be their top priority. Never recover lost data on the original media. Make a copy or image of it on another storage media, and recover from that copy. Check Mode of Failure Before you engage in any self-recovery jobs, do the following first:  Check if you have heard any sound prior to your data loss.  notice if the performance of the system degrade.  Encountered any problems while opening files, folders or saving. This is simply to make sure that the loss is logical in nature, and not physical. If you encounter any data loss arising from physical data loss, please send it to a professional data recovery outfit. DUPLICATION - Disk Image Backup Once you have installed the additional storage media, it is time to duplicate it. For that, you can use a free software - ADRC Data Recovery Tools. 1. Download and unzip the program. Installation is not required. 2. Run the software. 3. Under tools, choose the option "Image Backup/Restore". Figure 160. Image Backup / Restore
  • 275. 261 4. There are two radio buttons. Select "Create Image From Disk". 5. Then, in the lower drop down menu, select the drive you want to clone. 6. Save and indicate an image file name. Figure 161. Create Image from Disk Figure 162. Image Disk Drop-Down Menu Figure 163. Filename for Image File
  • 276. 262 Figure 165. Image Backup / Restore 7. Then wait for the operation to finish. Copy Disk Image to Another Drive 1. Once you have created the disk image, you need to copy the image to another drive. 2. Using the same software, under tools, select "Image Backup/ Restore". 3. There are two radio buttons. Select "Store Image Disk". 4. Under "Image File", browse for the image you just created. 5. Then specify the drive you want to extract the image to be cloned. Figure 164. Progress Bar Figure 166. Store Image to Disk
  • 277. 263 Figure 167. Filename for Image 6. The drive you choose will have all its data destroyed. Be warned. 7. Click "Yes", and transfer of image to disk will be completed. Critical Review Now, that you are done with the disk image, read more about disk image through ICT books and other resources. You should consider the following topics for research: 1. Acronis True Image 2. Norton Ghost Image 3. Other disk Image backup software Figure 168. Confirmation Window
  • 278. 264 Online Review After the research, watch this video presentation using the URL below: https://www.youtube.com/watch?v=rS616jQOURg Answer the following questions: 1. What do we need to back-up? 2. Why you need to back-up in the same drive? 3. What other storage media is mentioned on the video? 4. Why is it important to create a system repair disc? 5. What are the different system recovery options? How to Scan Disk Scan Disk is one of the most common maintenance tools bundled with an operating system. This is an application that checks the computer’s hard drive for errors and bad sectors. Once Scan Disk finds an error in the hard drive, it will attempt to fix it. There are a number of reasons for the errors found inside a hard drive and these include:  frequent system crashes;  critical system applications that have been improperly closed; and  the existence of harmful programs such as viruses, trojans, etc. What Does Scan Disk Do? Scan Disk is designed to repair damaged hard drive sectors and clusters on your computer’s hard drive. Majority of errors detected with the utility programs permit the application to recover the data stored in the damaged regions of the hard drive. When Scan Disk finds a bad or damaged cluster during a scan, it will move the information stored in that cluster to a new location on the computer’s hard drive. Scan Disk also checks and repairs the integrity of file systems such as FAT, FAT32, and NTFS.
  • 279. 265 Figure 169. Scan Disk Window Scan Disk requires exclusive access to a drive when it executes. Hence, if one or more of the files are open on the drive that you want to scan, Scan Disk may display a prompt asking if you want to schedule the drive check the next time you restart your computer. Once Scan Disk finishes its task, it provides a report that contains the errors it has found and the amount of disk space it has scanned. It is therefore important for users to use the Scan Disk application because it ensures that their data is safe from being corrupted. Aside from this, there is a guarantee that their computer will perform at optimum levels. The earliest Scan Disk version appeared in MS DOS 6.2. In Windows 95 and 98, Scan Disk was given a graphical user interface (GUI). In this graphical environment, the user can find:  progress bars  buttons  information regarding the status of the scan and the errors (if any) How to Run Scan Disk in Windows 2000 and Windows XP  Press the Start button on desktop.  Double click on My Computer.  Highlight the disk to be scanned for bad sector on the list of Hard Disk Drives.  Open the File menu and select Properties option.  Select the Tools tab.  Click the Check Now button.  The scanning process will then initiate. Figure 170. Disk Defragmenter window
  • 280. 266 How to Run Scan Disk in Windows Vista  Click the Computer icon on the desktop.  Right click the drive to be scanned with Scandisk and select Properties.  Click on the Tools tab. Under the Error-checking sub heading, click the Check Now button.  A window named Check Local Disk will appear. To attempt to correct errors, check the Scan for and attempt recovery of bad sectors checkbox.  Click Start to initiate the disk scan. In Vista, it is required to schedule the Scandisk to run at boot time as Vista has mechanisms that do not allow it to run while the system is operating. Run Scan Disk on Windows 7 In the deployment of Windows 7, the Scan Disk utility underwent a name change and is now called “CHKDSK” that performs the same functions as the legacy application for the Operating System. Run CHKDSK Using the Graphical User Interface (GUI) Step 1 – Select the “Computer” option from the Start menu. Step 2 – Right click the drive to check for errors followed by clicking the “Properties” menu button. Step 3 – Select the “Tools” menu option followed by the “Check Now” menu button. If the computer drive is in use, the Operating System will display a dialogue menu asking if you desire to schedule a full scan in the future. Run CHKDSK from the DOS Command Prompt Alternatively, CHKDSK can be run from the DOS or Command prompt on the Windows 7 OS. Step 1 – Open the DOS prompt on your computer by selecting the “Start” and “Run” menu options. Step 2 – Enter “cmd” followed by the “enter” key to open the command prompt. Step 3 – Enter “chkdsk c:” to initiate a system check of the local hard drive. If you desire all errors to be fixed through invocation at the DOS
  • 281. 267 prompt, enter “CHKDSK c: /F /R” to find and fix all errors on the local drive. If your hard drive is labeled with a different letter than “c” just replace the letter in the above example with the actual hard drive letter on your computer. Answer the following questions in your answer/test notebook. 1. What are the things that the scan disk could do in a computer? How often do you use scan disk your computer? 2. Computers should be protected from errors to prevent component malfunction. What are the things you should do to avoid such malfunction? 1. Concept Mapping In this activity, write in the figures the concepts that relate to the word “scan”. Add more shapes if you want. 2. Scan Flash Drive Scanning your flash drive will enable you to check if there are some errors in it. Here's How: a. Press the Start button on desktop or double-click the My SCAN
  • 282. 268 Computer icon on your desktop. b. Select or highlight the flash drive to be scanned for bad sector on the list . c. Open the File menu and select Properties option. d. Then a window dialogue box will appear, then select the Tools tab. e. Click the Check Now button. The scanning process will then initiate. DELETING TEMPORARY FILES Remove Unnecessary Data Files and Programs Files and programs that are left idle or cluttering in your computer tend to affect the performance of your system. This happens when the disk space is heavily occupied and more computer resources are allocated to keep track of them. During a read request, the disk needs to bypass all unnecessary files to access the required data. Hence, there is a significant performance dip. In certain situations, poorly written applications can cause undesirable effects such as erratic system hangs, blue screens or conflict with other software. Unused Software Application These are usually the software program that you have installed but used rarely if not at all. To remove unwanted programs and applications, follow these steps:  Click Start, point to Settings, select Control Panel.  Double click on the Add/Remove Programs icon.  Select the unused program and click on the Remove button. Figure 171. Add or Remove Programs Window
