Professional Documents
Culture Documents
This learning guide is developed to provide you the necessary information regarding the
critical aspects of Competence that must ensure the ability to –
This guide will also assist you to attain the learning outcome stated in the cover page.
Learning Activities
1
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
*Your teacher will evaluate your output either satisfactory or unsatisfactory. If unsatisfactory,
your teacher shall advice you on additional work. But if satisfactory you can proceed to the
next topic.
LO 1
The internal hardware parts of a computer are often referred to as components, while
external hardware devices are usually called peripherals. Together, they all fall under the
category of computer hardware. Software, on the other hand, consists of the programs and
applications that run on computers. Because software runs on computer hardware, software
programs often have system requirements that list the minimum hardware required for the
software to run.
Note: Peripheral devices are the devices that are attached to the computer’s system unit
Hardware
Computer Hardware is the physical part of a computer, as distinguished from the computer
software that executes or runs on the hardware. The hardware of a computer is infrequently
changed, while software and data are modified frequently. The term soft refers to readily
created, modified, or erased. These are unlike the physical components within the computer
which are hard. When you think of the term computer hardware you probably think of the guts
inside your personal computer at home or the one in your classroom.
Inside Computer
The motherboard
The motherboard is the key circuit board holding the essential processing
parts of a computer. It allows all the parts of your computer to receive power
and communicate with one another.
The form factor describes the shape and layout of the motherboard. It affects
where individual components go and the shape of the computer's case.
Attached directly to the motherboard are the CPU, RAM, expansion cards,
2
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
networking, video, and audio components.
It is the body or mainframe of the computer, through which all other components
interface.
The mother board includes many components such as: central processing unit
(CPU), random access memory (RAM), firmware, and internal and external
buses.
o Performs most of the calculations which enable a computer to function, and is sometimes
referred to as the "brain" of the computer. It is usually cooled by a heat sink and fan.
Newer CPUs include an on-die Graphics Processing Unit (GPU).
o Facilitates communication between the CPU and the other components of the system,
including main memory.
3
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
RAM (random-access memory)
o Stores resident part of the current running OS (OS core and so on) and all running
processes (application parts, using CPU or input/output (I/O) channels or waiting for CPU
or I/O channels).
o BIOS (Basic Input Output System): A set of instruction stored on a ROM chip, which
handles all input-output functions.
o The Basic Input Output System tasks are handled by operating system drivers. Newer
motherboards use Unified Extensible Firmware Interface instead of BIOS.
Internal buses
The Central Processing Unit (CPU; sometimes just called processor) is a machine that
can execute computer programs. It is sometimes referred to as the brain of the
computer.
o Connect the CPU to various internal components and to expansion cards for graphics
and sound.
There are four steps that nearly all CPUs use in their operation: fetch, decode, execute, and write
back.
The first step, fetch, involves retrieving an instruction from program memory.
In the decode step, the instruction is broken up into parts that have significance to other
portions of the CPU.
During the execute step various portions of the CPU, such as the arithmetic logic unit (ALU)
and the floating point unit (FPU) are connected so they can perform the desired operation.
The final step, write back, simply writes back the results of the execute step to some form of
memory.
80286 CPU; inputs 16 bits of data Processes 16 bits of data Outputs 16 bits of data
80386SX CPU; inputs 16 bits of data *at a time Outputs 16 bits of data
Processes 32 bits of data
4
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
80386DX CPU; inputs 32 bits of data Processes 32 bits of data Outputs 32 bits of data
'586 CPU; inputs 32 bits of data Processes 32 bits of data Outputs 32 bits of data
Pentium/P6/K5 CPU; inputs 64 bits of data Processes 64 bits of data Outputs 64 bits of data
Pentium Pro CPU; inputs 64 bits of data Processes 64 bits of data ***Outputs 64 bits of data
* The 80386SX CPU takes 2 clock cycles to input 32 bits of data to process; this CPU is a
hybrid between an 80286 and an 80386DX.
