You are on page 1of 76

COMPETENCY BASED LEARNING MATERIAL

Sector: ELECTRONICS

Qualification: COMPUTER SYSTEMS SERVING NCII

Unit of Competency: PERFORM COMPUTER OPERATIONS

Module Title: PERFORMING COMPUTER OPERATIONS

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 1 of 76
NC II
Revision # 1
Trainer
(COMPUTER SYSTEMS SERVICING NCII)
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Develop and updated Developing and updating TRS311201


1.
industry knowledge industry knowledge

Observe workplace hygiene Observing workplace TRS311202


2.
procedures hygiene procedures

Perform computer Performing computer TRS311203


3.
operations operations

Perform workplace and Performing workplace and TRS311204


4.
safety practices safety practices

Provide Effective customer Providing effective customer TRS311205


5.
service service
UNIT OF COMPETENCY: PERFORM COMPUTER OPERATIONS

UNIT CODE: CSS311203

MODULE TITILE: PERFORMING COMPUTER OPERATIONS

MODULE DESCRIPTOR: This unit deals with the knowledge skills, attitudes and values
needed to perform computer operations which includes inputting, accessing, producing and
transferring data using the appropriate hardware and software.

NOMINAL DURATION: 4 hours

QUALIFICATION LEVEL: NCII

PREREQUISITE: NONE

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 2 of 76
NC II
Revision # 1
Trainer
SUMMARY OF LEARNING OUTCOMES:

Upon the learning of this module, the trainee/student must be able to:

LO 1: Identify & explain the functions, general features & capabilities of both hardware &
software

LO 2: Prepare & use appropriate hardware & software according to task requirements

LO 3. Use appropriate devices & procedure s to transfer files/data

LO 4: Produce accurate & complete data according to the requirements

LO 5: Maintain computer system

LO 1: IDENTIFY & EXPALIN THE FUNCTIONS, GENERAL FEATURES &


CAPABILITIES OF BOTH HARDWARE & SOFTWARE
Assessment Criteria:

1. Requirements of task are determined


2. Appropriate hardware and software is selected according to task assigned and
required outcome.
3. Task is planned to ensure OHS & guidelines and procedures are followed.

Contents:

 Basic economics of keyboard and computer use


 Main types of computers and basic features of different operating systems
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 3 of 76
NC II
Revision # 1
Trainer
Condition:

 Writing materials
o Hand outs
o Visual aids
o Hardware and peripheral devices
o Computers
o Networked system
o Communication equipment
o Printers
o Scanner
o Keyboard mouse
o Software
o Storage media

Methodology/Training Delivery:

 Lecture
 Discussion

Assessment Method:

 Questioning
 Practical demonstration

LEARNING OUTCOME

LO 1: IDENTIFY & EXPALIN THE FUNCTIONS, GENERAL FEATURES &


CAPABILITIES OF BOTH HARDWARE & SOFTWARE

Learning Activities Special Instructions

1. Read Information sheet 3.1.1-1 Basic


computer operations
The focus of this learning outcome is to
2. Answer Self-Check 3.1.1-1 and
provide knowledge on basic computer
Compare your answers with Answer
operations
Key 3.1.1-1.
The output of this learning outcome is for
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 4 of 76
NC II
Revision # 1
Trainer
you to be aware of the importance of each
usage. This material is based on the
session plan the trainers develop.

INFORMATION SHEET 3.1.1-1


BASIC COMPUTER OPERATIONS

After reading this INFORMATION SHEET you must be able to


1. Know the basic computer operations

5 basic operations performed by computer system


 Inputting
 Storing
 Processing

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 5 of 76
NC II
Revision # 1
Trainer
 Outputting
 Controlling

The internal structure of a computer looks like above:

Input unit:

Input unit links the external environment with the computer system. Data and instruction
must be entered to the computer before performing any competition. Data or instructions
can be entered through input devices

eg. Key board, or any other input devices.

Input unit transferred this data into binary coded in short input unit performs the following
function:

 It accepts data or instructions from external world.


 It converts these instructions and data in computer acceptable form.
 It supplies the converted instruction & data to the computer for further
processing.

Output unit:

The job of output unit it is just the viewers of that any input unit it provides information
reasons of computation to the output of the world. Output unit links the computer with the
external world. A computer prepares results in binary code. Output unit converts these
results into human acceptable forms. Inshort perform the following functions.

 It accepts the result produced by the computer.


 It converts these coded results to human acceptable form.
 It supplies the converted to the outside world.

Storage unit:

Before actual processing start, data & instructions entered to the computer must be stored
inside the computer. Similarly, results produced by the computer are required to be stored
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 6 of 76
NC II
Revision # 1
Trainer
before being passed to the output unit. The intermedial result produced by the computer
must also be stored for further processing. Inshort the function of storage unit:
 It stores all the data to be process.
 It stores intermedial results.

 It stores final result are realize an output device.

ALU:

ALU is the place where actual execution of the instructions takes places during the
processing operations. All calculations & comparisons are made in the ALU. The data and
instructions stored in the primary storage are transphered as where required. Intermedial
results are also transphered back to the ALU for the final processing. After completion of
processing the final results are send to storage units from ALU.

Number of arithmetic & logical operation that a computer can perform is determined by the
design to perform the four basic arithmetic operations. They are +,-,*,/. The logic operations
like <,=,>.
Control unit:
ALU dose not know what should be done with the data likewise, output unit dose not know
when the result should be displayed. By selecting, interning and seeing to the execution of
the program the CU is able to maintain order and direct the operations of the entire system
CU doesn’t perform any actual processing on data yet it is known as a central nervous
system for the comforts of the computer.

It manages co-ordinates the entire system.

SELF CHECK 3.1.1-1

Please read the questions carefully

1. What is input?
2. What is storing?

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 7 of 76
NC II
Revision # 1
Trainer
SELF CHECK 3.1.1-1

Please read the questions carefully

1. What is input?
Answer: Input unit links the external environment with the computer system.

2. What is storing?

Answer:

 It stores all the data to be process.


 It stores intermedial results.
 It stores final result are realize an output device.

LO 2: PREPARE & USE APPROPRIATE HARDWARE & SOFTWARE ACCORDING


TO TASK REQUIREMENTS

Assessment Criteria:

1. Data are entered into the computer using appropriate program/application in


accordance with company procedures.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 8 of 76
NC II
Revision # 1
Trainer
2. Accuracy of information is checked and information is saved in accordance with
standard operating procedures.
3. Inputted data are stored in storage media according to requirements.
4. Work is performed within ergonomic guidelines.

Contents:

 Reading skills required to interpret \work instruction.


 Communication skills

Condition:

 Writing Materials
o Hand outs
o Visual aids
o Hardware and peripheral devices
o Computers
o Networked system
o Communication equipment
o Printers
o Scanner
o Keyboard mouse
o Software
o Storage media

Methodology/Training Delivery:

 Lecture
 Discussion

Assessment Method:

 Questioning
 Practical demonstration

LEARNING OUTCOME

LO 2: IDENTIFY & EXPALIN THE FUNCTIONS, GENERAL FEATURES &


CAPABILITIES OF BOTH HARDWARE & SOFTWARE

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 9 of 76
NC II
Revision # 1
Trainer
Learning Activities Special Instructions

1. Read Information sheet 3.1.2-1 types


of computer software
The focus of this learning outcome is to
2. Answer Self-Check 3.1.2-1 and
provide knowledge on types of computer
Compare your answers with Answer
software
Key 3.1.2-1.
The output of this learning outcome is for
you to be aware of the importance of each
usage. This material is based on the
session plan the trainers develop.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 10 of 76
NC II
Revision # 1
Trainer
INFORMATION SHEET 3.1.2-1
TYPES OF COMPUTER SOFTWARE

After reading this INFORMATION SHEET you must be able to know:


1. Common Types of software
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 11 of 76
NC II
Revision # 1
Trainer
2. Other types of software
Common Types of Computer Software

Computer Software is the languages of the computer. And like the human languages,
there are many different computer languages. Essentially, Computer software can be
divided into three main groups depending on their use and application these are:

1. System software or Operating System software

Is the software used by the computer to translate inputs from various sources
into a language which a machine can understand. Basically the System software or
the operating system software coordinates the different hardware components of a
computer. There are many OS in the market. The most popular OS are from the stable
of Windows, Microsoft has migrated to Vista, its latest offering in the market. It
may come as a surprise to some ` that there are other operating systems used by
others. Among these UNIX is use for large office setups with extensive networking.
XENIX is software which has now become redundant. HP –UX and AIX are some
operating system used by HP computers. Apache OS is quite popular with web
servers. IBM is still uses proprietary operating system for its main frames.
Proprietary systems are generally built with the help of a variant of UNIX operating
system.