  • 283. 269 Temporary Internet Files These are files that accumulate in your computer when you surf the web. Temporary files such as graphics, web pages and cookies are downloaded into a special temporary folder to facilitate efficient web browsing. To delete all temporary Internet files, follow these steps:  Click Start, point to Settings, select Control Panel.  Double click on Internet Options.  Under the Temporary Internet Files group box, click the Delete File button.  Check the Delete All Offline Content option on the new window and click Ok. Figure 172. Internet Properties Window
  • 284. 270 Windows Temporary Files Windows temporary files are generated and stored in your computer each time you perform a software installation or procedure. Very often, poorly written programs fail to delete them, hence causing them to be left idle in your disk. To delete these temporary files, follow these steps:  Click Start, point to Programs, point to Accessories.  Point to System Tools and select Disk Cleanup.  Select the drive to clean up  Click OK. Computer Terminologies Answer the following questions in your notebook. You may research on the internet for your answers.  What is the meaning of “cache”? internet cookies?  How is this concept related to temporary files? What are its effects in the computer operation? Can these files be also removed or deleted to speed up computer operation? Figure 173. Select Drive Dialogue Box Figure 174. Disk Cleanup Dialogue Box
  • 285. 271 Deleting Temporary Files Directions: Choose your partner. Perform the process of deleting of temporary internet files. You will be graded using the Performance Score Card below: CRITERIA Passed Failed 1. Sequence of steps in deleting is followed. 2. Safety precautions are observed. 3. The students cooperatively performed the activity. PERFORMANCE RATING Disk Cleanup Disk Cleanup is a computer maintenance utility that is included in the Microsoft Windows operating system and is designed to free up space on the hard drive. Disk Cleanup helps free up space on your hard drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache files, and unnecessary program files that you can safely delete. The cleanup process involves searching and analyzing the hard drive for files that are no longer needed. Then it proceeds to remove them and thus freeing up disk space on the hard drive. Here is the list of all the files that can be deleted from Windows XP:
  • 286. 272 1. Downloaded program files 2. Temporary Internet files 3. Offline webpages 4. File for the Recycle Bin 5. Temporary files 6. Web client/publisher temporary files 7. Compressed old files 8. Catalog files for the content indexer Disk Cleanup is a feature of Windows that enables a user to delete system/junk files safely. For example, by using the disk cleanup feature, you can free up a considerable amount of space on your PC, like getting rid of TIF (Temporary Internet Files) and other 'useless', and not required, files. To reduce the number of unnecessary files on your hard disk to free up disk space and help your computer run faster, use Disk Cleanup. It removes temporary files, empties the Recycle Bin, and removes a variety of system files and other items that you no longer need. To delete files using Disk Cleanup The following procedure cleans up files associated with your user account. You can also use Disk Cleanup to clean up all the files on your computer. 1. Open Disk Cleanup by clicking the Start button . In the search box, type Disk Cleanup, and then, in the list of results, click Disk Cleanup. Figure 175. Disk Cleanup Dialogue Box
  • 287. 273 2. In the Drives list, click the hard disk drive that you want to clean up, and then click OK. 3. In the Disk Cleanup dialog box, on the Disk Cleanup tab, select the check boxes for the file types that you want to delete, and then click OK. 4. In the message that appears, click Delete files. Remove Unnecessary Startup Programs Some applications are automatically configured to load each time you boot into Windows. These programs are usually represented by icons that are loaded in your system tray (the panel located at the bottom right corner of your screen). Most of which are unnecessary and tend to take up unnecessary system resources which often slow down your computer. Microsoft provides a tool called the System Configuration Utility that enables you to configure the programs to be loaded during startup. To use this utility, follow these steps: 1. Click Start, point to Run. 2. Type in: msconfig 3. Click on the Startup tab. Figure 176. System Configuration Window
  • 288. 274 4. A list of options will appear indicates that the programs that start up each time you load Windows. 5. Tick only those that are necessary and click OK. 6. Restart your computer. Click Restart. If you are a Windows 2000 and Windows NT users, you can still use the same program msconfig.exe. Since Microsoft did not include the utility in these two versions of Windows, you have to download it. Once you have downloaded the file into your computer, follow these steps: 1. Unzip the file. 2. Copy the msconfig.exe file into the C:winntsystem32 folder. 3. To access the utility, click Start, select Run and type in: msconfig. Ignore the error messages about not being able to find the following files: o config.sys o autoexec.bat o win.ini o system.ini Activity: Internet Research In this activity, you will learn how useful the Internet can be for a PC support technician. Do the following tasks: 1. Research online for the importance of Disk Cleanup and when to apply it. 2. List down the advantages and effects to the computer system.
  • 289. 275 Activity Directions: Delete temporary files in different Operating Systems. 1. Delete Temporary Files in Windows 7 and Windows 8 2. Delete Temporary Files in Windows XP Manually cleaning out the Tempfolder in Window XP is often a necessary maintenance step when the Windows XP Disk Cleanup utility fails to clean out the Tempfolder automatically. Removing temporary files is a quick and easy task that can help save disk space and keep your PC clean of file clutter. Just follow the step-by-step directions below to manually clean out the Tempfolder: Time Required: Manually cleaning out the Temp folder in Windows XP usually takes less than 5 minutes. Here's how: 1. Click on Start and then Run. 2. In the text box in the Run window, type %Temp% and click OK. A folder full of files and other folders will appear. All of the folders and files you see in this Temp folder are no longer being used by Windows XP and can safely be deleted. 3. To remove individual folders or files, hold down your Ctrl key while left- clicking on each item you want to delete. Release the Ctrl key when you are finished. To delete these items, press Delete key or choose File and then Delete from the menu. 4. Confirm that you want to delete the files by clicking Yes on the Confirm Multiple File Delete window that opens. 5. If you like to remove everything inside the Temp folder, choose Edit and then Select All from the menu.
  • 290. 276 Note: If you are prompted that there are hidden files in this folder, just click on OK to bypass the message. A few hidden files hanging out in the Temp folder probably are not important enough to worry about. 6. Now that all of the files and folders are selected, press your Delete key or choose File and then Delete from the menu. 7. Confirm that you want to delete the files by clicking Yes on the Confirm Multiple File Delete window that opens. 8. After all of the files have been deleted you can close the window and empty your Recycle Bin, permanently removing the files from your PC. Note: 1. You may receive an Error Deleting File or Folder message while the files are being deleted. This just means that one of the files is in use by a program. Click OK, close all open programs, and repeat the steps above. If you still receive the message, try restarting your PC and repeating the process.