**The 80486DX is the first CPU to integrate a math co-processor chip into the CPU itself. All
CPUs before this had separate math co-processors.
***The Pentium Pro will only run 32-bit applications.
Heat Sinks/Fans
Inside a custom-built computer: the power supply at the bottom has its own cooling
fan.
A power supply unit (PSU) converts alternating current (AC) electric power to low-
voltage DC power for the internal components of the computer.
Some power supplies have a switch to change between 230 V and 115 V. Other
models have automatic sensors that switch input voltage automatically, and are
able to accept any voltage between those limits.
Power supply units used in computers are nearly always switch mode power
supplies (SMPS). The SMPS provides regulated direct current power at the
several voltages required by the motherboard and accessories such as disk drives
and cooling fans.
5
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Case:
Cases can come in many different sizes (known as form factors). The size and
shape of a computer case is usually determined by the form factor of the
motherboard, since it is the largest component of most computers.
Consequently, personal computer form factors only the internal dimensions and
layout of the case.
For example, a case designed for an ATX motherboard and power
supply may take on several external forms, such as a vertical tower
(designed to sit on the floor, height > width) or a flat desktop (height <
width) or pizza box (height ≤ 2 inches, designed to sit on the desk under
the computer's monitor). Full-size tower cases are typically larger in
volume than desktop cases, with more room for drive bays and
expansion slots. Desktop cases—and mini-tower cases designed for the
reduced microATX form factor—are popular in business environments
where space is at a premium.
A dedicated video card (or video adapter) is an expansion card installed inside your
system unit to translate binary data received from the CPU or GPU into the images
you view on your monitor. It is an alternative to the integrated graphics chip.
Modern video cards include ports allowing you to connect to different video
equipment; also they contain their own RAM, called video memory.
Video cards also come with their own processors or GPUs. Calls to the CPU for
graphics processing are redirected to the processor on the video card, significantly
speeding up graphics processing. Updating to a dedicated graphics card offloads
work from the CPU and system RAM, so not only will graphics processing be faster,
but the system’s overall performance will improve.
The video card also controls the number of colors your monitor can display. The
number of bits the video card uses to represent each pixel on the monitor (referred
to as the bit depth) determines the color quality of the image displayed. The more
bits available, the better the color detail of the image.
VGA: Lots of colors and very-high-res graphics (VGA and Super VGA are compatible)
6
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
A Sound Card:
Network Card:
CD (compact disc)
The most common type of removable media, suitable for music and data.
7
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
storage.
Blu-ray Disc
o BD-ROM Drive - a device used for reading data from a Blu-ray disc.
o BD Writer - a device used for both reading and writing data to and from a
Blu-ray disc.
Floppy disk
Hard disk drives have been the dominant device for secondary
storage of data in general purpose computers since the early
1960s.[3] They have maintained this position because advances in
their recording density have kept pace with the requirements for
secondary storage.[3] Today's HDDs operate on high-speed serial
interfaces; i.e., serial ATA (SATA) or serial attached SCSI (SAS).
8
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Hardware that keeps data inside the computer for later use and remains persistent even
when the computer has no power.
A monitor, also known as a visual display unit (VDU) or screen, is like a television
screen. It is measured diagonally in inches — the distance from one corner of the
screen area to the opposite corner. The quality of a monitor is determined by its
resolution. Resolution is calculated based on the number of pixels, which are
individual dots that create the images you see on your monitor. Flat panel monitors
are now becoming a popular choice due to their portability and compactness.
Monitor
Keyboard
Mouse
Printers
A printer is a device that allows you to obtain hard copies of the data you have created on
your computer system. Printers are classified by:
1. Their quality
2. The speed of printing — pages per minute
3. The print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better.
There are different types of printers due to the different methods of transferring ink to paper.
Two common types for the home and office are inkjet and laser.
Inkjet printer — sprays ink onto a sheet of paper, and can produce
high-quality text and photo images.
9
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Laser printer — produces very high quality text and graphics, using
a process similar to a photocopier to produce print. It creates dot-
like images on a drum, using a laser beam light source.
