You are on page 1of 44

COMPETENCY BASED LEARNING MODULE

Sector: Electronics

Qualification Title: Consumer Electronics Servicing NCII

Unit of Competency: Perform Computer Operations

Module Title: Performing Computer Operations

Erhard Science Technological Institute


Gloria, Oriental Mindoro

HOW TO USE THIS COMPETENCY BASED LEARNING MATERIAL


Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 1 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Welcome to the Module “Performing Computer Operations”. This module
contains training materials and activities for you to complete.
The unit of competency “Perform Computer Operations” contains
knowledge, skills and attitudes required for a Consumer Electronics Servicing
NCII course.
You are required to go through a series of learning activities in order to
complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets, Job Sheets, Operation Sheets, and
Activity Sheets. Follow these activities on your own and answer the Self-Check
at the end of each learning activity.

If you have questions, don’t hesitate to ask your teacher for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o Already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a


particular skill or skills, talk to him/her about having them formally recognized
so you don’t have to do he same training again. If you have a qualification or
Certificate of Competency from previous trainings show it to your trainer. If the
skills you acquired are still current and relevant to this module, they may
become part of the evidence you can present for RPL. If you are not sure about
the currency of your skills, discuss it with your trainer.

After completing this module ask your teacher to assess your


competency. Result of your assessment will be recorded in your competency
profile. All the learning activities are designed for you to complete at your own
pace.

Inside this module you will find the activities for you to complete followed
by relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.

This module is prepared to help you achieve the required competency, in


using Hand Tools. This will be the source of information that will enable you to

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 2 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
acquire the knowledge and skills independently at your own pace or with
minimum supervision or help from your teacher.

COMPETENCY-BASED LEARNING MATERIAL

LIST OF COMPETENCIES

NO. Unit of Module title Code


competency

1. Used Hand Tools Using Hand Tools ELC724201

2. Perform Mensuration Performing Mensuration ELC311201


and Calculation and Calculation

3. Prepare Interpret Preparing Interpreting ELC311202


Technical Drawings Technical Drawings

4. Apply Quality Applying Quality Standards ELC315202


Standards

5. Perform Computer Performing Computer ELC311203


Operations Operations

6. Terminate and Connect Terminating and


Electrical Wirings and Connecting Electrical
Electronics Circuit Wirings and Electronics
Circuit
MODULE CONTENT

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 3 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Unit of Competency: Perform Computer Operations

Module Title : Performing Computer Operations

Module Descriptor: This unit covers the knowledge, skills, (and) attitudes
and values needed to perform computer operations
which include inputting, accessing, producing and
transferring data using the appropriate hardware and
software

Nominal Duration : 8 hours

SUMMARY OF LEARNING OUTCOMES:

Upon completion of this module the students/trainees must be able to:

1. Plan and prepare for tasks to be undertaken.


2. Input data into computer.
3. Access information using computer.
4. Produce/output data using computer system.
5. Maintain computer equipment and systems.

LEARNING OUTCOME # 1 Plan and Prepare for tasks to be


undertaken.
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 4 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
CONTENTS:
 Reading and comprehension skills required to interpret work
instructions and to interpret basic user manuals
 OH and S principles and responsibilities
 Main types of computers and basic features of different operating
systems
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software
 General security, privacy legislation and copyright

ASSESSMENT CRITERIA:

1. Requirements of tasks determined in accordance with the required


output
2. Appropriate hardware and software selected according to task
assigned and required outcome
3. Task planned to ensure that OH and S guidelines and procedures
followed
4. Client-specific guidelines and procedures followed
5. Required data security guidelines applied in accordance with existing
procedures

CONDITIONS:

Students/trainees must be provided with the following:


 Equipment:
1 unit of computer
Voltage regulator / UPS
 Learning materials:
Learning manuals
Work Instruction
Hand-outs
 Supplies/ materials:
Operating system
Application program
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 5 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
ASSESSMENT METHOD:
 Hands-on
 Direct observation
 Practical demonstration

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 6 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
LEARNING EXPERIENCES

Learning Outcome 1

Assemble/Disassemble consumer electronics products and systems

LEARNING ACTIVITIES SPECIAL INTRUCTIONS


Read Information Sheet 1.1-1 In this learning outcome, you
(Hand Tools) will be able to identify the
Answer Self check 1.1-1 proper hand tools
Compare your answers with Answer key
1.3-1
Read Information Sheet 1.1-2
Answer Self Check 1.1-2
Read Information Sheet 1.1-3
Answer Self Check 1.1-3
Read Information Sheet 1.1-4
Answer Self Check 1.1-4

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 7 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
INFORMATION SHEET 1.5-1

Plan and Prepare to Task to be undertaken

Occupational Health & Safety

In Victoria, workplace health and safety is governed by a system of laws,


regulations and compliance codes which set out the responsibilities of
employers and workers to ensure that safety is maintained at work.

The Act

The Occupational Health and Safety Act 2004 (the Act) is the cornerstone of


legislative and administrative measures to improve occupational health and
safety in Victoria.

The Act sets out the key principles, duties and rights in relation to
occupational health and safety. The general nature of the duties imposed by
the Act means that they cover a very wide variety of circumstances, do not
readily date and provide considerable flexibility for a duty holder to determine
what needs to be done to comply.

The Regulations

The Occupational Health and Safety Regulations 2007 are made under the Act. 
They specify the ways duties imposed by the Act must be performed, or
prescribe procedural or administrative matters to support the Act, such as
requiring licenses for specific activities, keeping records, or notifying certain
matters.

