Professional Documents
Culture Documents
Prepared by:
RAYMOND G. PUNO
Teacher I
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing,
installing and testing of computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the
environment.
During installation and initial test, careful planning and preparation are to be done.
To avoid personal injury and damages to wiring due to sharp pins on connectors and
printed circuit assemblies, rough chassis edges and corners, and hot components.
Adhere to warnings and limitations regarding accessibility into areas designated only
for authorized technical personnel.
CONCEPT DEVELOPMENT:
SOME BASIC PRECAUTIONS AND PROCEDURES:
➢ Before starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.
➢ Failure to do the proper jumper setting may cause damage to your CPU.
➢ Without an effective cooling fan, the CPU can overheat and cause
damage to both CPU and the motherboard.
➢ Each bank must have the same size and type of memory installed in pairs.
➢ Before adding and removing any other system components, make sure
that you unplug your power supply. Failure to do so may cause damage
to your motherboard and in the system component.
➢ Test the computer, insuring that it meets the necessary system
requirements before booting up.
➢ If the computer does not pass any of the power on self-test (POST), the
computer will receive an irregular power on self-test. An irregular POST is a
beep code which is different from the standard beep which can either be
no beeps at all or a combination of different beeps.
EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact on the labor
force, health risks, and the impact on the environment.
1. Violation of Privacy
Nearly every life event is stored in a computer somewhere--in medical records, credit
reports, tax records, etc. It is crucial that personal and confidential records be
protected properly. In many instances, where these records were not properly
protected, individuals have found their privacy violated and identities stolen.
2. Impact on Labor Force
Although computers have improved productivity in many ways and created an entire
industry with hundreds of thousands of new jobs, the skills of millions of workers and
managers have been replaced by computers. Thus, it is crucial that workers keep their
education up-to-date. A separate impact on the labor force is that some companies
are outsourcing jobs to foreign countries instead of keeping their homeland labor
force employed.
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back. Computer users can protect themselves from
these health risks through proper workplace design, good posture while at the
computer, and appropriately spaced work breaks. Another health risk, called
computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share publicly their
photos, videos, journals, music, and other personal information. Some of these
unsuspecting, innocent computer users have fallen victim to crimes committed by
dangerous strangers. Protect yourself and your dependents from these criminals by
being cautious. For example, do not share information that would allow others to
identify or locate you.
5. Impact on Environment
Computer manufacturing processes and computer waste are depleting natural
resources and polluting the environment. The amount of resources required to
manufacture a personal computer equals that of a mid-sized car. When computers
are discarded in landfills, they release toxic materials and potentially dangerous levels
of lead, mercury, and flame retardants. Strategies that can help protect the
environment include recycling, regulating manufacturing processes, extending the
life of computers, and immediately donating replaced computers.
Torx Screwdriver
Used to loosen or tighten screws that have a star-like depression on the top, a
feature that is mainly found on laptop.
Hex Driver
Sometimes called a nut driver, is used to
tighten nuts in the same way that a screwdriver
tightens screws.
Needle-Nose Pliers
Used to hold small parts.
Wire Cutter
Used to strip and cut wires
Multitester
A multi-meter or a multi-tester, also known as a VOM (Volt-Ohm meter), is an
electronic measuring instrument that combines several measurement functions in one
unit
Tweezers
Used to manipulate small parts
Flashlight
Used to light up areas that you cannot see well.
Crimping tool
A crimping tool is a device used to conjoin two pieces of metal by deforming
one or both of them to hold each other. The result of the tool's work is called a crimp.
An example of crimping is affixing a connector to the end of a cable.
RJ 45 Connector
A plastic connector used for UTP Cable to connect computers in a network
Cable tester
A cable tester is a device used to test the
strength and connectivity of a particular type of
cable or other wired assemblies. A cable tester can
test whether a cable or wire is set up properly,
connected correctly, and the communication
strength between the source and destination.