  • 291. 277 Lesson 3. Maintain Network Systems Maintaining computer system and network increases efficiency and saves you from the hassle and expense associated with major repairs. However, it is essential to understand how to schedule maintenance plans and implement it accordingly. By learning when maintenance is practical and developing a scheduling strategy, you can set up maintenance strategies that are beneficial to your computer system and network. The following are the procedures on how to maintain computer system and networks: Create an Equipment Maintenance Schedule In order to perform the maintenance of your computer efficiently, a maintenance schedule is made to guide the personnel in the proper maintenance procedure. This will help them remember the maintenance task that needs to be done in order to improve the functionality of the computer system and networks. Create a Maintenance Checklist To determine if the maintenance program is implemented according to what is planned, an assessment must be done. The result of the assessment will then be recorded and reported to the proper authorities for immediate action. The assessment is through regular inspections which assure that the maintenance activities are done on the date and time they were was planned and that the performance levels adhered to the defined standard. Below is a sample Maintenance Inspection Checklist. This checklist will confirm if the maintenance activities have been performed in order to prolong the life of this particular equipment. The inspection items are stated in question form as these serve as the criteria or standards of maintenance.
  • 292. 278 Perform the computer maintenance task regularly. Just knowing all the basics of computer maintenance task schedule clearly will not be enough. Find time to apply all of the maintenance procedure regularly and frequently. Make computer maintenance activities a regular practice, so that you always have a fine tuned computer with good performance. Perform Network Maintenance Procedures Networks are used to transmit information and electricity through cables. When installing these networks, at most care must be applied to protect the network installers from injury. Procedures must also be followed to ensure that those around the network cables do not become the victims of electrical fires or other hazards. 1. Duct Systems Networks are sometimes installed in duct systems. There is a concern that the network cables might become damaged during construction, so the ducts must be built away from planned future road construction and utilities, according to the International Telecommunication Union. The manholes placed
  • 293. 279 in the roads must be kept away from intersections so that the network installation and repair workers are not at risk of being hit by a vehicle. Optical Lasers Networks that use optical lasers uses invisible radiation that is emitted by these lasers. Before installing the laser, the laser operation manual and safety guide must be read, according to Net Ap. No one should stare inside the optical ports from where the lasers emit their light or else blindness could result. When working with the laser, safety goggles must always be worn. Falling Many networks are run along utility poles, which are wooden poles that have network cables raised high above the ground. When installing these cables, falling can be disastrous given the height of the utility poles. Therefore, network installers should wear safety harnesses to ensure that they do not fall. De-Energize Some networks have cables that are electrically charged. These cables must be de-energized and tests should be used to ensure that the cables do not have any remaining electricity in them. The tools that are used for repairing the cables are insulated so that electricity does not travel through them and into the hands of the line repairer. Cable Safety Standards Network cables must have certain characteristics to be legally used for networks. The cables must not produce flames that can ignite anything. They must not have halogen. They must not produce acidic fumes. They must be resistant to ionizing radiation. Cables must be coded so that those working with the cables can identify what they are. Cable Inspection Networks must only be installed by licensed professionals. Building inspectors must check the network cables to ensure that they are installed properly and that they will not create a fire
  • 294. 280 hazard. These building inspections are especially important when the property containing the network cables is sold. General Safety Safe working conditions help prevent injury to people and damage to computer equipment. A safe work space is clean, organized, and properly lighted. Everyone must understand and follow safety procedures. Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best practice, make sure that a fire extinguisher and first-aid kit are available in case of fire or injury. Poorly placed or unsecured cables can cause tripping hazards in a network installation. Cables should be installed in conduit or cable trays to prevent hazards. These are some of the basic safety precautions to observe when working on a computer:  Remove your watch and jewelry and secure loose clothing.  Turn off the power and unplug equipment before performing service.  Cover sharp edges inside the computer case with tape.  Never open a power supply or a CRT monitor.  Do not touch areas in printers that are hot or that use high voltage.  Know where the fire extinguisher is located and how to use it.  Keep food and drinks out of your work space.  Keep your work space clean and free of clutter.  Bend your knees when lifting heavy objects to avoid injuring your back. Electrical Safety Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the home and the workplace. Power supplies and CRT monitors contain high voltage. CAUTION Only experienced technicians should attempt to repair power supplies and CRT monitors.
  • 295. 281 Some printer parts become hot during use, and other parts might contain high voltage. Check the printer manual for the location of high-voltage components. Some components retain a high voltage even after the printer is turned off. Make sure that the printer has had time to cool before making the repair. Electrical devices have certain power requirements. For example, AC adapters are manufactured for specific laptops. Exchanging power cords with a different type of laptop or device may cause damage to both the AC adapter and the laptop. Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical shock and to prevent damage to the computer, turn off and unplug the computer before beginning a repair. The following are general information on electrical safety:  Electrical equipment that is plugged into a power source should NEVER be handled if your hands or feet are wet.  Do not allow cables and plugs to get wet. Thus, keep liquids away from electrical equipment.  Unplug equipment by pulling on the plug, not the cord.  Damaged electrical equipment that constitute an electrical hazard are not to be used until properly repaired or replaced.  Never connect electrical cords in series.  All electrical circuit disconnects or panels must not be blocked.  Ground pins on the plugs and the devices plugged into the receptacles must be intact.  Do not store flammable liquids near electrical equipment. Fire Safety Fire can spread rapidly and can be very costly. Proper use of a fire extinguisher can prevent a small fire from getting out of control. When working with computer components, be aware of the possibility of an accidental fire and know how to react. Be alert to notice odors being emitted from computers and electronic devices. When electronic components overheat or short out, they emit a burning odor. If there is a fire, follow these safety procedures:
  • 296. 282  Never fight a fire that is out of control or not contained.  Always have a planned fire escape route before beginning any work.  Get out of the building quickly.  Contact emergency services for help.  Locate and read the instructions on the fire extinguishers in your workplace before you use them. Be familiar with the types of fire extinguishers used in your country or region. Each type of fire extinguisher has specific chemicals to fight different types of fire. Types of Fires Not all fires are the same. Different fuels create different fires and require different types of fire extinguishing agents. Class A Class A fires are fires in ordinary combustibles such as wood, paper, cloth, trash, and plastics. Class B Class B fires are fires in flammable liquids such as gasoline, petroleum oil and paint. Class B fires also include flammable gases such as propane and butane. Class B fires do not include fires involving cooking oils and grease. Class C Class C fires are fires involving energized electical equipment such as motors, transformers, and appliances. Remove the power and the Class C fire becomes one of the other classes of fire. Class D Class D fires are fires in combustible metals such as potassium, sodium, aluminum, and magnesium.