Guidance

Effective OHS regulation requires that VWA provides clear, accessible advice


and guidance about what constitutes compliance with the Act and Regulations.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 8 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
This can be achieved through Compliance Codes, VWA Positions and non-
statutory guidance (“the OHS compliance framework”).  For a detailed
explanation of the OHS compliance framework, see the Victorian Occupational
Health and Safety Compliance Framework Handbook. 

Policy

Not every term in the legislation is defined or explained in detail.  Also,


sometimes new circumstances arise (like increases in non-standard forms of
employment, such as casual, labour hire and contract work, or completely new
industries with new technologies which produce new hazards and risks) which
could potentially impact on the reach of the law, or its effective administration
by VWA. Therefore, from time to time VWA must make decisions about how it
will interpret something that is referred to in legislation, or act on a particular
issue, to ensure clarity. In these circumstances, VWA will develop a policy. A
policy is a statement of what VWA understands something to mean, or
what VWA will do in certain circumstances.

Elements of the computer Systems

6 Important Elements

People

People are the most important element of a computer system. They run and
operate the computers.

Procedure

Procedures are step by step instructions to follow when using software and
data. The procedures are normally written in manuals of hardware and
software manufacturers.

Software

Software are programs or instructions that a computer must follow to do its


task. The purpose of software is to process data into useful information for
people.

Hardware

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 9 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Hardware is the physical equipment that you can feel and touch. Hardware
includes the CPU, mouse, keyboard, printer, speaker and the monitor.
Data

Data includes texts and numbers, sounds, images and video that we input into
the computer for processing.

Connectivity

Connectivity means that a computer must be connected to other computers


especially through the internet. Using the internet, people can share and
access data from all over the world.

Main Types of Computers


A computer is a machine that can be programmed to manipulate symbols. Its
principal characteristics are:

 It responds to a specific set of instructions in a well-defined manner.


 It can execute a prerecorded list of instructions (a program).
 It can quickly store and retrieve large amounts of data.

Therefore computers can perform complex and repetitive procedures quickly,


precisely and reliably. Modern computers are electronic and digital. The actual
machinery (wires, transistors, and circuits) is called hardware; the instructions
and data are called software. All general-purpose computers require the
following hardware components:
Central processing unit (CPU): The heart of the computer, this is the
component that actually executes instructions organized in programs
("software") which tell the computer what to do.
Memory (fast, expensive, short-term memory): Enables a computer to store, at
least temporarily, data, programs, and intermediate results.
Mass storage device (slower, cheaper, long-term memory): Allows a computer to
permanently retain large amounts of data and programs between jobs.
Common mass storage devices include disk drives and tape drives.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 10 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Input device: Usually a keyboard and mouse, the input device is the conduit
through which data and instructions enter a computer.
Output device: A display screen, printer, or other device that lets you see what
the computer has accomplished.
In addition to these components, many others make it possible for the basic
components to work together efficiently. For example, every computer requires
a bus that transmits data from one part of the computer to another.
 
II, Computer sizes and power
Computers can be generally classified by size and power as follows, though
there is considerable overlap:
Personal computer: A small, single-user computer based on a microprocessor.
Workstation: A powerful, single-user computer. A workstation is like a
personal computer, but it has a more powerful microprocessor and, in general,
a higher-quality monitor.
Minicomputer: A multi-user computer capable of supporting up to hundreds
of users simultaneously.
Mainframe: A powerful multi-user computer capable of supporting many
hundreds or thousands of users simultaneously.
Supercomputer: An extremely fast computer that can perform hundreds of
millions of instructions per second.

Supercomputer
Supercomputer is a broad term for one of the fastest computers currently
available. Supercomputers are very expensive and are employed for specialized
applications that require immense amounts of mathematical calculations
(number crunching). For example, weather forecasting requires a
supercomputer. Other uses of supercomputers scientific simulations,
(animated) graphics, fluid dynamic calculations, nuclear energy research,
electronic design, and analysis of geological data (e.g. in petrochemical
prospecting). Perhaps the best known supercomputer manufacturer is Cray
Research.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 11 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Mainframe
Mainframe was a term originally referring to the cabinet containing the central
processor unit or "main frame" of a room-filling Stone Age batch machine. After
the emergence of smaller "minicomputer" designs in the early 1970s, the
traditional big iron machines were described as "mainframe computers" and
eventually just as mainframes. Nowadays a Mainframe is a very large and
expensive computer capable of supporting hundreds, or even thousands, of
users simultaneously. The chief difference between a supercomputer and a
mainframe is that a supercomputer channels all its power into executing a few
programs as fast as possible, whereas a mainframe uses its power to execute
many programs concurrently. In some ways, mainframes are more powerful
than supercomputers because they support more simultaneous programs. But
supercomputers can execute a single program faster than a mainframe. The
distinction between small mainframes and minicomputers is vague, depending
really on how the manufacturer wants to market its machines.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 12 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 

Minicomputer
It is a midsize computer. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the
distinction between small minicomputers and workstations. But in general, a
minicomputer is a multiprocessing system capable of supporting from up to
200 users simultaneously.