Scanner
Parallel port: Connects printer to computer; sends 8 bits of data (1 byte) at a time.
Serial port: Connects serial devices (mouse, modem, plotter, and digitizer) to
computer; sends 1 bit of data at a time.
A small, portable device that plugs into a computer’s USB port and
operates as a portable hard drive. USB flash drives are considered
to be an ideal method to transport data, as they are small enough
to be carried in a pocket and can plug into any computer with a
USB drive. Other names for flash drives are thumb drives, pen
drives or USB drives.
Web cam
10
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Web cams are small cameras that plug into your computer which allow
the user to share a moving image of themselves with others on other
computers through the Internet.
11
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Digital camera
Digital cameras store images digitally onto a storage device, either a memory card or a
floppy disk, rather than recording them on film. Once a picture has been taken, it can be
downloaded to a computer system, and then manipulated or printed
Network Cables
Network Card
o Internal Network Card
o External Network Card
Hub
Bridge
Switch
Patch panel
Routers
Firewall
Network Cable:
Network Cables are used to connect computers. The most commonly used cables is Cat-5
cable that consists of four twisted pairs of copper wire terminated by RJ-45 connectors. Cat
5 cabling supports frequencies up to 100 MHz and speeds up to 1000Mbps.
Network Card:
12
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Network Card is a necessary component of a computer without which a computer cannot be
connected over a network. It is also known as the network adapter or Network Interface
Card (NIC). Most branded computers have network card pre-installed. Network cards are of
two types: Internal and External Network Cards.
Motherboard has a slots for internal network card where it is to be inserted. Internal network
cards are of two types in which the first type uses peripheral component interconnect (PCI)
connection, while the second type uses industry standard architecture (ISA). Network cables
are required to provide network access.
External network cards are of two types: Wireless and USB based. Wireless network card
needs to be inserted into motherboard, however no network cable is required to connect to
the network. Universal Serial Bus (USB) card is easy to use and connects via USB port.
Computers automatically detect USB card and can install the drivers required to support the
USB network card automatically.
Hub:
The Hub, also called repeater, is a devise that accepts Ethernet connections from network
devices and cress-connects them. Data arriving via the receiver pair of one connection is
regenerated and sent out on the transmit pair to all connected devices except for the device
who originated the transmission. The hub provide a central nodal device and its connections
are receive a broadcast frame.
Bridge:
In computer networking, a bridge is a layer-2 device that divides a network into separate
collision domains or segments while keeping the broadcast and sharing features within the
same domain/segment. The bridge keeps a table of all segments and forward frames
properly to make sure communication within or across segments are conducted smoothly.
13
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Patch Panel:
Switch:
Router:
A router is a type of device which acts as the central point among computers and other
devices that are a part of the network. A router is a layer 3 gateway device meaning that it
connects two or more networks. Which is designed to take incoming packets, analyze the
packets, moving the packets to another network, converting the packets to another network
interface, dropping the packets, directing the packets to the appropriate locations.
Firewall:
A firewall is a hardware-based network security system that controls the incoming and
outgoing network traffic based on applied rule set. Firewalls typically protect internal
14
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
networks from public networks, they are also used to control access between specific
network segments within a network.
Types of Networks
A small business network setup consisted of a few desktop PCs connected to a modest file
server. Nowadays, small business is actually big business; a single PC can now contain
gigabytes of mission-critical information, as even the smallest ‘Small Office Home Office’
operations most likely have high-speed connections now.
While all of this new computing and networking firepower brings great benefits to one’s
small business, it can also bring great disasters if proper care isn’t taken from the very
beginning when one’s computer network is first established. The following five suggestions
should be on the top of your priority list when setting up a new computer network for your
business:
While this may seem obvious, many small business owners don’t actually take time in the
beginning to determine the purpose of their network. Is the network intended to link up
computers locally or provide remote access as well? Will there be applications and data
shared from a central repository or distributed amongst various desktop and laptop PCs in a
peer-to-peer fashion? Understanding the purpose of your network will put you in a better
position for locating the right components and setting up the proper connections necessary
to meet your networking needs.