2. Application software

A normal user rarely gets to see the operating system or to work with it. But all
of us are familiar with application software which we must use to interact with
computer. Popular example of application software are the Microsoft office suite
which include word, excel, and PowerPoint. We have use this application extensively.
Internet explorer , Mozilla Firefox is two applications software used to access the
internet.

Application Software - also provides support to the physical components of


computers. System software coordinates all external devices of computer system like
printer, keyboard, displays etc.

Application software is used for commercial purpose. The application software


is widely used in educational, business and medical fields. Computer games are
the most popular forms of application software. Industrial automation, databases,
business software and medical software prove to be of great help in the respective fields.
Educational software is widely used in educational institutes across the globe.

3. Programming Languages;
Programmers use the programming software to develop the programming
languages necessary to run computer software. Compliers, interpreters, linkers
and text editors are some of the basic tools used in programming software.

Programming program or Programming Languages


Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 12 of 76
NC II
Revision # 1
Trainer
Now this a kind of computer software which is used exclusively by computer
programmers. Unless we are also programmers, we are unlikely to come across
programming languages. A simple way to understand programming languages is to
think of them as bricks which can be used to create application and operating system.
C++, Java

and SIMLAB are some popular programming languages. Generally java is used for
internet application. C++ is a language of a professional developers and used
extensively in developing operating system. PHP is another languages used for
internet applications. There is a new class of languages which are utilized for mobiles.
These are light weight, modular languages which are used to design mobile application.

Computer software fall under three basic categories; system software or


operating system software, application software, and Programming languages. We
usually use application on a day to day basis. These application are themselves
created using programming languages.

OTHER TYPES OF SOFTWARE

There are many different types of software, which can be a little confusing for the
uninitiated. Following is a brief definition of each type, and the differences between
them.

Retail software: This type of software is sold off the shelves of retail stores. It includes
expensive packaging designed to catch the eye of shoppers and, as such, is generally
more expensive. An advantage of retail software is that it comes with printed manuals
and installation instructions, missing in hard-copy form from virtually every other
category of software. However, when hard-copy manuals and instructions are not
required, a downloadable version off the Internet will be less expensive, if available.

OEM software: OEM stands for "Original Equipment Manufacturer" and refers to
software sold in bulk to resellers, designed to be bundled with hardware. For example,
Microsoft has contracts with various companies including Dell Computers, Toshiba,
Gateway and others. Microsoft sells its operating systems as OEM software at a reduced
price, minus retail packaging, manuals and installation instructions. Resellers install
the operating system before systems are sold and the OEM CD is supplied to the buyer.
The "manual" consists of the Help menu built into the software itself. OEM software is
not legal to buy unbundled from its original hardware system.

Shareware: This software is downloadable from the Internet. Licenses differ, but
commonly the user is allowed to try the program for free, for a period stipulated in the
license, usually thirty days. At the end of the trial period, the software must be
purchased or uninstalled. Some shareware incorporates an internal clock that disables
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 13 of 76
NC II
Revision # 1
Trainer
the program after the trial period unless a serial number is supplied. Other shareware
designs continue to work with "nag" screens, encouraging the user to purchase the
program.

Crippleware: This software is similar to shareware except that key features will cease to
work after the trial period has ended. For example, the "save" function, the print
function, or some other vital feature necessary to use the program effectively may
become unusable. This "cripples" the program. Other types of crippleware incorporate
crippled functions throughout the trial period. A purchase is necessary to unlock the
crippled features.

Demo software: Demo software is not intended to be a functioning program, though it


may allow partial functioning. It is mainly designed to demonstrate what a purchased
version is capable of doing, and often works more like an automated tutorial. If a person
wants to use the program, they must buy a fully functioning version.

Adware: This is free software that is supported by advertisements built into the program
itself. Some adware requires a live Internet feed and uses constant bandwidth to upload
new advertisements. The user must view these ads in the interface of the program.
Disabling the ads is against the license agreement. Adware is not particularly popular.

Spyware: Spyware software is normally free, but can be shareware. It clandestinely


"phones home" and sends data back to the creator of the spyware, most often without
the user's knowledge. For example, a multimedia player might profile what music and
video files the software is called upon to play. This information can be stored with a
unique identification tag associated with the specific program on a user's machine,
mapping a one-to-one relationship.

The concept of spyware is very unpopular, and many programs that use spyware
protocols were forced to disclose this to users and offer a means to turn off reporting
functions. Other spyware programs divulge the protocols in their licenses, and make
acceptance of the spyware feature a condition of agreement for using the software.

Freeware: Freeware is also downloadable off the Internet and free of charge. Often
freeware is only free for personal use, while commercial use

requires a paid license. Freeware does not contain spyware or adware. If it is found to
contain either of these, it is reclassified as such.

Public domain software: This is free software, but unlike freeware, public domain
software does not have a specific copyright owner or license restrictions. It is the only
software that can be legally modified by the user for his or her own purposes. People
are encouraged to read licenses carefully when installing software, as they vary widely.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 14 of 76
NC II
Revision # 1
Trainer
GENERAL SECURITY, PRIVACY LEGISLATION AND COPYRIGHT

The security of software is threatened at various points throughout its life cycle, both by
inadvertent and intentional choices and actions taken by “insiders”—individuals closely
affiliated with the organization that is producing, deploying, operating, or maintaining
the software, and thus trusted by that organization—and by “outsiders” who have no
affiliation with the organization. The software’s security can be threatened:

 during its development: A developer may corrupt the software—intentionally or


unintentionally—in ways that will compromise the software’s dependability and
trustworthiness when it is operational.
 during its deployment (distribution and installation): If those responsible for
distributing the software fail to tamperproof the software before shipping or
uploading, or transmit it over easily intercepted communications channels, they
leave the software vulnerable to intentional or unintentional corruption.
Similarly, if the software’s installer fails to “lock down” the host platform, or
configures the software insecurely, the software is left vulnerable to access by
attackers.

 during its operation: Once COTS and open source software has gone
operational, vulnerabilities may be discovered and publicized; unless security
patches and updates are applied and newer supported versions (from which the
root causes of vulnerabilities have been eliminated) are adopted, such software
will become increasingly vulnerable. Non-commercial software and open source
software (OSS) may also be vulnerable, especially as it may manifest
untrustworthy behaviors over time due to changes in its environment that stress
the software in ways that were not anticipated and simulated during its testing.
Any software system that runs on a network-connected platform has its
vulnerabilities exposed during its operation. The level of exposure will vary
depending on whether the network is public or private, Internet-connected or
not, and whether the software’s environment has been configured to minimize its
exposure. But even in highly controlled networks and “locked down”
environments, the software may be threatened by malicious insiders (users,
administrators, etc.).

 during its sustainment: If those responsible for addressing discovered


vulnerabilities in released software fail to issue patches or updates in a timely
manner, or fail to seek out and eliminate the root causes of the vulnerabilities to
prevent their perpetuation in future releases of the software, the software will
become increasingly vulnerable to threats over time. Also, the software’s
maintainer may prove to be a malicious insider, and may embed malicious code,
exploitable flaws, etc., in updated versions of the code.

Both research and real-world experience indicate that correcting weaknesses and

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 15 of 76
NC II
Revision # 1
Trainer
vulnerabilities as early as possible in the software’s life cycle is far more cost-effective
over the lifetime of the software than developing and releasing frequent security patches
for deployed software.

Software Assurance

The main objective of software assurance is to ensure that the processes, procedures,
and products used to produce and sustain the software conform to all requirements and
standards specified to govern those processes, procedures, and products. Software
security and secure software are often discussed in the context of software assurance.
Software assurance in its broader sense refers to the assurance of any required property
of software. For software practitioners at the National Aeronautics and Space
Administration (NASA), software assurance refers to the assurance of safety as a
property of software. Similarly, in other communities, software assurance may refer to
assurance of reliability or quality. In the context of this article, software assurance is
concerned with assuring the security of software.