 
Workstation
It is a type of computer used for engineering applications (CAD/CAM), desktop
publishing, software development, and other types of applications that require
a moderate amount of computing power and relatively high quality graphics
capabilities. Workstations generally come with a large, high-resolution graphics
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 13 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
screen, at large amount of RAM, built-in network support, and a graphical user
interface. Most workstations also have a mass storage device such as a disk
drive, but a special type of workstation, called a diskless workstation, comes
without a disk drive. The most common operating systems for workstations are
UNIX and Windows NT. Like personal computers, most workstations are single-
user computers. However, workstations are typically linked together to form a
local-area network, although they can also be used as stand-alone systems.
N.B.: In networking, workstation refers to any computer connected to a local-
area network. It could be a workstation or a personal computer.

Personal computer:
It can be defined as a small, relatively inexpensive computer designed for an
individual user. In price, personal computers range anywhere from a few
hundred pounds to over five thousand pounds. All are based on the
microprocessor technology that enables manufacturers to put an entire CPU on
one chip. Businesses use personal computers for word processing, accounting,
desktop publishing, and for running spreadsheet and database management
applications. At home, the most popular use for personal computers is for
playing games and recently for surfing the Internet.
Personal computers first appeared in the late 1970s. One of the first and most
popular personal computers was the Apple II, introduced in 1977 by Apple
Computer. During the late 1970s and early 1980s, new models and competing
operating systems seemed to appear daily. Then, in 1981, IBM entered the fray
with its first personal computer, known as the IBM PC. The IBM PC quickly
became the personal computer of choice, and most other personal computer
manufacturers fell by the wayside. P.C. is short for personal computer or IBM
PC. One of the few companies to survive IBM's onslaught was Apple Computer,

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 14 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
which remains a major player in the personal computer marketplace. Other
companies adjusted to IBM's dominance by building IBM clones, computers
that were internally almost the same as the IBM PC, but that cost less.
Because IBM clones used the same microprocessors as IBM PCs, they were
capable of running the same software. Over the years, IBM has lost much of its
influence in directing the evolution of PCs. Therefore after the release of the
first PC by IBM the term PC increasingly came to mean IBM or IBM-compatible
personal computers, to the exclusion of other types of personal computers,
such as Macintoshes. In recent years, the term PC has become more and more
difficult to pin down. In general, though, it applies to any personal computer
based on an Intel microprocessor, or on an Intel-compatible microprocessor.
For nearly every other component, including the operating system, there are
several options, all of which fall under the rubric of PC
Today, the world of personal computers is basically divided between Apple
Macintoshes and PCs. The principal characteristics of personal computers are
that they are single-user systems and are based on microprocessors. However,
although personal computers are designed as single-user systems, it is
common to link them together to form a network. In terms of power, there is
great variety. At the high end, the distinction between personal computers and
workstations has faded. High-end models of the Macintosh and PC offer the
same computing power and graphics capability as low-end workstations by
Sun Microsystems, Hewlett-Packard, and DEC.

III, Personal Computer Types

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 15 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Actual personal computers can be generally classified by size and chassis /
case. The chassis or case is the metal frame that serves as the structural
support for electronic components. Every computer system requires at least
one chassis to house the circuit boards and wiring. The chassis also contains
slots for expansion boards. If you want to insert more boards than there are
slots, you will need an expansion chassis, which provides additional slots.
There are two basic flavors of chassis designs–desktop models and tower
models–but there are many variations on these two basic types. Then come the
portable computers that are computers small enough to carry. Portable
computers include notebook and subnotebook computers, hand-held
computers, palmtops, and PDAs.
Tower model
The term refers to a computer in which the power supply, motherboard, and
mass storage devices are stacked on top of each other in a cabinet. This is in
contrast to desktop models, in which these components are housed in a more
compact box. The main advantage of tower models is that there are fewer space
constraints, which makes installation of additional storage devices easier.

Desktop model
A computer designed to fit comfortably on top of a desk, typically with the
monitor sitting on top of the computer. Desktop model computers are broad
and low, whereas tower model computers are narrow and tall. Because of their
shape, desktop model computers are generally limited to three internal mass

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 16 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
storage devices. Desktop models designed to be very small are sometimes
referred to as slimline models.

Notebook computer
An extremely lightweight personal computer. Notebook computers typically
weigh less than 6 pounds and are small enough to fit easily in a briefcase.
Aside from size, the principal difference between a notebook computer and a
personal computer is the display screen. Notebook computers use a variety of
techniques, known as flat-panel technologies, to produce a lightweight and
non-bulky display screen. The quality of notebook display screens varies
considerably. In terms of computing power, modern notebook computers are
nearly equivalent to personal computers. They have the same CPUs, memory
capacity, and disk drives. However, all this power in a small package is
expensive. Notebook computers cost about twice as much as equivalent
regular-sized computers. Notebook computers come with battery packs that
enable you to run them without plugging them in. However, the batteries need
to be recharged every few hours.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 17 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Laptop computer
A small, portable computer -- small enough that it can sit on your lap.
Nowadays, laptop computers are more frequently called notebook computers.

Subnotebook computer
A portable computer that is slightly lighter and smaller than a full-sized
notebook computer. Typically, subnotebook computers have a smaller
keyboard and screen, but are otherwise equivalent to notebook computers.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 18 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Hand-held computer
A portable computer that is small enough to be held in one’s hand. Although
extremely convenient to carry, handheld computers have not replaced notebook
computers because of their small keyboards and screens. The most popular
hand-held computers are those that are specifically designed to provide PIM
(personal information manager) functions, such as a calendar and address
book. Some manufacturers are trying to solve the small keyboard problem by
replacing the keyboard with an electronic pen. However, these pen-based
devices rely on handwriting recognition technologies, which are still in their
infancy. Hand-held computers are also called PDAs, palmtops and pocket
computers.