2. Establish a budget
15
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Failing to establish a budget for your network can lead to a multitude of problems in the
future. Not knowing just how much you are able to spend on networking hardware such as
routers, switches, Wi-Fi hot spots, cabling and firewalls could lead to purchasing the wrong
hardware or hardware that may not be best suited to work with pre-existing infrastructure.
Without knowing how much a small business has to spend on networking from day one
could lead to money shortages before all of the right hardware is purchased and installed.
3. Security
People don’t really recognize the need for security until it is too late. When it comes to small
business computer networking, security needs to be established from the very beginning.
Have software to block spam, advertisements and malware from entering your network.
Keep all operating system software and user applications fully patched and updated? Insist
on the use of strong passwords for all accounts, file-shares and encrypted data. Keep
important systems physically secured in lockable server rooms as well.
4. Training
Training is closely related to security, as a lot of staff training should be devoted towards
understanding proper use of the network so as to prevent it from becoming compromised.
Employees need to be instructed on what constitutes proper use of company networking
resources so as to prevent malware and viruses from ruining the system.
5. Maintenance
Designing a computer network is sure to be a strenuous task, but there are specific ways to
increase efficiency in this process. To start, you need to know who you’re designing the
network for, and how it should impact their needs and desires. It’s the same as anything
else really, when you design something you need to know your audience. With
implementing a computer network, a few key considerations always come into play: security,
a backup plan, standardization, recovery, and the future.
Network security is a primary function, and connectivity goes along with that. The two are
apparently intertwined, as you want to easy access and connection without compromising
security. It involves a variety of questions, such as data storage, whether you’re instituting
16
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
cloud capabilities, and who can gain access to certain types of information. Security should
be steady without slowing anything down.
Backup
Redundancy is a critical component, because it ensures that your network essentially has a
safeguard in place. No matter the size of the organization, using multiple servers is a smart
move. Having redundant components in place is a wise tool in case anything goes down.
The second connection in place is there in the event internet connectivity suffers or hosting
malfunctions, as this will limit any downtime.
Standardization
Standardization makes sense (and it makes life easier) an adjustment and regulations of the
system. The biggest part about installing a new computer network is making sure everything
is functional and runs smoothly. With standardization, it effectively reduces costs that would
typically be associated with maintenance or repairs. If a majority of employees are on the
same devices and such, it makes things like testing much more efficient.
Recovery
Any network needs a disaster recovery plan in place, because these situations will most
definitely occur. The power for a backup should be addressed as well as how the data is
backed up. Not only should this be in place, but backing up data should be done
consistently. This way, files are copied and safely stored in case of emergency.
The Future
When designing a network, it’s important to account for the future. If the business is rapidly
expanding, you should factor growth into the design to account for an increase in users. An
increase in employee’s means a more crowded and diverse network.
In today’s world every organization uses Computer network to maintain a proper flow of data
communication. The Computer network is the lifeline of an organization responsible for
regulating data transmission throughout the complete hierarchical structure. These networks
are used to share and exchange information which can be a text file, image file or multimedia
file. But problems come when a user faces a problem and due to lack of technical knowledge
have to abandon work.
You will be able to know and care about the common network problems and the necessary
steps which you should adopt to solve them:
problems The possible causes of the problems Resolutions to solve the problems
17
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
When the two computers are assigned with Identify the concerned computers and
same IP address by manual mistake then it assign them unique IP address.
will give rise to the connection problem. For Solving Network Interface card related
This can initiate connection error with the issues Ping the computer and change the
faulty settings.
computer of parent network.
IP and NIC The NIC is an important component which is
issue responsible for establishing a temporary
connection of your computer to computer
network
Sometime while working Computer shows Checks whether all the devices are properly
“No Network access” or service not available connected if not then reseat all the
for your computer with a web server error connection.
code HTTP 504. There are some unreachable areas also
No Network known as Cold Spots at which internet
connection is not available, to eliminate this
Access
problem Check the router or hub settings
and re plan the whole network.