  • 297. 283 Class K Class K fires are fires in cooking oils and greases such as animals fats andvegetable fats. Some types of fire extinguishing agents can be used on more than one class of fire. Others have warnings where it would be dangerous for the operator to use a particular fire extinguishing agent. Different types of fire extinguishers are designed to fight different classes of fire. The three most common types of fire extinguishers are: Water (APW), Carbon Dioxide (CO2), Dry Chemical (ABC,BC,DC). Water and Foam fire extinguishers snuff the fire by taking away the heat element of the fire triangle. Foam agents also separate the oxygen element from the other elements. Water extinguishers are for Class A fires only - they should not be used on Class B or C fires. The discharge stream could spread the flammable liquid in a Class B fire or could create a shock hazard on a Class C fire. Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen element of the fire triangle and also be removing the heat with a very cold discharge. Carbon dioxide can be used on Class B & C fires. They are usually ineffective on Class A fires. Dry Chemical fire extinguishers extinguish the fire primarily by interrupting the chemical reaction of the fire triangle. Today's most widely used type of fire extinguisher is the multipurpose dry chemical that is effective on Class A, B, and C fires. This agent also works by creating a barrier between the oxygen element and the fuel element on Class A fires. It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to remember the basic rules of fire extinguisher operation:  P: Pull the pin.  A: Aim at the base of the fire, not at the flames.  S: Squeeze the lever.  S: Sweep the nozzle from side to side.
  • 298. 284 Accomplish the maintenance inspection checklist below. Put a check mark on the column which states an action taken. Do this on your notebook. MAINTENANCE INSPECTION CHECKLIST Equipment Type PERSONAL COMPUTER Property Code PC001 Location Practical Work Area YES NO INSPECTION ITEMS 1. Are the stability of the male plug and other power connections checked regularly? 2. Is the machine regularly cleaned? 3. Is the monitor checked and cleaned regularly? 4. Are the peripherals cleaned and checked regularly? 5. Is the hard disk checked and cleaned regularly? 6. Are the applications regularly updated? 7. Are backing-up of files done regularly? Video Tutorial Directions: Watch the video on http://www.youtube.com/watch?v=cMCCLKDHXqI and make an outline of steps on maintenance procedure or the action taken shown in the video. Weekly Maintenance Checklist Directions: Create a weekly maintenance checklist for the computer laboratory. Include all the computer and network hardware. You will be given 40 minutes to complete the task. You can use any applications in creating the checklist. Present your output to the class.
  • 299. 285 Excellent (3) Good (2) Poor (1) Hardware/Peripherals All hardware/peripherals were enumerated Format Layout of the checklist is good. Details Important details were included such as dates, checker’s name, area/room, remarks, conditions, etc. Handwriting Legible. Good spacing and alignment. Total Points Burn-In Testing Burn-in testing enables you to run test scripts and to create new scripts. The Diagnostics main menu provides two burn-in selections, Immediate Burn-In Testing and Deferred Burn-In Testing.  Immediate Burn-In enables you to run an existing script and to select configuration options. Deferred Burn-In enables you to create a new script. Standard Scripts Sun provides three ready-made scripts designed to test the general health of the devices on your system. These scripts include:  quick.tst
  • 300. 286 This script performs a series of tests that require the user to interact with the test software. When they require a user interaction, they stop and do not time out. These tests are faster than the full.tst but they are less thorough. For example, they do not run all the tests associated with a DIMM.  noinput.tst This script performs a non-detailed test of most hardware components, excluding those components that require user input (keyboard, mouse, sound, and video). This test does not require user input. It is normally the first test performed for hardware-related problems.  full.tst This script performs a detailed and comprehensive test on all hardware components, including those that require user input. It includes external port tests and requires loopback connectors on COM ports, parallel ports, and USB ports. You must interact with the test utility to progress through these interactive tests. Performing Immediate Burn-In Testing Use Immediate Burn-In Testing to run test scripts. To Perform Immediate Burn-In Testing 1. From the Diagnostics main menu, select Immediate Burn-In Testing. The screen displays a list of settings shown in TABLE 6-3 and a Burn-In menu. 2. From the menu, select Load Burn-In Script.A text box appears. 3. Type the name of the script you want to run, for example quick.tst, noinput.tst, or full.tst. 4. To change any of the options, select Change Options at the bottom of the screen. This opens the Burn-In Options menu, which enables you to modify the options listed in TABLE 6-3 for the currently loaded test script. 5. Select Perform Burn-In Tests. The diagnostics software executes the test script as configured.
  • 301. 287 TABLE 6-3 Continuous Burn-In Testing Options Option Default - General Default using quick.tst, noinput.tst,orfull.tst Script All Possible Choices Pass Control Overall Time Overall Passes Individual Passes, Overall Passes, or Overall Time Duration 01:00 1 Enter any number to choose the time duration of the test Script File N/A quick.tst, noinput.tst, or full.tst quick.tst, noiniput.tst, or full.tst Report File None None User defined Journal File None D:noinput.jrl,D:quick.jrl, or D:full.jrl User defined Journal Options Failed Tests All Tests, Absent Devices, and Test Summary Failed Tests, All Tests, Absent Devices, and Test Summary Pause on Fail N N Y or N Screen Display Control Panel Control Panel Control Panel or Running Tests POST Card N N Y or N Beep Codes N N Y or N Maximum Fails Disabled Disabled 1-9999 Show Results Summary Selecting show results summary on the diagnostics main menu displays the tests that have been run and lists the results, which can be Pass, Fail, or Not Applicable.