Palmtop
A small computer that literally fits in your palm. Compared to full-size
computers, palmtops are severely limited, but they are practical for certain
functions such as phone books and calendars. Palmtops that use a pen rather
than a keyboard for input are often called hand-held computers or PDAs.
Because of their small size, most palmtop computers do not include disk
drives. However, many contain PCMCIA slots in which you can insert disk
drives, modems, memory, and other devices. Palmtops are also called PDAs,
hand-held computers and pocket computers.

PDA
Short for personal digital assistant, a handheld device that combines
computing, telephone/fax, and networking features. A typical PDA can function
as a cellular phone, fax sender, and personal organizer. Unlike portable

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 19 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
computers, most PDAs are pen-based, using a stylus rather than a keyboard
for input. This means that they also incorporate handwriting recognition
features. Some PDAs can also react to voice input by using voice recognition
technologies. The field of PDA was pioneered by Apple Computer, which
introduced the Newton MessagePad in 1993. Shortly thereafter, several other
manufacturers offered similar products. To date, PDAs have had only modest
success in the marketplace, due to their high price tags and limited
applications. However, many experts believe that PDAs will eventually become
common gadgets.
PDAs are also called palmtops, hand-held computers and pocket computers.

Operating Systems

An operating system (OS) is software that manages computer hardware


resources and provides common services for computer programs. The
operating system is an essential component of the system software in a
computer system. Application programs usually require an operating system to
function.

Time-sharing operating systems schedule tasks for efficient use of the system


and may also include accounting software for cost allocation of processor time,
mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the
operating system acts as an intermediary between programs and the computer
hardware, although the application code is usually executed directly by the
hardware and will frequently make a system call to an OS function or be

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 20 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
interrupted by it. Operating systems can be found on almost any device that
contains a computer—from cellular phones and video game
consoles to supercomputers and web servers.

Types of Operating Systems

Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. Real-time operating systems often use
specialized scheduling algorithms so that they can achieve a deterministic
nature of behavior. The main objective of real-time operating systems is their
quick and predictable response to events. They have an event-driven or time-
sharing design and often aspects of both. An event-driven system switches
between tasks based on their priorities or external events while time-sharing
operating systems switch tasks based on clock interrupts.
Multi-user
A multi-user operating system allows multiple users to access a computer
system at the same time. Time-sharing systems and Internet servers can be
classified as multi-user systems as they enable multiple-user access to a
computer through the sharing of time. Single-user operating systems have only
one user but may allow multiple programs to run at the same time.
Multi-tasking vs. single-tasking
A multi-tasking operating system allows more than one program to be running
at the same time, from the point of view of human time scales. A single-tasking
system has only one running program. Multi-tasking can be of two types: pre-
emptive and co-operative. In pre-emptive multitasking, the operating system
slices the CPU time and dedicates one slot to each of the programs. Unix-like
operating systems such as Solaris and Linux support pre-emptive
multitasking, as does AmigaOS. Cooperative multitasking is achieved by
relying on each process to give time to the other processes in a defined
manner. 16-bit versions of Microsoft Windows used cooperative multi-
tasking. 32-bit versions of both Windows NT and Win9x, used pre-emptive
multi-tasking. Mac OS prior to OS X used to support cooperative multitasking.
Distributed

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 21 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
A distributed operating system manages a group of independent computers
and makes them appear to be a single computer. The development of
networked computers that could be linked and communicate with each other
gave rise to distributed computing. Distributed computations are carried out
on more than one machine. When computers in a group work in cooperation,
they make a distributed system.
Templated
In an o/s, distributed and cloud computing context, templating refers to
creating a single virtual machine image as a guest operating system, then
saving it as a tool for multiple running virtual machines (Gagne, 2012, p. 716).
The technique is used both in virtualization and cloud computing
management, and is common in large server warehouses. [4]
Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines like PDAs with less
autonomy. They are able to operate with a limited number of resources. They
are very compact and extremely efficient by design. Windows CE and Minix 3
are some examples of embedded operating systems.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 22 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Main Parts of the Computer Systems

The Central Processing Unit (CPU)


The CPU or the Central Processing Unit is found inside the CPU box. The CPU
is often called the brain of the computer. The CPU follows special commands
called programs. It processes the data you enter into it using the program you
choose.

The Keyboard
The Keyboard is used to type data into the computer. It is one way of telling the
computer what to do. You can type in words using the keyboard. You can type
in numbers. You can type in commands and programs.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 23 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
The Monitor
The Monitor lets you see what your computer is doing. It is like the Television.
You will see your letters, drawing, pictures or movies on the monitor screen.

The Mouse
The mouse is a pointing device. The mouse is used to enter data and
commands into the computer. The mouse moves the pointer on the monitor
screen. When you move the mouse the pointer also moves. You can point
things on the screen using the mouse.

The Speaker
The Speaker is a computer part that converts electrical signal to sound. The
speaker allows you to hear music from the computer. Other sounds can also be
heard when the computer is working.

The Printer
The printer is a machine that takes what you have created on your computer
and puts them on paper. The printer will print your letters or pictures on
paper.

If you use a desktop computer, you might already know that there isn't any
single part called the "computer." A computer is really a system of many parts
working together. The physical parts, which you can see and touch, are
collectively called hardware. (Software, on the other hand, refers to the
instructions, or programs, that tell the hardware what to do.)