Sometime the security restriction created by For solving this problem you have to change
user led to the denial of network access your PC firewall settings and thus enable
services. your computer to get access to the services
The firewall restrictions don’t allow your offered by the network.
No Network Highly secured Firewall settings are
computer to share the documents including mandated for boosting up your computer
Access due to text or image from/over the network security from threats but sometime for
Firewall computers. accessing the network services it is required
Sometime absence of network connectivity is lowering the security
Restriction due to firewall restrictions.
These restrictions will not let you to connect
to the desired network
You have noticed that the speed with which Re plan the network properly and allocates
you access network resources varies with resources according to the need.
time. It is always advised to zip up bulky files this
Declination in
Most of the people have mistaken that will reduce the burden on the network.
speed while Also identify whether your network card is
excess data transmission is the reason for configured in transmit mode indicates the
accessing speed declination. card is used excessively and the network
network This usually happens due to improper card is not working so replace it with the
resources network planning which leads to sluggish new one compatible to your computer
data transmission
In case of wired connection due to some For resolving this problem examine the
faulty connection or physically damaged can network cables if there is any cut then
cause regular drops network connection replace it.
In case of wireless network identify the cold
spot and faulty router settings, and then
Regular correct them. It is very difficult to
troubleshoot the problem in wireless network
Network but some sensible decision can eliminate
connection your problem.
failure If you still have some queries
pertaining to computer networks then
you can use the online technical
support services
18
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
Peripheral devices: are hardware devices which are added to a host computer in order to
expand its abilities. They may be internal or external to the computer. And also possible to
identify hardware’s required to set up a computer network. Commonly they are classified by
their purpose:
To determine the appropriate methods of working with these devices, knowledge of the
following is required:
Manufacturer’s requirements
Occupational Health and Safety (OH & S) requirements and safe work practices
Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties,
service and support, prospective suppliers will provide.
Warranties
It is important to know what kind of support services are offered by the prospective supplier.
There are many questions to consider such as:
If a device requires repairs does it have to be sent back to the supplier (called ‘Return to
base’) or will they provide on-site visits?
What is the average response time if service is required?
What kinds of maintenance and repair costs could be incurred during the duration of use
of the device?
Will the device require regular servicing? If so, how many services will be necessary
over a one-year period?
System specifications
It is important to find out the specifications of the computer system you are planning to
connect the peripheral device to. Many newer types of peripheral devices require a specific
19
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
amount of memory, CPU speed, hard disk space, and may only be compatible with certain
operating systems.
You also need to be aware of the peripheral’s system requirements. The manual for the
peripheral device as well as the manufacturer’s website will help you determine the
minimum system specifications.
Compatibility
Compatibility is the ability of a system or a product to work with other systems or products
without special effort on the part of the customer. One way products achieve interoperability
is to comply with industry interface standards. For example, a memory module is compatible
with a motherboard because the manufacturer of the memory module and the motherboard
both work to the same industry standard.
Technical specifications
Once the business requirements have been considered, the technical specifications of the
hardware device need to be evaluated. Areas for evaluation include the following:
The technical specifications to be considered will depend on the computer hardware device
to be purchased. For example, technical specifications to be considered for a printer include:
Warranty
When computer hardware devices are purchased, the supplier provides a guarantee that if a
fault develops in the equipment within a certain time, they will repair or replace it free of
charge.
Organizations need to consider the warranty conditions before purchasing to ensure their
business needs will be met. Common warranty conditions include:
20
PERPARD BY Andom T.
Training, Teaching and Learning Material Development Care for Networks and Computer Hardware ICT ITSS2
The level of service purchased by an organization will depend on how critical the device is to
the IT system.
A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.
Organizational policies
Some organizations have a policy of using preferred suppliers for computer hardware
purchases. This ensures the quality and consistency of computer hardware devices is
maintained throughout an organization.
21
PERPARD BY Andom T.