  • 302. 288  Processor This section shows the following tests conducted against the processor: Core Processor Tests, AMD 64-Bit Core Tests, Math Co- Processor Tests - Pentium Class FDIV and Pentium Class FIST, MMX Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set, and MP Symmetry.  Motherboard This section shows the following tests conducted against the motherboard: DMA Controller Tests, System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and CMOS RAM/Clock Tests.  Memory, Cache Memory, and Video Memory This section shows the following tests conducted against the various types of memory: Inversion Test Tree, Progressive Inversion Test, Chaotic Addressing Test, and Block Rotation Test.  Input Device This section shows the following tests conducted against the input device: Verify Device, Keyboard Repeat, and Keyboard LEDs.  Mouse This section shows the following tests conducted against the mouse: Buttons, Ballistics, Text Mode Positioning, Text Mode Area Redefine, Graphics Mode Positions, Graphics Area Redefine, and Graphics Cursor Redefine.  Video This section shows the following tests conducted against the video: Color Purity Test, True Color Test, Alignment Test, LCD Test, and Test Cord Test.  Multimedia This section shows the following tests conducted against the multimedia components: Internal Speaker Test, FM Synthesizer Test, PCM Sample Test, CD/DVD Drive Read Test, CD/DVD Transfer (KB/Sec),
  • 303. 289 CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD Seek Time (ms), CD/DVD Test Disk Read, and CD/DVD Tray Test.  ATAPI Devices This section shows the following tests conducted against ATAPI devices: Linear Read Test, Non-Destructive Write, and Random Read/Write Test.  Hard Disk This section shows the following tests conducted against the hard disk: Read Test, Read Verify Test, Non-Destructive Write Test, Destructive Write Test, Mechanics Stress Test, and Internal Cache Test.  USB This section shows the following tests conducted against the USB: Controller Tests and Functional Tests.  Hardware ID The compare test is used to determine the machine ID for the system. This test is not available for the Sun Blade X6275 server module. Print Results Report The Print Results Report option enables you to print results of the diagnosis of your server if it is connected to a printer through a parallel port. Exit The Exit option exits the PC-Check software and reboots the server module. Viewing the PC-Check Results You can use the text file editor to view the results when you run PC-Check manually. To do this, you need to know the name of the file or files produced by the tests. PC-Check Filenames When you run a test, the header of the screen where you invoke the test shows you the name of the output file. For example, when you run the
  • 304. 290 FIGURE 178. PC-Check System Information Menu continuous burn-in test, the name of the output file is PCCHECK.BRN, as you can see in the following figure. Other files are named PCCHECK.xxx, for example, PCCHECK.JNL or PCCHECK.HII. The .HII file is especially important because it shows the entire host configuration at the time of failure. Viewing PC-Check Files with the Text File Editor When you know the name of the output file, you can use the text file editor to view the file. 1. Select the System Information Menu option on the PC-Check Main Menu and press Enter. The System Information Menu appears, as shown here: FIGURE 177. PC-Check Continuous Burn-in Testing Page
  • 305. 291 FIGURE 179. PC-Check Journal File in Text Editor 2. Select the Text File Editor and press Enter. You are prompted for a file name. 3. Type in the file name (for example, PCCHECK.JNL) and press Enter. The editor opens with the file displayed, as shown here:
  • 306. 292 Lesson 4. Inspect Computer Systems and Networks OHS Procedures in Maintaining Network Systems In general, testing is finding out how well something works. In terms of human beings, testing tells what level of knowledge or skill has been acquired. In computer hardware and software development, testing is used at key checkpoints in the overall process to determine whether objectives are being met. For example, in software development, product objectives are sometimes tested by product user representatives. When the design is complete, coding follows and the finished code is then tested at the unit or module level by each programmer; at the component level by the group of programmers involved; and at the system level when all components are combined together. At early or late stages, a product or service may also be tested for usability. Safety Precautions Occupational Health and Safety (OHS) Policy –An Information and Communication Technology (ICT) student should know how to behave when working in the computer laboratory, and how to implement a safe way of accomplishing every task. Safety practices should be learned early and always adhered to in working with any electrical and electronic device, including personal computers and its peripherals. This is for your protection as well as to the people working with you, and for the devices that you are using. The basis for this process begins with Occupational Health and Safety Policies. Occupational Safety and Health (OSH) is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. Health and safety procedure is the responsibility of all persons in the computer and technology industries. You must identify the hazards where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk that it presents.
  • 307. 293 Occupational Health and Safety standards Each student has a responsibility to their colleagues and their organization to report and act upon any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present in their work environment. Procedure 1. Identify the hazard. 2. Clear the area close to the hazard. 3. Partition the hazard off or clearly identify the area to protect other people from harm. 4. If the hazard can easily and safely cleared, then do so. If not… 5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance. 6. Following clearing of the hazard fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards. Maintenance of the Computer Systems and Networks Diagnostic Software for Network Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the possible network issues that prevent you from using your computer to the fullest. With Network Diagnostic Tool, you can quickly identify the problems you may be having, which sometimes occur with home computers that are connected to the web via cable or DSL modems. The Network Diagnostic Tool is a utility that analyzes your system and performs a wide range of tests to determine the cause of your connectivity issues by investigating all your network-related services and programs, looking into your IP configuration and default gateway, but it will also test out the DNS and Firewall. Moreover, Network Diagnostic Tool can also run an Internet connection validation test, in the interest of discovering the underlying
  • 308. 294 problems and gathering all the information you may need with a minimal level of effort for you. The program will assist you during the troubleshooting operation, enabling you to save significant amounts of time by sparing you from finding the causes of your network problems by yourself. There are free available network diagnostic tools that can be download online, such as Wireshark and TCPdump. It will help you monitor your network performance and highlight discrepancies that might point to underlying malicious activity. Testing Demonstration To check the vulnerability or stability of your network connection, go to the internet and download a free network diagnostic tool.  Go to any search engine and type – network diagnostic tool.  After downloading the application, run the setup file of the program and install it into your computer.  If the program was already installed, run the application. Take note of the diagnosis. Do some action if there are problems or errors encountered. Network Diagnostics for Windows XP tool Directions: Visit the link on http://support.microsoft.com/kb/914440. Follow the instructions given and apply them to your computer. You are to be rated according to the rubric below.
  • 309. 295 Rubric for your Performance Test CRITERIA Excellent 4 Good 3 Fair 2 Poor 1 Adherence to the sequence of setup -Followed carefully the given instructions. Workmanship -Had organized materials and tools while accomplishing the task and has time management. Quality of work -Presented a neat final output. Schedule and Techniques in Maintaining Systems Regular maintenance is essential to keep a network running well. You should also be prepared to upgrade equipment and software periodically to take advantage of improving technology. System Restore System Information maintains a history of device drivers that are installed on your computer. If you are unsure of a computer's recent history, you can use System Information to better understand what has happened in the past. If a device does not work correctly, and its history indicates a recent upgrade to a new driver, replace that driver with the original driver, and test to see if doing so resolves the issue. System Information also provides access to tools you can use for troubleshooting your computer.
  • 310. 296 Figure 180. System Restore Window If you install an update from the Windows Update Web site, and it fails to meet your expectations, restore the original files by running the Update Wizard Uninstall from the Tools menu in the System Information tool. If your computer worked fine yesterday, but is not working properly today, try restoring yesterday's configuration files by running the System Restore utility from the Tools menu in the System Information tool. To start Microsoft System Information, use either of the following methods:  Click Start, point to Programs, point to Accessories, point to System Tools, and then click System Information.  Click Start, click Run, type msinfo32.exe in the Open box, and then click OK. To start System Restore  Click Start, point to Programs, point to Accessories, point to System Tools, and then click System Restore; or  Click Start, click Run, type System Restore in the Open box, and then press Enter key. Then, it will prompt you to the dialogue box shown below:  Click Next button, then it will prompt you to restore your computer to the state it was working properly. Tick on Show More Restore Points then check the box below to display other possible options you can choose.