The following illustration shows the most common hardware in a desktop


computer system. Your system might look a little different, but it probably has
most of these parts. A laptop computer has similar parts but combines them
into a single, notebook-sized package.
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 24 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
System unit

The system unit is the core of a computer system. Usually it's a rectangular


box placed on or underneath your desk. Inside this box are many electronic
components that process information. The most important of these
components is the central processing unit (CPU), or microprocessor, which
acts as the "brain" of your computer. Another component is random access
memory (RAM), which temporarily stores information that the CPU uses while
the computer is on. The information stored in RAM is erased when the
computer is turned off.

Almost every other part of your computer connects to the system unit using
cables. The cables plug into specific ports (openings), typically on the back of
the system unit. Hardware that is not part of the system unit is sometimes
called a peripheral device or device.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 25 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Storage

Your computer has one or more disk drives—devices that store information on


a metal or plastic disk. The disk preserves the information even when your
computer is turned off.

Hard disk drive


Your computer's hard disk drive stores information on a hard disk—a rigid
platter or stack of platters with a magnetic surface. Because hard disks can
hold massive amounts of information, they usually serve as your computer's
primary means of storage, holding almost all of your programs and files. The
hard disk drive is normally located inside the system unit.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 26 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
CD and DVD drives
Nearly all computers today come equipped with a CD or DVD drive, usually
located on the front of the system unit. CD drives use lasers to read (retrieve)
data from a CD; many CD drives can also write (record) data onto CDs. If you
have a recordable disk drive, you can store copies of your files on blank CDs.
You can also use a CD drive to play music CDs on your computer.

DVD drives can do everything that CD drives can, plus read DVDs. If you have
a DVD drive, you can watch movies on your computer. Many DVD drives can
record data onto blank DVDs.

Floppy disk drive


Floppy disk drives store information on floppy disks, also
called floppies or diskettes. Compared to CDs and DVDs, floppy disks can
store only a small amount of data. They also retrieve information more slowly
and are more prone to damage. For these reasons, floppy disk drives are less
popular than they used to be, although some computers still include them.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 27 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Why are these disks called "floppy" disks? The outside is made of hard plastic,
but that's just the sleeve. The disk inside is made of a thin, flexible vinyl
material.

Mouse

A mouse is a small device used to point to and select items on your computer
screen. Although mice come in many shapes, the typical mouse does look a bit
like an actual mouse. It's small, oblong, and connected to the system unit by a
long wire that resembles a tail. Some newer mice are wireless.

A mouse usually has two buttons: A primary button (usually the left button)
and a secondary button. Many mice also have a wheel between the two
buttons, which allows you to scroll smoothly through screens of information.

When you move the mouse with your hand, a pointer on your screen moves in
the same direction. (The pointer's appearance might change depending on
where it's positioned on your screen.) When you want to select an item, you
point to the item and then click (press and release) the primary button.
Pointing and clicking with your mouse is the main way to interact with your
computer.

Keyboard

A keyboard is used mainly for typing text into your computer. Like the
keyboard on a typewriter, it has keys for letters and numbers, but it also has
special keys:

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 28 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 The function keys, found on the top row, perform different functions
depending on where they are used.
 The numeric keypad, located on the right side of most keyboards, allows
you to enter numbers quickly.
 The navigation keys, such as the arrow keys, allow you to move your
position within a document or webpage.

You can also use your keyboard to perform many of the same tasks you can
perform with a mouse.

Monitor

A monitor displays information in visual form, using text and graphics. The


portion of the monitor that displays the information is called the screen. Like a
television screen, a computer screen can show still or moving pictures.

There are two basic types of monitors: CRT (cathode ray tube) monitors and
the newer LCD (liquid crystal display) monitors. Both types produce sharp
images, but LCD monitors have the advantage of being much thinner and
lighter.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 29 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
LCD monitor (left); CRT monitor (right)

Printer

A printer transfers data from a computer onto paper. You don't need a printer
to use your computer, but having one allows you to print e-mail, cards,
invitations, announcements, and other material. Many people also like being
able to print their own photos at home.

The two main types of printers are inkjet printers and laser printers. Inkjet


printers are the most popular printers for the home. They can print in black
and white or in full color and can produce high-quality photographs when used
with special paper. Laser printers are faster and generally better able to handle
heavy use.

Inkjet printer (left); laser printer


(right)

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 30 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Speakers

Speakers are used to play sound. They can be built into the system unit or
connected with cables. Speakers allow you to listen to music and hear sound
effects from your computer.

Modem

To connect your computer to the Internet, you need a modem. A modem is a


device that sends and receives computer information over a telephone line or
high-speed cable. Modems are sometimes built into the system unit, but
higher-speed modems are usually separate components.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 31 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Memory

A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in computer where data is to be
processed and instructions required for processing are stored.

The memory is divided into large number of small parts. Each part is called
cell. Each location or cell has a unique address, which varies from zero to
memory size minus one.

For example, if computer has 64k words, then this memory unit has 64 *
1024=65536 memory location. The address of these locations varies from 0 to
65535.

Memory is primarily of three types:

 Cache Memory
 Primary Memory/Main Memory
 Secondary Memory

Cache Memory
Cache memory is a very high speed semiconductor memory, which can speed
up CPU. It acts as a buffer between the CPU and main memory.

It is used to hold those parts of data and program which are most frequently
used by CPU. The parts of data and programs are transferred from disk to
cache memory by operating system, from where CPU can access them.

ADVANTAGE
 Cache memory is faster than main memory.
 It consumes less access time as compared to main memory.
 It stores the program that can be executed within a short period of time.
 It stores data for temporary use.