An increasingly agreed-upon approach for assuring the security of software is the


software security assurance case, which is intended to provide justifiable confidence
that the software under consideration

(1) is free of vulnerabilities;


(2) functions in the “intended manner,” and this “intended manner” does not
compromise the security or any other required properties of the software, its
environment, or the information it handles; and
(3) can be trusted to continue operating dependably under all anticipated
circumstances, including anomalous and hostile environmental and utilization
circumstances—which means that those who build the software need to anticipate such
circumstances and design and implement the software to be able to handle them
gracefully. Such circumstances include

 the presence of unintentional faults in the software and its environment


 the exposure of the operational software to accidental events that threaten its
security

 the exposure of the software to intentional choices or actions that threaten its
security during its development, deployment, operation, or sustainment

Software is more likely to be assuredly secure when security is a key factor in the
following aspects of its development and deployment:

 Development principles and practices: The practices used to develop the


software and the principles that governed its development are expressly intended
to encourage and support the consideration and evaluation of security in every
phase of the software’s development life cycle. Some secure development
principles and practices for software are suggested later in this article.
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 16 of 76
NC II
Revision # 1
Trainer
 Development tools: The programming language(s), libraries, and development
tools used to design and implement the software are evaluated and selected for
their ability to avoid security vulnerabilities and to support secure development
practices and principles.

 Testing practices and tools: The software is expressly tested to verify its
security, using tools that assist in such testing.

 Acquired components: Commercial off-the-shelf (COTS) and OSS components


are evaluated to determine whether they contain vulnerabilities, and if so
whether the vulnerabilities can be remediated through integration to minimize
the risk they pose to the software system.

 Deployment configuration: The installation configuration of the software


minimizes the exposure of any residual vulnerabilities it contains.

 Execution environment: Protections are provided by the execution environment


that can be leveraged to protect the higher level software that operates in that
environment.

 Practitioner knowledge: The software’s analysts, designers, developers, testers,


and maintainers are provided with the necessary information (e.g., through
training and education) to give them sufficient security awareness and
knowledge to understand, appreciate, and effectively adopt the principles and
practices that will enable them to produce secure software.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 17 of 76
NC II
Revision # 1
Trainer
SELF CHECK 3.1.2-1

Please read the questions carefully

1. Enumerate at least 5 other types of software and uses

ANSWER KEY 3.1.2-1

Please read the questions carefully

1. Enumerate at least 5 other types of software and uses

Answer:

Retail software: This type of software is sold off the shelves of retail stores. It includes
expensive packaging designed to catch the eye of shoppers and, as such, is generally more
expensive. An advantage of retail software is that it comes with printed manuals and
installation instructions, missing in hard-copy form from virtually every other category of
software. However, when hard-copy manuals and instructions are not required, a
downloadable version off the Internet will be less expensive, if available.

OEM software: OEM stands for "Original Equipment Manufacturer" and refers to
software sold in bulk to resellers, designed to be bundled with hardware. For example,
Microsoft has contracts with various companies including Dell Computers, Toshiba,
Gateway and others. Microsoft sells its operating systems as OEM software at a reduced
price, minus retail packaging, manuals and installation instructions. Resellers install the
operating system before systems are sold and the OEM CD is supplied to the buyer.

Shareware: This software is downloadable from the Internet. Licenses differ, but commonly
the user is allowed to try the program for free, for a period stipulated in the license, usually
thirty days.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 18 of 76
NC II
Revision # 1
Trainer
Crippleware: This software is similar to shareware except that key features will cease to
work after the trial period has ended. For example, the "save" function, the print function,
or some other vital feature necessary to use the program effectively may become unusable.

Demo software: Demo software is not intended to be a functioning program, though it may
allow partial functioning. It is mainly designed to demonstrate what a purchased version is
capable of doing, and often works more like an automated tutorial.

LO 3: USE APPROPRIATE DEVICES & PROCEDURES TO TRANSFER


FILES/DATA
Assessment Criteria:
1. Correct program/application is selected based on job requirements.
2. Program/application containing the containing the information required is accessed
according to company procedures.
3. Desktop icons are correctly selected, operated and closed for navigation purposes.
4. Keyboard techniques are carried out in line with OHS requirements for safe use of
keyboards.

Contents:
 Basic economics of keyboard and computer use
 Main types of computers and basic features of different operating systems
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software

Condition:

 Writing materials
o Hand outs
o Visual aids
o Hardware and peripheral devices
o Computers
o Networked system
o Communication equipment
o Printers
o Scanner
o Keyboard mouse
o Software
o Storage media

Methodology/Training Delivery:
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 19 of 76
NC II
Revision # 1
Trainer
 Lecture
 Discussion

Assessment Method:

 Questioning
 Practical demonstration

LEARNING OUTCOME

LO 3: USE APPROPRIATE DEVICES & PROCEDURES TO TRANSFER


FILES/DATA

Learning Activities Special Instructions

1. Read Information sheet 3.1.3-1 Parts


of computer
The focus of this learning outcome is to
2. Answer Self-Check 3.1.3-1 and
provide knowledge on parts of computer
Compare your answers with Answer
Key 3.1.3-1. The output of this learning outcome is for
you to be aware of the importance of each
usage. This material is based on the
session plan the trainers develop.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 20 of 76
NC II
Revision # 1
Trainer
INFORMATION SHEET 3.1.3-1
PARTS OF COMPUTER
After reading this INFORMATION SHEET you mjust be able to
1.Know the parts of computer

PARTS OF THE COMPUTER


If you use a desktop computer, you might already know that there isn't any single part called
the "computer." A computer is really a system of many parts working together. The physical
parts, which you can see and touch, are collectively called hardware. (Software, on the other
hand, refers to the instructions, or programs, that tell the hardware what to do.)

The illustration below shows the most common hardware in a desktop computer
system. Your system may look a little different, but it probably has most of these parts.
A laptop computer has similar parts but combines them into a single notebook-sized
package.

System unit

The system unit is the core of a computer system. Usually it's a rectangular box placed on or
underneath your desk. Inside this box are many electronic components that process
information. The most important of these components is the central processing unit (CPU), or
microprocessor, which acts as the "brain" of your computer. Another component is random
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 21 of 76
NC II
Revision # 1
Trainer
access memory (RAM), which temporarily stores information that the CPU uses while the
computer is on. The information stored in RAM is erased when the computer is turned off.

Almost every other part of your computer connects to the system unit using cables. The
cables plug into specific ports (openings), typically on the back of the system unit. Hardware
that is not part of the system unit is sometimes called a peripheral device or device.

Storage

Your computer has one or more disk drives—devices that store information on a metal or
plastic disk. The disk preserves the information even when your computer is turned off.

Hard disk drive

Your computer's hard disk drive stores information on a hard disk, a rigid platter or stack of
platters with a magnetic surface. Because hard disks can hold massive amounts of
information, they usually serve as your computer's primary means of storage, holding almost
all of your programs and files. The hard disk drive is normally located inside the system unit.

CD and DVD drives

Nearly all computers today come equipped with a CD or DVD drive, usually located on the
front of the system unit. CD drives use lasers to read (retrieve) data from a CD, and many CD
drives can also write (record) data onto CDs. If you have a recordable disk drive, you can store
copies of your files on blank CDs. You can also use a CD drive to play music CDs on your
computer.
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 22 of 76
NC II
Revision # 1
Trainer
DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive,
you can watch movies on your computer. Many DVD drives can record data onto blank DVDs.

Tip

If you have a recordable CD or DVD drive, periodically back up (copy) your important files to
CDs or DVDs. That way, if your hard disk ever fails, you won't lose your data.

Floppy disk drive

Floppy disk drives store information on floppy disks, also called floppies or diskettes.
Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also
retrieve information more slowly and are more prone to damage. For these reasons, floppy
disk drives are less popular than they used to be, although some computers still include
them.

Why are floppy disks "floppy"? Even though the outside is made of hard plastic, that's just the
sleeve. The disk inside is made of a thin, flexible vinyl material.