  • 311. 297  Choose a Restore Point given on the list and select Next.  Finally, choose Finish button to proceed with the process. Wait for the computer to automatically restart as it undergoes system restore. Figure 181. System Restore Window with More Restore Points Figure 182. Confirm Restore Point Window
  • 312. 298 After doing the performed task, you will be assessed using the following criteria: CRITERIA Excellent (3) Good (2) Poor (1) 1. Sequence of steps is followed. 2. Safety precaution is observed. 4. Speed (Worked in a fast manner). PERFORMANCE RATING Network Monitoring Network monitoring refers to the practice of overseeing the operation of a computer network using specialized management software tools. Network monitoring systems are used to ensure availability and overall performance of computers (hosts) and network services. Network Monitoring Software Tools The ping program is one example of a basic network monitoring program. Ping is a network administration utility or tool used to test connectivity on an Internet Protocol (IP) network. It also measures the latency or delay between two computers. Ping is a software tool available on most computers that sends Internet Protocol (IP) test messages between two hosts. Anyone on the network can run these basic ping tests to verify the connection between two computers is working and also measure the current connection performance.
  • 313. 299 Testing Network Connection with Ping Symptoms:  wants to test the network using Ping  wants to test the latency of the network 1. Open the Command Prompt or Terminal. Every operating system has a command line interface that will allow you to run the Ping command. The Ping command operates virtually and identically on all systems. If using Windows, open the Command Prompt. Click the Start button and enter "cmd" into the Search field. Windows 8 users can type "cmd" while on the Start screen. Press Enter to launch the Command Prompt. 2. Type ping followed by an IP address or a website address then press Enter key to execute the command. Here is a brief explanation of commonly used ping commands: o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the loopback step fails, it might be because the TCP drivers are corrupted, the network adapter might not be working, or another service is interfering with IP.) o ping <IP address> (This will ping the IP address of a device like a local computer, remote server or any client that receives an IP address to verify that it is reachable and that you can communicate with it properly.) Example: ping 192.168.1.1 (this is the default IP address of NETGEAR routers) o ping<website address> (This command will test for the Internet connectivity and DNS functionality.) Example: ping www.netgear.com, ping google.com
  • 314. 300 Figure Command Prompt Window Here is a screenshot of a successful ping test: The first arrow shows the computer we are trying to reach is responding. (The DNS address "www.netgear.com" is displayed into the equivalent IP address, 10.1.1.86.) This also shows that the computer is online and it has Internet access. The second arrow shows that all of the sent packets are received showing that there is 0% loss. This means that the connection is available and stable. The third arrow shows the average time it took to answer. "Average = 0ms" is the best possible result. This kind of result is usually received if the device you tried to reach is within the same network. Common Ping Test Problems 1. Request Timed Out. This message indicates that no reply messages were received within the default time of 1 second. This can be due to many different causes; the most common causes arenetwork congestion, failure of the ARP request, packet filtering, routing error, or a silent discard. Most often, it means that a route back to the sending host has failed. This might be because the destination host does not know the route back to the sending host, or one of the intermediary routers does not know the route back, or even that the destination host's default gateway does not know the route back. Check the routing table of the destination host to see whether it has a route to the sending host before checking tables at the routers. Figure 183. Command Prompt with Ping command
  • 315. 301 2. Unknown Host This error message indicates that the requested host name cannot be resolved to its IP address; check that the name is entered correctly and that the DNS servers can resolve it. 3. Destination Host Unreachable This message indicates one of two problems: either the local system has no route to the desired destination, or a remote router reports that it has no route to the destination. The two problems can be distinguished by the form of the message. If the message is simply "Destination Host Unreachable," then there is no route from the local system, and the packets to be sent were never put on the wire. Use the Route utility to check the local routing table. If the message is "Reply From < IP address >: Destination Host Unreachable," then the routing problem occurred at a remote router, whose address is indicated by the "< IP address >" field. Use the appropriate utility or facility to check the IP routing table of the router assigned the IP address of < IP address >. If you pinged using an IP address, retry it with a host name to ensure that the IP address you tried is correct. Practicing TCP/IP Networking Skills While connected to the Internet or another TCP/IP network, answer these questions: 1. What is your current IP address? 2. Release and renew your IP address. What is your new IP address? 3. Are you using dynamic or static IP addressing? How do you know? 4. What is your adapter address for this connection? 5. What is your default gateway IP address?
  • 316. 302 Network Checking Direction: Check the network status by using the ping command. Make a status report on the results. 1. Ping a website. 2. Ping the router. 3. Ping a terminal/computer. Rubric for your performance Test Criteria Percentage Grade Accuracy 50 % Adherence to the procedures 20% Workmanship(applied safety precautions) 20% Speed 10% Performance Rating
  • 317. 303 Computer Communications Although computers communicate on many different levels and there is a great deal of variation between the different types of computer systems involved, the basic communication process is relatively uniform and standardized. Essentially, computers communicate with one another over networks that are connected via wire or wireless communication methods. There are many different types of networks, and there are many different types of network-connection methods as well. As mentioned before, there are many types of networks. From smallest to biggest, the most common network types are personal area network, local area network, campus area network, metropolitan area network, wide area network, global area network and internetwork. The basic difference between these network types is their size (how many remote computer systems are connected to them) and their method of connection. Methods of Connection Commonly Used There are many different types of connection media that are used in contemporary society to connect computer networks to one another. In terms of wired connections, there is coaxial cable, fiber-optic cable, USB cable and traditional telephone lines. These are the most common network connections. Wireless technologies differ hugely from one another, but the most popular kinds are Bluetooth and WiFi. How network works - Computers in network General Network Techniques - When computers communicate on a network, they send out data packets without knowing if anyone is listening. Computers in a network all have a connection to the network and that is called to be connected to a network bus. What one computer sends out will reach all the other computers on the local network. Figure 184. General Network
  • 318. 304 For the different computers to be able to distinguish between each other, every computer has a unique ID called MAC-address (Media Access Control Address). This address is not only unique on your network but unique for all devices that can be hooked up to a network. The MAC-address is tied to the hardware and has nothing to do with IP-addresses. Since all computers on the network receive everything that is sent out from all other computers, the MAC-address is primarily used by computers to filter out incoming network traffic that is addressed to the individual computer. When a computer communicates with another computer on the network, it sends out both the other computer’s MAC-address and the MAC- address of its own. In that way the receiving computer will not only recognize that this packet is for it but also who sent this data packet so a return response can be sent to the sender. In an Ethernet network as described here, all computers hear all network traffic since they are connected to the same bus. This network structure is called multi-drop. One problem with this network structure is that when you have, let say ten (10) computers on a network and they communicate frequently and due to that they send out data packets randomly, collisions occur when two or more computers sends data at the same time. When that happens, data gets corrupted and has to be resent. On a network that is heavy loaded, even the resent packets collide with other packets and have to be resent. In reality this soon becomes a bandwidth problem. If several computers communicate with each other at high speed they may not be able to utilize more than 25% of the total network bandwidth since the rest of the bandwidth is used for resending previously corrupted packets. The way to minimize this problem is to use network switches.