DISADVANTAGE:
 Cache memory has limited capacity.
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 32 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 It is very expensive.

Primary Memory (Main Memory)


Primary memory holds only those data and instructions on which computer is
currently working. It has limited capacity and data gets lost when power is
switched off.

It is generally made up of semiconductor device. These memories are not as


fast as registers. The data and instructions required to be processed earlier
reside in main memory. It is divided into two subcategories RAM and ROM.

Characteristic of Main Memory

 These are semiconductor memories.


 It is known as main memory.
 Usually volatile memory.
 Data is lost in case power is switched off.
 It is working memory of the computer.
 Faster than secondary memories.
 A computer cannot run without primary memory.

Secondary Memory
This type of memory is also known as external memory or non-volatile. It is
slower than main memory. These are used for storing Data/Information
permanently.

CPU directly does not access these memories, instead they are accessed via
input-output routines. Contents of secondary memories are first transferred to
main memory and then CPU can access it. For example, disk, CD-ROM, DVD,
etc.

Characteristics of Secondary Memory

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 33 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 These are magnetic and optical memories.
 It is known as backup memory.
 It is non-volatile memory.
 Data is permanently stored even if power is switched off.
 It is used for storage of the data in the computer.
 Computer may run without secondary memory.
 Slower than primary memories.

Types of main memory


RAM (random-access memory)
Ram is called the main memory. Data and programs are placed here
when the CPU is processing. Information in the RAM are lost when power
is turned off. This is the umbrella term for all memory that can be read
from or written to in a nonlinear fashion. However, it has come to refer
specifically to chip-based memory, since all chip-based memory is
random-access. It is not the opposite of ROM. The computer can read
ROM; it can read and write to RAM.

SIMM (single in-line memory module)


DIMM (dual in-line memory module). SIMM and DIMM refer not to
memory types, but to modules (circuit boards plus chips) in which RAM
is packaged. SIMMs, the older of the two, offer a data path of 32 bits.
Because Pentiums are designed to handle a much wider data path than
that, SIMMs must be used in pairs on Pentium motherboards (they can
be used singly on boards based on 486 or slower processors). DIMMs,
which are of more recent origin, offer a 64-bit path, which makes them
more suitable for use with the Pentium and other more recent
processors. From a buyer's standpoint, the good news is that one DIMM
will handle the work of two SIMMs and thus can be used singly on a
Pentium motherboard. DIMMs are more economical in the long run,
because you can add one at a time to your system.
DRAM (dynamic RAM)