Mouse

A mouse is a small device used to point to and select items on your computer screen.
Although mice come in many shapes, the typical mouse does look a bit like an actual mouse.
It's small, oblong, and connected to the system unit by a long wire that resembles a tail. Some

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 23 of 76
NC II
Revision # 1
Trainer
newer mice are wireless.

A mouse usually has two buttons: a primary button (usually the left button) and a secondary
button. Many mice also have a wheel between the two buttons, which allows you to scroll
smoothly through screens of information.

When you move the mouse with your hand, a pointer on your screen moves in the same
direction. (The pointer's appearance might change depending on where it's positioned on your
screen.) When you want to select an item, you point to the item and then click (press and
release) the primary button. Pointing and clicking with your mouse is the main way to interact
with your computer. For more information, see Using your mouse.

Keyboard

A keyboard is used mainly for typing text into your computer. Like the keyboard on a
typewriter, it has keys for letters and numbers, but it also has special keys:

 The function keys, found on the top row, perform different functions depending on
where they are used.
 The numeric keypad, located on the right side of most keyboards, allows you to enter
numbers quickly.

 The navigation keys, such as the arrow keys, allow you to move your position within a
document or webpage.

You can also use your keyboard to perform many of the same tasks you can perform with a

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 24 of 76
NC II
Revision # 1
Trainer
mouse. For more information, see Using your keyboard.

Monitor

A monitor displays information in visual form, using text and graphics. The portion of the
monitor that displays the information is called the screen. Like a television screen, a
computer screen can show still or moving pictures.

There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD (liquid
crystal display) monitors. Both types produce sharp images, but LCD monitors have the
advantage of being much thinner and lighter. CRT monitors, however, are generally more
affordable.

LCD monitor (left) CRT monitor (right)

Printer

A printer transfers data from a computer onto paper. You don't need a printer to use your
computer, but having one allows you to print e-mail, cards, invitations, announcements, and
other materials. Many people also like being able to print their own photos at home.

The two main types of printers are inkjet printers and laser printers. Inkjet printers are the
most popular printers for the home. They can print in black and white or in full color and can
produce high-quality photographs when used with special paper. Laser printers are faster and
generally better able to handle heavy use.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 25 of 76
NC II
Revision # 1
Trainer
Speakers

Speakers are used to play sound. They may be built into the system unit or connected with
cables. Speakers allow you to listen to music and hear sound effects from your computer.

Computer speakers

Modem

To connect your computer to the Internet, you need a modem. A modem is a device that sends
and receives computer information over a telephone line or high-speed cable. Modems are
sometimes built into the system unit, but higher-speed modems are usually separate
components.

Cable modem

MAIN PARTS OF A COMPUTER

A typical PC contains the following hardware:

There are many other possible hardware components, such as a DVD, CD-RW, Zip drive or
network card. There are also many subcomponents of a PC, such as the cooling fan, printer
port or reset switch to name a few. This article focuses on the basic PC hardware. The
hardware in the list above is nearly universal to a basic PC.

What are the main components of my computer and what are their function. An important
question, also what should I be looking for in my computer's components, here I will explain
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 26 of 76
NC II
Revision # 1
Trainer
the main parts of a computer system and what each part does, and some examples of some
good ones to use.

Case + PSU

A computer case is what contains the entire computer's components, there will be space for
drives, add-in cards and the motherboard. In addition to this, space for the Power Supply Unit
(PSU).

Depending on the size of motherboard that you have and the need for
space in your computer there are a variety of computer case sizes to
accomodate the computer's components.

Things to consider are desk space, cooling, room for expansion and
cost. With these things in mind you should have no problem selecting
the correct case for your needs.

Listed below are the cases with the advantages and disadvantages of each, most cases cost
more the larger they get however very small cases are normally more expensive than the
bigger ones!

Mini - Ideal for people who need a PC in a very small space, for the Micro ATX motherboards.
Advantages - Look cool, saves loads of space, added features. Disadvantages - Cost, little/no
room for expansion, problems of overheating with fast processors.

Slimline - Ideal for people who want a desktop computer, but dont want a huge box on their
desk. Advantages - Look cool, saves loads of space, added features. Disadvantages - Cost,
little/no room for expansion.

Desktop - Cheap case solution for a PC. Advantages - Cheap to buy, loads of room for
expansion. Disadvantages - They are big, take up desk space. Can have overheating problems
if the internal case design is poor.

Mini-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to
buy, loads of room for expansion. Disadvantages - Having it on the floor can make problems
getting to the drives and cables that are too short.

Midi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to
buy, loads of room for expansion. Disadvantages - Having it on the floor can make problems
getting to the drives and cables that are too short.

Maxi-Tower - Great for more desk space as it can be floor standing. Advantages - Cheap to

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 27 of 76
NC II
Revision # 1
Trainer
buy, loads of room for expansion. Disadvantages - Having it on the floor can make problems
getting to the drives and cables that are too short.

There are two basic common types for Computer Casing or chassis:

 Tower Case – it is designed to stand vertically that will lessen the space being
occupied. It comes in three basic sizes: full, midi and mini.

 Desktop Case – it is designed horizontally which are usually used for office or
home PCs. It comes in two basic sizes: standard and slimline.

STANDARD COMPUTER BOX LAYOUT











Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 28 of 76
NC II
Revision # 1
Trainer
CPU

The CPU or the Central Processing unit is the brain of the computer and the singl e most
important chip in the computer. Modern processors contain millions of transistors which are
etched onto a tiny square silicon called a die, which is about the with of a standard thumb.

The faster and better the processor the more quickly the computer will
execute commands, so your games will work faster and your
applications will work more quickly and more responsively.

There are various chip producers the big two are Intel and AMD, both
work well, though the Intel chips still have a slight advantage on
floating point calculations.

Central Processing Unit (CPU) or Microprocessor - The CPU is the


first thing that comes to mind when many people think about a
computer's speed and performance. It is the “heart and brain of the
computer”. The faster the processor, the faster the computer can
think. In the early

days of PC computers, all processors had the same set of pins that
would connect the CPU to the motherboard, called the Pin Grid Array
(PGA). These pins fit into a socket layout called Socket 7. This meant
that any processor would fit into any motherboard.

Current socket arrangements are often named for the number of


pins in the PGA. Commonly used sockets are:

 Socket LGA775 – For latest pentum 4, Pentum D,


Series Core Technologies
 Socket 478 - for older Pentium and Celeron
processors
 Socket 754 - for AMD Sempron and some AMD
Athlon processors
 Socket 939 - for newer and faster AMD Athlon
processors
 Socket AM2 - for the newest AMD Athlon processors
 Socket A - for older AMD Athlon processors

With a processor, the faster the more expensive it is. Beware the price differences a lot for
only a small increase in performance, sometimes a clock speed increase of 0.2Ghz can cost
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 29 of 76
NC II
Revision # 1
Trainer
£200 or more extra

RAM

RAM or Random Access Memory is the memory used by the computer while it is in operation,
this memory is described as volitile as it is wiped clean when the computer is shutdown.
Again the more RAM that you have installed in your computer the faster the computer will
operate.

There are various types of RAM, they vary becuase of the increasing in
processor speeds and the need for the RAM to keep up.

You can get RAM modules in various sizes i.e. their logical sizes, the
amount of data they can hold. This range from 1MB, 2MB, 4MB, 8MB,
16MB, 32MB, 64MB, 128MB, 256MB, 512MB, 1GB, 2GB. Nowadays you
will normally only find RAM in sizes of 128MB or above.

SIMM or DIMM? The two main types of RAM are SIMM (Single Inline Memory Module) and
DIMM (Dual Inline Memory Module) all modern computers use the DIMM type of RAM.

There are 4 main types of RAM listed below and then within these there are even more types
under each of these main types.

The traditional RAM type is DRAM (dynamic RAM). The other type is SRAM (static RAM).
SRAM continues to remember its content, while DRAM must be refreshed every few milli
seconds. DRAM consists of micro capacitors, while SRAM consists of off/on switches.
Therefore, SRAM can respond much faster than DRAM. SRAM can be made with a rise time
as short as 4 ns. It is used in different versions in L2 cache RAM (for example pipe line
BURST Cache SRAM).