  • 319. 305 FIGURE 185. Combined Modem and Router Set up a DSL or cable connection To set up a Digital Subscriber Line (DSL) or cable connection, you first need an account with an Internet Service Provider (ISP). For DSL, the ISP is usually a phone company; for cable, it is usually a cable TV provider. You will also need a modem, a router, or a device that combines the two. When you have your modem and router or your combination device, follow the corresponding steps below. How to plug in a combined modem and router properly 1. Plug the device into an electrical outlet. 2. Plug one end of a phone cord or cable into the wide area network (WAN) port of the device, and then plug the other end into the wall jack. The WAN port should be labeled "WAN." (DSL users: Do not use a DSL filter on the phone line.) 3. Plug one end of an Ethernet cable into the local area network (LAN) port on the device, and then plug the other end into the networking port of the computer that you want to connect to the Internet. The LAN port should be labeled "LAN." (If you are connecting wirelessly, skip this step.) 4. Start (or restart) the computer. 5. Open the Connect to the Internet wizard by clicking the Start button, clicking Control Panel, click Network and Internet, click Network and Sharing Center, click Set up a connection or network, and then click Connect to the Internet.
  • 320. 306 FIGURE 186. Modem and Router properly plugged-in How to plug in modem and router properly 1. Plug the modem into an electrical outlet. 2. Plug one end of a phone cord or cable into the modem, and plug the other end into the wall jack. (DSL users: Do not use a DSL filter on the phone line.) 3. Plug one end of an Ethernet cable into the modem, and plug the other end into the wide area network (WAN) port on the router. 4. Plug the router into an electrical outlet. 5. Plug one end of an Ethernet cable into the local area network (LAN) port on the router, and plug the other end into the networking port on the computer that you want to connect to the Internet. (If you are connecting wirelessly, skip this step.) 6. Start (or restart) the computer. 7. Open the Connect to the Internet wizard by clicking the Start button , clicking Control Panel, clicking Network and Internet, clicking Network and Sharing Center, clicking Set up a connection or network, and then clicking Connect to the Internet. Video Tutorial Directions: Watch the video on http://www.youtube.com/watch?v=KBHyDd2cJBs and make an outline of steps or procedure of the action taken presented or shown in the video.
  • 321. 307 Network Connection Demo You are required to make a network connection using the devices provided. You will be rated according to the criteria given below. Equipment, Tools and Materials Required: - UTP cables - 1 router - 1 hub - 2 PC unit - DSL connection Given the following materials, set-up a network connection on one computer. CRITERIA 1 2 3 4 5  Safety Precautions are observed.  All the UTP cables are properly connected to the computer and hub.  Computer is properly connected and seen in the network.  Proper boot-up and shutdown of the computer is observed. Total:
  • 322. 308 Identify Safety Procedures and Potential Hazards for Users and Technicians Safety in the lab and in the work place is an important issue when working on computers and other electrical devices. General safety guidelines and fire safety guidelines protect the technician and the equipment. General Safety Guidelines Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight. As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury. Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be pulled through ceilings and walls where there are unexpected obstacles or toxic materials. You should wear clothing that protects you from these materials. For example, wear long pants, a long- sleeved shirt, sturdy shoes that cover your feet, and gloves. Most importantly, wear safety glasses. If possible, ask building management, or someone responsible for the building, if there are any dangerous materials or obstacles that you need to be aware of before entering the ceiling area. Cable, Cable Cutters, and Cable-Cutting Safety Hazards All levels of technicians should know the hazards before working with network cables and equipment. This section describes the safety hazards of working with copper cables, which, like fiber-optic cables, can be dangerous to handle. Caution When handling cable, always wear eye protection. Never touch the ends of any type of cable to bare skin. When you cut copper cable, the small copper strands can puncture your skin or cut you. The small pieces that come off after cables are cut often fly into the air. Remember to always wear safety glasses when cutting any type of
  • 323. 309 cable. The cutting and crimping tools used to repair set of terminate copper cables can be dangerous if not used properly. Read the instructions that comes with the tool. Practice using the tool on scrap cable, and ask an experienced installer for help if you need it. Remember that copper cable conducts electricity. A faulty equipment, static electricity, or lightning can energize even a disconnected cable. If in doubt, test the cable you are working on with a simple voltage detector before touching it. Preparing Technical Reports The main purpose of a technical report is to deliver information. Technical reports are intended primarily for the long-term archival of results and descriptions and for monitoring the conditions of laboratory facilities such as the computers, network status and other hardware facilities. A good report needs careful planning. As part of the planning stage, you should answer the following questions.  What is the report about? What are you trying to say? You should arrange things so that the key facts and conclusions are very accessible. Not everyone will read the whole report, so ensure that your message is concise even if a person only skims the document.  Who are you writing for? It is simply impossible to write a technical document that will be equally easy for everybody to read: the level of explanation you need for an expert audience is totally different from the explanation needed for readers who are unfamiliar with the subject. It is absolutely essential that you identify the potential readers — the professional group, not the individuals — before you start your work.  How long can the report be? It is difficult to predict in advance exactly how long a report will be. Technically speaking, writing reports for hardware and other facilities should be specific and itemized.
  • 324. 310 A hardware report can help you to:  identify the hardware components inside your computer – CPU, memory, motherboard etc;  understand conflicting hardware inside your computer; and  help the computer repair person to understand your computer with a written, detailed hardware report (therefore he can find the missing drivers faster, for example). Fill-up the following reports. Sample of simple Technical Reports.