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 34 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Dynamic RAM is the standard main memory type in computers today
and is what you're referring to when you tell someone your PC has 32MB
of RAM. In DRAM, information is stored as a series of charges in a
capacitor. Within a millisecond of being electronically charged, the
capacitor discharges and needs to be refreshed to retain its values. This
constant refreshing is the reason for the use of the term dynamic.
FPM RAM (fast page-mode RAM)
Until the advents of EDO RAM (see below), all main memory found in
PCs was of the fast page mode variety. That's why the name wasn't well
known: There was no need to state the type, since there was only one.
The access times of FPM RAM dropped as the technology matured, from
120 ns (nanoseconds) down to the now-common access time of 60 ns.
The Pentium processor, however, allows for a bus speed of 66 MHz,
which is faster than FPM RAM can keep up with. The speed of a 60-ns
RAM module performing random page access (where page refers to a
region of address space) is below 30 MHz - far slower than the bus speed.
So DRAM makers came up with the concept of the RAM cache.
EDO RAM (extended-data-out RAM)
Despite the hype surrounding it, EDO RAM is no more than another type
of FPM RAM. Essentially, it recognizes that most of the time when the
CPU requests memory for a particular address, it's going to want some
more addresses nearby. Instead of forcing each memory access to start
afresh, EDO RAM hangs onto the location of the previous access, thereby
speeding access to nearby addresses. EDO RAM speeds up the memory
cycle, with improvements in memory performance of as much as 40
percent. But EDO is effective only up to a bus speed of 66 MHz, and
that's quickly being bypassed by the most recent crop of AMD, Cyrix, and
Intel processors.
BEDO RAM (burst extended-data-out RAM)
As the need for faster access to DRAM has increased, technologies have
been developed to provide it. One such technology is known as bursting,
in which large blocks of data are sent and processed in the form of an
uninterrupted "burst" of smaller units. What this means to DRAM is that
the burst carries details not only about the address of the first page, but
also of the next few. BEDO RAM can handle four data elements in one
burst, and this allows the final three elements to avoid experiencing the
delays of the first - all the addresses are ready to be processed. The
DRAM is given the first address, and then can process the rest at a rate
of 10 ns each. BEDO RAM, however, despite its substantial speed
increase, still has difficulty moving past the 66-MHz bus barrier. BEDO
RAM exists because SDRAM manufacturers were uninterested in pricing
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 35 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
SDRAM to be competitive with EDO RAM; as a result, more work was
done with EDO to add bursting technologies for speed rivaling that of
SDRAM. Hence BEDO RAM.
SDRAM (synchronous dynamic RAM)
Resources galore are being poured into SDRAM development, and it has
begun making its appearance in the PC ads. The reason for its increasing
popularity is twofold. First, SDRAM can handle bus speeds of up to 100
MHz, and these are fast approaching. Second, SDRAM is synchronized
with the system clock itself, a technical feat that has eluded PC
engineers until now. SDRAM technology allows two pages of memory to
be opened simultaneously A new standard for SDRAM is being developed
by the SClzzL Association at Santa Clara University (California) along
with many industry leaders. Called SLDRAM, this technology improves
on SDRAM by offering a higher bus speed and by using packets (small
packs of data) to take care of address requests, timing, and commands to
the DRAM. The result is less reliance on improvements in DRAM chip
design, and ideally a lower-cost solution for high-performance memory.
Watch for SLDRAM in the near future.
SRAM (static random-access memory)
The difference between SRAM and DRAM is that where DRAM must be
refreshed constantly, SRAM stores data without an automatic refresh.
The only time a refresh occurs, in fact, is when a write command is
performed. If the write command doesn't occur, nothing in the SRAM
changes, which is why it's called static. The benefit of SRAM is that it's
much faster than DRAM, reaching speeds of 12 ns as compared with
BEDO's 50 ns. The disadvantage is that SRAM is much more expensive
than DRAM. SRAM's most common use in PCs is in the second-level
cache, also called the L2 cache.
L2 cache
Caching is the art of predicting what data will be requested next and
having that data already in hand, thus speeding execution. When your
CPU makes a data request, the data can be found in one of four places:
the L1 cache, the L2 cache, main memory, or in a physical storage
system (such as a hard disk). L1 cache exists on the CPU, and is much
smaller than the other three. The L2 cache (second-level cache) is a
separate memory area, and is configured with SRAM. Main memory is
much larger and consists of DRAM, and the physical storage system is
much larger again but is also much, much slower than the other storage
areas. The data search begins in the L1 cache, then moves out to the L2
cache, then to DRAM, and then to physical storage. Each level consists of
progressively slower components. The function of the L2 cache is to
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 36 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
stand between DRAM and the CPU, offering faster access than DRAM but
requiring sophisticated prediction technology to make it useful. The term
cache hit refers to a successful location of data in L2, not L1. The
purpose of a cache system is to bring the speed of accessing memory as
close as possible to the speed of the CPU itself.
Async SRAM (asynchronous SRAM)
Async SRAM has been with us since the days of the 386, and is still in
place in the L2 cache of many PCs. It's called asynchronous because it's
not in sync with the system clock, and therefore the CPU must wait for
data requested from the L2 cache. The wait isn't as long as it is with
DRAM, but it's still a wait.
Sync SRAM (synchronous bursts RAM)
Like SDRAM, Sync SRAM is synchronized with the system clock, so it's
faster than the Async SRAM commonly used for L2 caches, with speeds
of about 8.5 ns. Unfortunately, Sync SRAM isn't being produced in
sufficient quantities to drive its cost down, so it seems destined for a
relatively short life. That's especially true because it loses the ability to
synchronize at bus speeds higher than 66 MHz. For the new breed of
machines, therefore, let's welcome . . .
PB SRAM (pipeline burst SRAM)
Using burst technology, SRAM requests can be pipelined, or collected so
that requests within the burst are executed on a nearly instantaneous
basis. PB SRAM uses Pipening, and while it's slightly behind system
synchronization speeds, it's a possible improvement over Sync SRAM
because it's designed to work well with bus speeds of 75 MHz and higher.
Look for PB SRAM to be a major player in Pentium II systems and
beyond.
VRAM (video RAM)
VRAM is aimed precisely at video performance, and you'll find it
primarily on video accelerator cards or on motherboards that incorporate
video technology. VRAM is used to store the pixel values of a graphical
display, and the board's controller reads continuously from this memory
to refresh the display Its purpose is not only to give you faster video
performance than you'd get with a standard video board, but to reduce
strain on the CPU. VRAM is dual-ported memory; there are two access
ports to the memory cells, with one used to constantly refresh the display
and the other used to change the data that will be displayed. Two ports
means a doubling of bandwidth, and faster video performance as a
result. By comparison, DRAM and SRAM have only one access port.

WRAM (Windows RAM)


Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 37 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Like VRAM, WRAM is a dual-ported type of RAM and it is used
exclusively for graphics performance. WRAM is similar to VRAM in its
operation, but it offers a higher overall bandwidth (roughly 25 percent
higher), in addition to several graphics features that applications
developers can exploit. These include a double-buffering data system
several times faster than VRAM's buffer, resulting in considerably faster
screen refresh rates.
SGRAM (synchronous graphics RAM)
Unlike VRAM and WRAM, and despite the fact that its primary use is on
video accelerator cards, SGRAM is a single-ported RAM type. It speeds
performance through a dual-bank feature, in which two memory pages
can be opened simultaneously; it therefore approximates dual-porting.
SGRAM is proving to be a significant player in 3-D video technology
because of a block-write feature that speeds up screen fills and allows
fast memory clearing. Three-dimensional video requires extremely fast
clearing, in the range of 30 to 40 times per second.

ROM (Read Only Memory)


Rom stores important programs for example, to start the computer. Rom
INFORMATION cannot be changed even when power is off. The data on a
ROM is inserted during its manufacture, and then cannot be changed. A
photosensitive material is etched to hold the required bit pattern
PROM (Programmable Read Only Memory)
Programmable ROM. Using special equipment, it is possible to program
these chips once. The PROM is created blank, then the program can be
added later. Once the program has been set it cannot be changed.
EPROM (Erasable Programmable Read Only Memory)
Erasable PROM. By exposing the EPROM to ultraviolet light for an
extended time (15 minutes), the EPROM will be reset to all zeros. Then it
can be reprogrammed.
EEPROM (Electrically Erasable Programmable Read Only Memory)
Electrically Erasable PROM. Instead of using ultraviolet light, these chips
can be erased by applying electric pulses to it. Chips such as these can
be used to store the BIOS of a computer. In this way the BIOS can be
upgraded using a software program, instead of replacing the chip.