DRAM is by far the cheapest to build. Newer and faster DRAM types are developed
continuously. Currently, there are at least four types:

 FPM (Fast Page Mode)


 ECC (Error Correcting Code)

 EDO (Extended Data Output)

 SDRAM (Synchronous Dynamic RAM)

Most Common DRAM used in PC’s are:

Synchronous Dynamic RAM (SDRAM)

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 30 of 76
NC II
Revision # 1
Trainer
1. Single Data Rate (SDR) SDRAM is a synchronous form of DRAM.

2. Double data rate (DDR) SDRAM was a later development of SDRAM, used in PC
memory from 2000 onwards. DDR2 SDRAM is a minor enhancement on DDR-SDRAM
that mainly affords higher clock

speeds and somewhat deeper pipelining.

MotherboardThe motherboard is the main circuit board inside the PC which holds the
processor, memory and expansion slots and connects directly or indirectly to every part of the
PC. It's made up of a chipset (known as the "glue logic"), some code in ROM and the various
interconnections or buses.

PC designs today use many different buses to link their various components. Wide, high-
speed buses are difficult and expensive to produce: the signals travel at such a rate that even
distances of just a few centimetres cause timing problems, while the metal tracks on the
circuit board act as miniature radio antennae, transmitting electromagnetic noise that
introduces interference with signals elsewhere in the system.

Shown below is an anotated diagram of the motherboard.

The move recently is the have as much as possible on the board so there is little need for PCI
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 31 of 76
NC II
Revision # 1
Trainer
and AGP expansion slots, i.e. you have onboard sound, graphics, LAN, modem, wireless LAN
and even SCSI and RAID.

Graphics Card

A video adapter (alternate terms include graphics card, display adapter,

video card, video board and almost any combination of the words in these terms) is an
integrated circuit card in a computer or, in some cases, a monitor that provides digital-to-
analog conversion, video RAM, and a video controller so that data can be sent to a computer's
display. Today, almost all displays and video adapters adhere to a common denominator de
facto standard, Video Graphics Array (VGA). VGA describes how data - essentially red, green,
blue data streams - is passed between the computer and the display.
There are 3 main types of graphics card, and are divided into these
types by the way that they connect to the motherboard. They are listed
below:

 PCI (Perhiperhal Component Interface) - This is the oldest type


of connection and thus the slowest, though performance is not
that great it does the job fine for Windows non-graphics
applications. Often the graphics cards for PCI are very cheap.
 AGP (Accelerated Graphics Port) - With the need for faster
graphics a new connector was added to motherboard to allow
faster graphics. The graphics cards available for this are vastly
faster than PCI offering better performance, though there is a
price hike too.


PCI-Express - A new and most expensive type of card that fits
into a PCI-Express slot on a motherboard that supports it. The
bandwidth to the card is much greater and thus the
performance of the card.
Monitor – an output device used for visual display of information.
If you are looking at your computer’s monitor for extended
periods of time it is important to find one which offers the
maximum comfort for your eyes. The trend with monitors is
toward ever higher resolution with increased number of colors.

The table shows the types of monitor and their comparative features in terms of
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 32 of 76
NC II
Revision # 1
Trainer
resolution, scanning rate and number of colors.

TYPE OF Scanning
Resolution Color Palette
MONITOR Rate (KHz)
Monochrome
640 x 350 1 1 15.75
Composite
Color
640 x 200 4 4 15.75
Composite
Monochrome
720 x 350 1 1 18.40
(TTL)
RGA (CGA) 640 x 200 4 16 15.75
EGA 640 x 350 16 64 21.80
15.5 to
Multiscan 800 x 600 Unlimited Unlimited
35.0
PGA 640 x 480 Unlimited Unlimited 30
VGA 640 x 480 256 262.000 31.49
Super High 1200 x 800 + Varies Varies 30 to 75
LCD 1200 x 800 + Varies Varies 40 to 100
Touch Screen 1200 x 800 + Varies Varies 45 to 100

Sound Card

A type of expansion board on PC–compatible computers that allows the playback and
recording of sound, such as from a WAV or MIDI file or a music CD–ROM. Most PCs sold at
retail include a sound card.

Quite commonly now motherboards come with built on sound cards,


they seem to be perfectly useable, although some of the older onboard
sound cards are awful.

Any modern motherboard you should be okay with. If you want extra
performance you can buy a sound card, this fits in a spare PCI slot.

Network Card

A network card allows you to connect your PC to a network, it acts as the interface between
the network medium (cable, radio waves etc.) and your PC. There are various types of network
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 33 of 76
NC II
Revision # 1
Trainer
cable, however now you will only really find UTP (Unshielded Twisted Pair) CAT 5/5e/6 and
wireless 802.11a/b/g network cards.

Again most motherboards have built on Network Cards and they are
normally fine to use.

You can pick up a PCI network card for around £8 and up. Intel or
3com cards seem to be the best and most stable in my experience,
though they do cost a bit more.

You can connect two PCs together with some network cable or more than two with a
hub/switch to which you connect more PCs, see my networking section about this.

LAN Card/Ethernet Card/Network Interface Card (NIC) – an expansion card inserted in the
computer to be connected into a network.

Wireless LAN PCI LAN Card ISA LAN Card


Card
Router – an internetworking devices that passes data packets between networks and makes
decision regarding the best path for delivery of data on a network.

Networking Media
RJ 45 Connector

UTP Cable (Unshielded Twisted Pair)

Modems - (which is short for modulator/demodulator) converts the digital data signal of the
PC into the analog data signal that is used on the plain old telephone system (POTS) — which
is also called the public telephone switched network (PTSN).

Modems can be installed inside the PC in an expansion slot, or they can be


attached to the PC externally through a serial or USB port. An internal modem is installed
like any other expansion card — into a compatible expansion slot.

Internal Modem External Modem

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 34 of 76
NC II
Revision # 1
Trainer
Hub or Switch – a common connection point of a network

Floppy Disk Drive

A floppy disk is a data storage device that comprises a circular piece of thin, flexible (hence
"floppy") magnetic storage medium encased in a square or rectangular plastic wallet. Floppy
disks are read and written by a floppy disk drive or FDD, not to be confused with "fixe d disk
drive", which is an old IBM term for a hard disk drive.

Floppy disk drives use a small flat disk called a "diskette" the
information is stored on it magnetically.

There are various types of size of floppy disk, nowadays all you will find
are High Density 1.44MB 3.5" disks. Below is a list of the various types
of 3.5 Inch disks:

360KB - Single Density

720KB - Double Density

1.44MB - High Density

2.88MB - Ultra High Density

Floppy disks are on the way out, though they are still used when installing an OS on a
computer, though with bootable CD-ROMs even this use is on the way out it all seems to be
going to CDs or USB pen drives (also called a "Think Stick.")

Hard Disk Drive

This is a non-volitile storage medium, all modern PCs will have one if not more than one. A
magnetic disk that stores data. Usually a fixed disk, permanently sealed in the drive, though
possibly a removable hard disk. A hard disk can store a huge amount of data up to 400GB on
one disk. Access time is much faster than soft (floppy) disks. The head that reads the data
floats over the hard disk's surface, while the head of the floppy disk touches

the disk's surface while reading or writing data.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 35 of 76
NC II
Revision # 1
Trainer
The main thing that differenciates drives from one another, other than the
size is the interface they use to connect to the PC.

The two main PC interfaces are SCSI and IDE (ATA) they are listed below:

SCSI (Small Computer System Interface) most commonly found on servers


or Apple Macintoshes SCSI allows for the "daisy-chaining" of up to 7
devices per bus. It has always had the image of being faster, more
expandable and more reliable though IDE keeps getting better.

 IDE (Integrated Drive Electronics) and ATA (AT Attachment) is what you will commonly need
on your PC for home or small office use a ATA drive is more than enough. It is cheaper to buy
an ATA drive and ATA/IDE drive controllers are built on to all motherboards as standard.

IDE drives are rated by ATA 33, ATA 66, ATA 100 and ATA 150 the larger the number the
faster the drive can transfer data.

Hard drives are one of the computer components that have plumetted in price over the years,
now you can get a 40GB drive for under £40.