  • 326. 312 Computer Item Enumeration Directions: Enumerate the hardware items that can be seen inside the computer laboratory, applications installed in a computer, network devices, computer tools and others. Creating Computer Hardware – Software – Tools Report Directions: Create Computer Hardware – Software – Tools Report on the available devices in your computer laboratory. Reports will be based on the items inspected in the laboratory. Create your own format. You are to be rated according to the score card below. PERFORMANCE SCORE CARD CRITERIA Percentage Score 1. Originality of format and layout 40% 2. Content of the report 40% 3. Proper use of equipment and materials is observed. 10% 4. Observance of Safety Precautions 10% PERFORMANCE RATING
  • 327. 313 I. Identify what maintenance procedure is described in each situation. __________1. This will allow proper circulation of air inside the computer unit. _________ 2. This will help lessen the attacks of viruses and will increase the life span of your computer. __________3. This means taking care of your computer. __________4. Protecting your files means creating backups, storing your file backups on your hard drive or any removable storage device regularly. __________5. By deleting the temporary files on your computer, it will enhance its speed and will create more disk space for your files. __________6. Regularly update your anti-virus for your computer protection against viruses. __________7. To avoid damage to the computer unit always turn off and unplugged it when trying to transfer the computer to another location. __________8. Installing passwords makes your files more secure. __________9. Maintenance of equipment or systems before fault occurs __________10. This will allow proper circulation of air inside the computer unit. II. Choose the letter of the correct answer: 1) It refers to a list of the key components that make up the computer. a. Specs c. Brand b. Manufactures d. Checklist 2) The main working memory in a computer is called ___________. a. ROM c. Processor b. RAM d. memory chips
  • 328. 314 3) It stores the applications and programs that run on the PC, as well as any work created by users. a. CD/DVD c. Hard drive b. RAM d. Zip drive 4) These cards are installed inside a PC and are responsible for determining the quality of the visuals output by the computer. a. Audio Card c. LAN Card b. Graphics Card d. Adapter card 5) These are the two leading companies when it comes to manufacturing processors. a. HP and Dell c. AMD and Intel b. Epson and Canon d. Acer and Asus 6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per second) card is the standard card specifications today a. Audio Card c. Network Card b. Graphics Card d. Adapter card 7) It is a free open source operating system. a. Microsoft Windows c. Mac OS b. Linux d. Chrome OS 8) A cabling is used to connect your wired network adapters to a router or network switch. a. Internet c. coaxial b. Ethernet d. fiber optic 9) A glue that holds your home network together a. router c. Hub b. DSL d. Ethernet cable 10) The standard transfer speed of your wireless connection is __________. a. 802.11g c. 802.11m b. 801.11g d. 802.11j 11)The wired half of your router has a speed of _____________. a. 10/100 Mbps c. 100/1000 Mbps b. 10/10/100 Mbps d. 10/10/1000 Mbps
  • 329. 315 12) Routers have two types of ports available at the back. Which is not part of it? a. LAN c. MAN b. WAN d. WLAN 13) It basically means to create a redundant copy of a data. a. Data Backup c. System restore b. Image copy d. hardcopy 14) It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. a. Software c. Malware b. Spyware d. Firmware 15) Software is used to identify problems on a computer or piece of equipment. a. Network software tool c. Diagnostic Software tool b. Hardware Software tool d. Firmware software tool 16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently. a. Defragmenter c. software b. Fragmenter d. defrag 17) It is a system-defined database which is used by an Operating System to store all the information needed to configure the Windows settings. a. Registry c. Registration b. Register d. Registering 18) This is an application that checks the computer’s hard drive for errors and bad sectors. a. Scan c. Scan Disk b. System Restore d. Data backup 19) It is a computer maintenance utility that is included in the Microsoft Windows operating system and it is designed to free up space on the hard drive. a. Network software tool c. Scan Disk b. Data Backup d. Disk Cleanup 20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the possible network issues that prevent you from using your computer to the fullest. a. Burn-in c. Diagnostic Software tool b. Hardware Software tool d. Network Diagnostic tool
  • 330. 316 III. Match Column A with Column B Column A Column B 1. Creates and deletes disk partitions A. Scan disk 2. Optimizes use of space on a disk B. Format 3. Prepares a hard drive prior to use C. Defrag 4. Removes unused files. D. Disk Cleanup 5. Checks for physical errors on the disk surface E. Fdisk
  • 331. 317 Books and Articles and Printed Materials: Amy Hisson, “Computer Assembly and Configuration- Lab and Assignments” David Anfinson, Ken Quamme “IT Essentials: PC Hardware and Software Companion Guide” 3rd Edition- 2008 at 800 East 96th Street Indianapolis, Indiana 46240 USA Efraim Turban, R. Kelly Rainer Jr., Richarrd Potter “Introduction to Information Technology” 3rd Edition- 2005 at Rosewood Drive, Denver, John Wisley and Sons(Asia) Pte. Ltd Marigen N. Leosala, Bobby P. Caoagdan, Ronaldo V. Ramilo, and Rosalie P. Lujero “Technology and Livelihood Education- Information and Communications Technology Learners Manual – Grade 7 & 8” Rosalie P. Lujero, Ronaldo V. Ramilo “Technology and Livelihood Education- Information and Communications Technology Learners Manual – Computer Hardware Servicing Grade 9” Electronic Resources: “Definition of Configuration” Retrieved from http://www.webopedia.com/TERM/C/configuration.html “File Sharing” Retrieved from http://www.techopedia.com/definition/16256/file-sharing “Fundamentals of PC repair” Retrieved from http://www.ustudy.in/ce/hard/u1 “Hardware and Software Troubleshooting Tips | Virus Removal Tips | Best Anti-virus | Speeding Up Windows XP/Windows Vista/Windows 7 | Networking Tips | UNIX and LINUX Usability | Installation Procedure Of Various Operating Systems | computer repair | computer problems” Retrieved from http://101-computer- troubleshooting.blogspot.com/2009/09/directx-diagnostic-tool- dxdiag.html-
  • 332. 318 “How to configure peer to peer workgroup network step by step Guide” Retrieved from http://computernetworkingnotes.com/basic-workgroup- networking/workgroup-set-up.html- “How to make an Ethernet cross over cable” Retrieved from http://www.makeuseof.com/tag/ethernet-crossover-cable/ “Occupational Safety Precautions” Retrieved from “peer to peer networking” Retrieved from http://h10025.www1.hp.com/ewfrf/wc/document?cc=us&lc=en&dlc=en &docname=bph05694- “Ping Tim Fisher” Retrieved from http://pcsupport.about.com/od/commandlinereference/p/ping- command.htm- “Puzzles for Activities” Retrieved from http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp “System Configuration utility” Retrieved from http://moderncomputerskillsandtraining.com/?page_id=2950- “Turn On the Windows Firewall” Retrieved from http://windows.microsoft.com/en-ph/windows/turn-windows-firewall-on- off#turn-windows-firewall-on-off=windows-7 “Windows Registry” Retrieved from http://pcsupport.about.com/od/termsr/p/registrywindows.htm-- http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE _PC_v40_Chapter2.pdf
  • 333. 319 Client/serverNetwork- a computer network in which one centralized, powerful computer called server is a hub to which many less powerful personal compters or workstations called clients are connected. Coaxial cable- a type of wire that consists of a center wire surrounded by insulation and then a grounded shield of braided wire which minimizes electrical interference. Configuration- the way a system is set up. Configuration can refer to either hardware or software, or the combination of both. Cross-over- is a cable used to connect two network devices directly. Direct X- a set of APIs developed by Microsoft that enables programmers to write programs that access hardware features of a computer without knowing exactly what hardware will be installed on the machine where the program eventually runs. Fiber optic- is a technology that uses glass (or plastic) threads (fibers) to transmit data. Fiber optics has several advantages over traditional metal communications lines. IP Address- is a number that is used to identify a device on the network. IP config- is a command used to find out the IP address of a certain network. Network- is a group of two or more computer systems linked together. Peer-to-peer Network- a type of network in which each workstation has equivalent capabilities and responsibilities. Ping- a command prompt used to test the ability of the source computer to reach a specified destination computer.
  • 334. 320 Protocol- is the special set of rules that end points in a telecommunication connection use when they communicate. Registry- is a database used by Windows operating system to store configuration information. RJ45- short for Registered Jack-45, it is an eight-wire connector used commonly to connect computers onto a Local-Area Network (LAN). Security- techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization Straight-through- is used in local area network to connect a PC to a network hub and router. Subnet mask- is used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. Twisted pair- is a type of cable that consists of two independently insulated wires twisted around one another. Virus- is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.