CMOS (Complimentary Metal Oxide Semiconductor)


CMOS stores the date, calendar and current time of the computer. It is
powered by batteries so that even when the computer is off information inside
it remains.
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 38 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Computer Software
Computer Software or just software is a set of instructions that tells the
computer what to do and how to arrive at a desired result. Software is also
known as a program. Unlike computer hardware, you could not touch or feel
computer software. Computers will operate without software.

Several Types of Software


System Software
These are programs behind the scene and without user intervention and in
most situations perform other tasks such as loading and running programs,
protecting our computer, performing regular checks, controlling hardware
devices connected to the computer such as the printer, sharing of memory
resources and coordinating connected computers or networks. System software
includes the operating system.
Popular Operating Systems
Microsoft Windows XP
Microsoft Windows XP is a very popular operating system made by Microsoft
for desktop computers and laptop computers found in homes and schools

Microsoft Windows Vista


Microsoft vista is new operating system made by Microsoft for desktop
computers and laptop with many changes and additional features than
Microsoft Windows XP

Mac OS
Mac OS is operating series for Macintosh computer. Macintosh is a series of
computer made by Apple Inc.

Linux
Linux is an operating system that runs on most computers, it is a free software
and can be downloaded from the internet.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 39 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Application Software
A computer becomes a valuable and efficient tool with the right programs or
software that a user can use. Software will enable the user to write letters,
reports and other documents, performs various simple and complex
computations, creates a record or a database of certain items, draw and edit
photos, Design houses, machineries or vehicless, communicate to other people
around the globe, listen to music or watch a movie, play a single or multi-
player game and much more.

Types of Application Software

Word Processing
It is a Word processor. Word Processlor allows the user to create
a change documents, letters, reports, memos and other
documents

Spreadsheets
Programs are rows and columns of data organized and often calculations are
performed.

Organizer Software
A program that includes an adress book, calendar of
appointments, notes and other information you want
Date Compiled: Document No.
ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 40 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
to manage and access when needed.

Presentation Software
Software that used to convey information, ideas, message or products to a
target group of persons.

Database Programs
Programs created lto organized data and linformation in a manner desired by
the user or in a format for its convenient recovery and access.

Graphics Software
Programs for drawing and coloring. They can also edit pictures.

Video Software
Programs to create, modify and enhance, add and remove segments and other
effects a user may want to apply to video files

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 41 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
Several computer security tips:

 Back up your data and store backups in a different location from your
computer. (It's no accident that this tops the list. One of the single
biggest security problems is that data were not backed up.)
 Guard your laptop when you travel. Laptop thefts in airports are on the
rise. Don't lose sight of your laptop, especially during airport security
check-in.
 Physically secure your computer if it's not in a secure area. Be aware
that processor and memory chip thefts are becoming a bigger problem.
Contact security@isc.upenn.edu for information on how to deter chip
theft.
 Don't be surprised that e-mail can be easily forged. If you receive an
uncharacteristic message, consider the possibility of forgery. If you
suspect forgery, save the message and contact security@isc.upenn.edu.
Many forgeries can be traced.
 Don't use e-mail for confidential matters. Unless you take special
precautions, there is not much more privacy in e-mail than there is when
you send a postcard through the mail.
 Be alert for scams. Con-artists try all kinds of techniques to get people's
passwords. Systems administrators would not ask you for your
password, so if you get a request asking you for your password or asking
you to change your password to a specific value, red flags should go up.
Also, be wary of unsolicited offers for technical computer help. Don't
allow just anyone to type commands on your computer you don't
understand. For information on internet frauds, see the National Fraud
Information Center web site.

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 42 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 Make sure that you are not using unauthorized copies of commercial
software. Organizations (including universities) have paid fines for
software copyright violations.
 Choose a password that is hard to guess. (At least seven characters, no
dictionary words, use special characters (e.g. @, !, *, $, #) and a mixture
of upper and lower case characters). Weak passwords have been one
source of computer break-ins on campus recently.
 Change your password frequently.
 Make sure your computer is protected from power surges.
 Obtain the current versions of anti-virus software.

Information privacy or data protection laws prohibit the disclosure or


misuse of information held on private individuals. Over 80 countries and
independent territories have now adopted comprehensive data protection laws
including nearly every country in Europe and many in Latin America and the
Caribbean, Asia and Africa.[1] The US is notable for not having adopted a
comprehensive information privacy law but rather having adopted limited
sectoral laws in some areas.

These laws are based on Fair Information Practices, first developed in the
United States in the 1970s by the Department for Health, Education and
Welfare (HEW). The basic principles of data protection are:

 For all data collected there should be a stated purpose


 Information collected by an individual cannot be disclosed to other
organizations or individuals unless authorized by law or by consent of the
individual
 Records kept on an individual should be accurate and up to date
 There should be mechanisms for individuals to review data about them,
to ensure accuracy. This may include periodic reporting
 Data should be deleted when it is no longer needed for the stated
purpose

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 43 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00
 Transmission of personal information to locations where "equivalent"
personal data protection cannot be assured is prohibited
 Some data is too sensitive to be collected, unless there are extreme
circumstances 

Date Compiled: Document No.


ESTI
June 2014 Issued by:
Consumer Electronics
Servicing NCII
Page 44 of 42
Compiled by: ESTI
Jherald Revilla
Revision #00

You might also like