Removable Storage Drive

Removable storage drives, things kind of like a removable hard disk became very popular but
now with the Internet and USB memory sticks they seem to have gone out of favour again.
The Iomega Zip drive was one of the most widely used, but suffered from the problem that the
storage capacity was small and the costs of the drive and media were expensive especially for
the larger sizes.

Often these drives work by having a hard disk drive like disk that
is contained in a case so it can be removed easily and transported
protecting the disk and its contents.

A Iomega Zip Drive is around £80 and plugs into the USB port, nowdays to ensure there is no
need for a Zip Drive on the other computer you are moving data to, it just needs a USB port
and away you go!

CD Drive

CD-ROM drives are necessary today for most programs. A single


CD can store up to 650 MB of data (newer CD-Rs allow for 700
MB of data, perhaps more with "overburn"). Fast CD-ROM drives
have been a big topic in the past, but all of today's CD-ROM
drives are sufficiently fast. Of course, it's nice to have the little
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 36 of 76
NC II
Revision # 1
Trainer
bits of extra speed. However, when you consider CD-ROM drives
are generally used just to install a program or copy CDs, both of
which are usually done rarely on most users' computers, the
extra speed isn't usually very important. The speed can play a
big role if you do a lot of CD burning at high speeds or some
audio extraction from audio CDs (i.e. converting CDs to MP3s).

 CD-Writer Drive

CD-R (which stands for Recordable) drives (aka burners, writers) allow a user to create their
own CDs of audio and/or data. These drives are great for backup purposes (backup your
computer's hard drive or backup your purchased CDs) and for creating your own audio CD
compilations (not to mention other things like home movies, multimedia presentations, etc.).

With a CD writer you can burn to a CD once, it works by


WORM (Write Once Read Many). You can make multiple
sessions on a disk so you can write a bit one day and a bit
more another up to the storage capacity. But unlike CD-RW
you can't erase it all and start again.

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Note some older drives
will not support 700MB/80Min discs.

CD-Writer & Re-Writer Drive

CD-R/RW (which stands for Recordable / ReWritable) drives (aka burners, writers) allow a
user to create their own CDs of audio and/or data. These drives are great for backup purposes
(backup your computer's hard drive or backup your purchased CDs) and for creating your own
audio CD compilations (not to mention other things like home movies, multimedia
presentations, etc.).

With a CD-R/RW you can write to a CD then erase its contents and
rewrite over it all again.

Normal capacities for these CDs are 650MB/74Min or 700MB/80Min. Remeber RW discs will
not always work in normal CD-Drives and rarely work in Audio CD Players.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 37 of 76
NC II
Revision # 1
Trainer
DVD-ROM Drive

DVD-ROM drives can store up to 4 GB of data or about 6 times the size of a regular CD (not
sure on the exact size, but suffice to say it's a very large storage medium). DVDs look about
the same and are the same size as a CD-ROM. DVD drives can also re ad CD-ROM drives, so
you don't usually need a separate CD-ROM drive.

DVD drives have become low enough inprice that there isn't
much point in purchasing a CD-ROM drive instead of a DVD-
ROM drive. Some companies even make CD burner drives
that will also read DVDs (all in one). DVD's most practical use
is movies.

The DVD format allows for much higher resolution digital recording that looks much clearer
than VCR recordings.

DVD-Writer Drive

DVD recordable drives are available in a couple of different formats - DVD-R or DVD+R with a
RW version of each. These are slightly different discs and drives (although some drives
support writing to both formats). One is not much better than the other, so it really boils
down to price of the media (and also availability of the media).

You can fit up to 4.3GB on a single DVD disc, and now some
drives support multiple layers with 2 x 4.3GB i.e. 8.6GB per
disc.

All the CD standards are a bit confusing so here is a table showing them, note that some of
these standards and the equipment built to them have gone the way of Betamax and the
Dinosaurs.

Now a run down of each of the standards and what each one can do.

Standard Description

Compact Disc Read Only Memory - This is a disc that only allows for reading
CD-ROM
can store up to 650MB or 700MB.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 38 of 76
NC II
Revision # 1
Trainer
Compact Disc Recordable - This disc allows for you to write once to a disc,
CD-R
i.e. you can erase it and start again. Stores up to 650/700MB.

Compact Disc ReWritable - This disc allows for you to write many times on
CD-RW
one disc, i.e. you can erase it and start again. Stores up to 650/700MB.

DVD- Digital Versatile/Video Disc - This disc only allows for reading can store up
ROM to 4.3GB.

Digital Versatile/Video Disc - Recordable -This disc allows for you to write
once to a disc, i.e. you can erase it and start again, can store up to 4.3GB.
DVD R+
Note that one is plus and one minus you need to select the correct disc for
your drive.

Digital Versatile/Video Disc - Recordable - This disc allows for you to write
once to a disc, i.e. you can erase it and start again, can store up to 4.3GB.
DVD R-
Note that one is plus and one minus you need to select the correct disc for
your drive.

Digital Versatile/Video Disc - ReWritable - This disc allows for you to write
DVD many times on one disc, i.e. you can erase it and start again. Stores up to
RW+ 4.3GB. Note that one is plus and one minus you need to select the correct
disc for your drive.

Digital Versatile/Video Disc - ReWritable - This disc allows for you to write
many times on one disc, i.e. you can erase it and start again. Stores up to
DVD RW-
4.3GB. Note that one is plus and one minus you need to select the correct
disc for your drive.

Digital Versatile/Video Disc - Random Access Memory - DVD-RAM has the


DVD-
best recording features but it is not compatible with most DVD-ROM drives
RAM
and DVD-Video players. Think more of it as a removable hard disk.

Any comments or suggestions please mail me, i'll try to update this page when I can, with
more useful information about computers and the like.

STORAGE DEVICES

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 39 of 76
NC II
Revision # 1
Trainer
USB Drive Floppy Disk Hard Disk Drive Other
Storage Devices

Digital audio tape can also refer to a compact cassette with digital storage.

Digital Audio Tape (DAT or R-DAT) is a signal recording and playback medium developed by
Sony in the mid 1980s. In appearance it is similar to a compact audio cassette, using 4 mm
magnetic tape enclosed in a protective shell, but is roughly half the size at 73 mm × 54 mm ×
10.5 mm.

A hard disk drive[1] (often shortened as "hard disk"[2] or "hard drive"[3]), is a main storage
device of the computer or is a non-volatile storage device which stores digitally encoded data
on rapidly rotating platters with magnetic surfaces.

When installing two hard drives, it is necessary to check the jumper setting for the
Master/Slave configuration. The jumper pins for Master/Slave can be found between the
power connector and IDE ribbon cable connector. Every hard drive manufacturer has different
pin configurations which is found on the information pasted in the hard drive itself

 Master is used for the first hard drive


 Slave is for the second hard drive.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 40 of 76
NC II
Revision # 1
Trainer
USB flash drive consists of a NAND-type flash memory data storage device integrated with a
USB (universal serial bus) interface. USB flash drives are typically removable and rewritable,
much smaller than a floppy disk (1 to 4 inches or 2.5 to 10 cm), and most USB flash drives
weigh less than an ounce (28g).[1] Storage capacities typically range from 64 MB to 128 GB[2]
with steady improvements in size and price per gigabyte. Some allow 1 million write or erase
cycles[3][4] and have 10-year data retention,[5] connected by USB 1.1 or USB 2.0.

Different RAM Types and its uses

The type of RAM doesn't matter nearly as much as how much of it you've got, but using plain
old SDRAM memory today will slow you down. There are three main types of RAM: SDRAM,
DDR and Rambus DRAM.

SDRAM (Synchronous DRAM)


Almost all systems used to ship with 3.3 volt, 168-pin SDRAM DIMMs. SDRAM is not an
extension of older EDO DRAM but a new type of DRAM altogether. SDRAM started out
running at 66 MHz, while older fast page mode DRAM and EDO max out at 50 MHz. SDRAM
is able to scale to 133 MHz (PC133) officially, and unofficially up to 180MHz or higher. As
processors get faster, new generations of memory such as DDR and RDRAM are required to

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 41 of 76
NC II
Revision # 1
Trainer
get proper performance.

DDR (Double Data Rate SDRAM)


DDR basically doubles the rate of data transfer of standard SDRAM by transferring data on
the up and down tick of a clock cycle. DDR memory operating at 333MHz actually operates at
166MHz * 2 (aka PC333 / PC2700) or 133MHz*2 (PC266 / PC2100). DDR is a 2.5 volt
technology that uses 184 pins in its DIMMs. It is incompatible with SDRAM physically, but
uses a similar parallel bus, making it easier to implement than RDRAM, which is a different
technology.

Rambus DRAM (RDRAM)


Despite it's higher price, Intel has given RDRAM it's blessing for the consumer market, and it
will be the sole choice of memory for Intel's Pentium 4. RDRAM is a serial memory technology
that arrived in three flavors, PC600, PC700, and PC800. PC800 RDRAM has double the
maximum throughput of old PC100 SDRAM, but a higher latency. RDRAM designs with
multiple channels, such as those in Pentium 4 motherboards, are currently at the top of the
heap in memory throughput, especially when paired with PC1066 RDRAM memory.

DIMMs vs. RIMMs


DRAM comes in two major form factors: DIMMs and RIMMS.

DIMMs are 64-bit components, but if used in a motherboard with a dual-channel


configuration (like with an Nvidia nForce chipset) you must pair them to get maximum
performance. So far there aren't many DDR chipset that use dual-channels. Typically, if you
want to add 512 MB of DIMM memory to your machine, you just pop in a 512 MB DIMM if
you've got an available slot. DIMMs for SDRAM and DDR are different, and not physically
compatible. SDRAM DIMMs have 168-pins and run at 3.3 volts, while DDR DIMMs have 184-
pins and run at 2.5 volts.

RIMMs use only a 16-bit interface but run at higher speeds than DDR. To get maximum
performance, Intel RDRAM chipsets require the use of RIMMs in pairs over a dual-channel 32-
bit interface. You have to plan more when upgrading and purchasing RDRAM.

DRAM

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 42 of 76
NC II
Revision # 1
Trainer
SDRAM

SIMM

PRINTER

Printer is an output device which is connected to computer to get permanent output. The
output of printer is also called Hard Copy. There are two types of printers (a) Impact
printers (b) non-impact printers.

The main categories are:


- Laser printers,
- Ink-jets,
- Dot-matrix,
- Multifunctional, etc.
Normally home computer users will use ink-jets as they are relatively cheap but superior in
quality to dot-matrix. Laser jets and other printers created by new technology  are more
expensive and more commonly found in the offices.

Ink-jets(bubble-jets) p+rinters spray ionized tiny drops of ink onto a page to create an
image.  This is achieved by using magnetized plates which direct the ink's path onto the
paper in the desired pattern. Almost all ink-jets offer a color option as standard, in varying
degrees of resolution. Ink-jet printers are capable of producing high quality print which
almost matches the quality of a laser printer. A standard ink-jet printer has a resolution of
300 dots per inch, although newer models have improved on that.  As a rule color link-jet
printers can also be used as a regular black and white printer.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 43 of 76
NC II
Revision # 1
Trainer
Laser printers operate by shining a laser beam to produce an image on a drum. The drum
is then rolled through a pool, or reservoir, or toner, and the electrically charged portions of
the drum pick up ink. Finally, using a combination of heat and pressure, the ink on the
drum is transferred onto the page. Laser printers print  very fast, and the supply cartridges
work a long time. Color laser printers use the same toner-based printing process as black
and white ( B/W) laser printers, except that they combine four different toner colors.  Color
laser printers can also be used as a regular black and white laser printer.

Flatbed Scanners

Flatbed scanners will take up some desktop space but provide a lot of bang for the buck. They
look like miniature printers with a flip-up cover protecting the glass platen. Depending on
their size, these can fit standard or legal-sized documents, and the flexible cover allows you to
scan large items such as books. These scanners are great for scanning the occasional
newspaper article, book chapter, or photograph; or for those who may need to scan or bulky
items such as the cover of a DVD. Flatbed scanners are often built into multifunction printers
(MFPs). You can find decent flatbed scanners for $100 or less.

Photo Scanners

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 44 of 76
NC II
Revision # 1
Trainer
Sheetfed scanners are smaller than flatbed scanners; as the name implies, you feed a
document or photo into the scanner rather than place it on top. You’ll win back some of that
desktop space with a sheetfed scanner but you may sacrifice some resolution in the process.
If you’re only scanning documents, however, it may be a worthwhile trade, especially if you’ve
got a lot of them since you can feed them in bunches. With a flatbed scanner, you’ll have to
scan one page at a time (unless it comes with an automatic document feeder).

Portable Scanners

Portable scanners are small enough to bring on the road. In fact, some are small enough to
put in your pocket; pen scanners are just a bit bigger than fountain pens and can scan the
text of a document line by line. Some are as wide as a page and roll easily down the page.
They’re not going to give high-resolution scans and so aren’t good for scanning photographs
or other applications where you need a high-quality result. Since they’re not cheaper than
flatbed scanners, they’re probably only useful if you are a student, a researcher, or a spy.
Figure on spending about $150 for one.

KEYBOARD
- is an input device, partially modeled after the typewriter keyboard, which uses an
arrangement of buttons or keys, which act as mechanical levers or electronic switches. A
keyboard typically has characters engraved or printed on the keys and each press of a key
typically corresponds to a single written symbol. However, to produce some symbols requires
pressing and holding several keys simultaneously or in sequence. While most keyboard keys
produce letters, numbers or signs (characters), other keys or simultaneous key presses can
produce actions or computer commands.

Different types of computer keyboards:

ERGONOMIC: Often when someone refers to an "ergonomic", "split", or "natural"


keyboard, they mean the type of keyboard which has an empty area in between two sets
of keys, which have a different layout intended to be more ergonomic than typical
keyboard types.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 45 of 76
NC II
Revision # 1
Trainer
AT: The abbreviation "AT" can be used when referring to any keyboard made for AT-class
(most computers made since the mid-1990s) computers, including standard PS/2
keyboards. However, it is most frequently used to describe keyboards with a large 5-pin
connector; these fit some pre-Pentium and Pentium I/II computers, but require an "AT-
to-PS/2" adapter to be connected to most computers, because they have a different
(PS/2) jack.

USB: Some newer keyboards connect to a computer's USB port (a small rectangular
port) rather than a PS/2 port. This doesn't offer any great benefit, as humans can't
possibly type fast enough to take advantage of USB's faster data transmission speeds.
Some older computers lack USB ports.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 46 of 76
NC II
Revision # 1
Trainer
ADB: This refers to a different type of accessory port/jack on some Apple computers
which ADB keyboards can be connected to. For computer types which don't have an
ADB port, adapters are available which allow them to be plugged into a USB port.

XT: Keyboards referred to with the abbreviation "XT" can be used with some older types
of computers (8086/8088, XT-286) but won't work with most computers being used at
present. Many of them have fewer keys than modern keyboards. AT/XT keyboards are
more versatile; they can be used with both older and newer computers and usually have
an AT/XT switch on the back. XT and AT/XT keyboard types are more likely to have
the larger, backward-"L" shaped "Enter" key, rather than the smaller straight kind on
many newer keyboards.

MOUSE

(Plural mouses, mice, or mouse devices) is a pointing device that functions by


detecting two-dimensional motion relative to its supporting surface. Physically, a mouse
consists of an object held under one of the user's hands, with one or more buttons. It
sometimes features other elements, such as "wheels", which allow the user to perform various
system-dependent operations, or extra buttons or features can add more control or
dimensional input. The mouse's motion typically translates into the motion of a pointer on a
display, which allows for fine control of a Graphical User Interface.

LO1 PERFORM COMPUTER OPERATIONS

JOB SHEET # 1

DEMONSTRATION: Configure all parts you see below, give exact location (you can draw or
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 47 of 76
NC II
Revision # 1
Trainer
label its components, peripherals, and equipment)

1 2 3 4

5 6 7 8

9 10 11 12

COMPONENTS OF A COMPUTER
In this lesson, we take a look at the different components of a computer system.
A
fter this lesson, you will be able to
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 48 of 76
NC II
Revision # 1
Trainer
 Define the primary components that make up a computer

Estimated lesson time: 10 minutes


A
s you might expect, the components of a computer reflect the function of the machine—
specifically, the three stages of computing, as outlined in Lesson 1. Let's examine the
components.

Input Devices
The following table lists some examples of devices that are used to put information into a computer.

Device Description

Keyboard
The primary input device for a computer, allowing users to
type information just as they once did on a typewriter.

Mouse
Used with graphical interface environments to point to and
select objects on the system's monitor. Can be purchased in
a variety of sizes, shapes, and configurations.

Scanner

Converts printed or photographic information to digital


information that can be used by the computer. Works similar
to the scanning process of a photocopy machine.

Microphone

Works like the microphone on a tape recorder. Allows input


of voice or music to be converted to digital information and
saved to a file.

CD-ROM/DVD drive Compact disc–read only memory: stores large amounts of


data on a CD that can be read by a computer.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 49 of 76
NC II
Revision # 1
Trainer
Processing

The central processing unit (CPU) is the heart and brain of the computer. This one
component, or "chip," is responsible for all primary number crunching and data management.
It is truly the centerpiece of any computer. It is so important that whole generations of
computer technology are based and measured on each "new and improved" version of the
CPU.

When we refer to the CPU, we are usually speaking of the processor. However, the CPU
requires several other components that support it with the management of da ta to operate.
These components, when working in harmony, make up the primary elements of the PC we know
today. The following table lists these fundamental support components.

Component Description

Motherboard
The main circuit board of the computer. The large
circuit board found inside the computer. Without it, a
computer is just a metal box. The motherboard
contains all the remaining items in this table; for all
practical purposes, it is the computer.

Chip set
A group of computer chips or integrated circuits (ICs)
that, when working together, manage and control the
com- puter system. This set includes the CPU and
other chips that control the flow of data throughout the
system.

Data bus A group of parallel conductors (circuit traces) found on


the motherboard and used by the CPU to send and
receive data from all the devices in the computer.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 50 of 76
NC II
Revision # 1
Trainer
A group of parallel conductors (circuit traces) found on
Address bus the motherboard and used by the CPU to "address"
memory locations. Determines which information is
sent to, or received from, the data bus. An address bus
is a computer bus (a series of lines connecting two or
more devices) that is used to specify a physical address.
When a processor or DMA-enabled device needs to read
or write to a memory location, it specifies that memory
location on the address bus (the value to be read or
written is sent on the data bus).

Expansion slots
Specialized sockets that allow additional devices called
expansion cards or, less commonly, circuit boards, to
be attached to the motherboard. Used to expand or
customize a computer, they are extensions of the
computer's bus system.

Clock

Establishes the maximum speed at which the processor


can execute commands. Not to be confused with the
clock that keeps the date and time.

Battery
Protects unique information about the setup of the
computer against loss when electrical power fails or is
turned off. Also maintains the external date and time
(not to be confused with the CPU's clock).

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 51 of 76
NC II
Revision # 1
Trainer
Memory

Stores temporary information (in the form of data bits)


that the CPU and software need to keep running.

Output Devices

The following table lists some common devices, known as peripherals, used exclusively for
output.

Device Description

Printer
Generates a "hard copy" of information. Includes dot
matrix, ink jet, and laser varieties.

Monitor
The primary output device. Visually displays text and
graphics.

Plotter
Similar to a printer, but uses pens to draw an image.
Most often used with graphics or drawing programs for
very large drawings.

Speakers
Reproduce sound. Optional high-quality speakers can be
added to provide improved output from games and
multimedia software.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 52 of 76
NC II
Revision # 1
Trainer
Input and Output

Some devices handle both input and output functions. These devices are called input/output
(I/O) devices, a term you will encounter quite often.

Device Description

Floppy disk drive


Mechanism for reading and writing to low-capacity,
removable, magnetic disks. Used to store and easily
transport information.

Hard disk drive


High-capacity internal (and sometimes external)
magnetic disks for storing data and program files. Also
called fixed disks.

Modem
Converts computer data to information that can be
transmitted over telephone wires and cable lines.
Allows communication between computers over long
and short distances.

Network card
An expansion card that allows several computers to
connect to each other and share information and
programs. Also called network interface card (NIC).

Also called CD-R. You can copy data to a CD with this


CD recorder device, but you can only write to a section of the disc
once. Variations on this type of device include compact
disc–rewritable (CD-RW) drives. These drives allow you
to read, write, and overwrite a special CD-ROM-type
disc.

Large-capacity, magnetic, data storage devices. Ideal for


Tape drive backup and retrieval of large amounts of data. Works
like a tape recorder and saves information in a linear
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 53 of 76
NC II
Revision # 1
Trainer
format.

Other external storage devices include Iomega Zip drives, which allow users to store 100 MB
or 250 MB of data on a single Zip disk.

Other Computer Parts and Accessories

the following table lists some examples of cable that are used to communicate to a system.

Cable/ Cord Description

IDE (ATA/PATA Cable) IDE is also known as ATA or PATA (Parallel ATA) and
is a way of handling a parallel data bus from a disk
drive (well, usually a disk drive) to a computer mother
board where the disk controller is mostly embedded
in the disk drive.

SATA (Serial ATA) is an advance on this where the


signals are sent over a serial bus not a parallel bus.
The cable is much smaller and it will run at higher
speed and will support more than 2 drives on a bus.
SATA/ATA

Note: They are both ways to connect a disk drive to a


computer. You use the one that matches your
computer mother board (old ones support IDE only,
newer ones will support SATA and may support both
SATA and IDE) and your disk drive (disk drives are
either IDE or SATA, never seen one with both
available).

USB Cable
USB cable is a cable that is used to connect a device
to a computer or laptop or Printer, Video cameras,
Mp3, mp4 even cell phone.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 54 of 76
NC II
Revision # 1
Trainer
A/V Cable

A/V cable is to use for connect a device to tv and it


has the video and audio cable.

Heat Sink An environment capable of absorbing heat from an


object with which it is in thermal contact without a
phase change or an appreciable change in
temperature.

A protective device that absorbs and dissipates the


excess heat generated by a system.
USB HUB A device that increases the number of USB ports on a
PC. However, since the hub plugs into one of the USB
ports on the computer, the total number of additional
ports is minus one. For example, a four-port hub
adds three new ports. USB hubs are typically used to
extend USB sockets to the top of the desk for
conveniently connecting external peripherals.

Power Cord

A power cord, line cord, or mains cable is a cord or


cable that temporarily connects an electrical
appliance to the distribution circuits of an electrical
power source via a wall socket or extension cord.

AVR (Automatic Voltage


Regulator) A voltage regulator is an electrical regulator
designed to automatically maintain a constant voltage
level.

It may use an electromechanical mechanism, or


passive or active electronic components. Depending
on the design, it may be used to regulate one or more
AC or DC voltages.

UPS (Uninterruptible Power


Supply) An uninterruptible power supply, also
uninterruptible power source, UPS or
battery/flywheel backup, is an electrical apparatus

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 55 of 76
NC II
Revision # 1
Trainer
that provides emergency power to a load when the
input power source, typically the utility mains, fails.
A UPS differs from an auxiliary or emergency power
system or standby generator in that it will provide
instantaneous or near-instantaneous protection from
input power interruptions by means of one or more
attached batteries and associated electronic circuitry
for low power users, and or by means of diesel
generators and flywheels for high power users. The
on-battery runtime of most uninterruptible power
sources is relatively short—5–15 minutes being
typical for smaller units—but sufficient to allow time
to bring an auxiliary power source on line, or to
properly shut down the protected equipment
Computer Fan

A computer fan is any fan inside a computer case


used for cooling purposes, and may refer to fans that
draw cooler air into the case from the outside, expel
warm air from inside, or move air across a heatsink
to cool a particular component. The use of fans to
cool a computer is an example of active cooling.

Laptop/Notebook cooler A laptop/notebook cooler, cooler pad or chill mat


is an accessory for laptop computers that helps
reduce their operating temperature. Normally used
when the laptop's fan device is unable to sufficiently
cool the laptop, a cooling pad may house active or
passive cooling methods and rests beneath the
laptop. Active coolers move air or liquid to direct heat
away from the laptop quickly, while passive methods
may rely on thermally conductive materials or
increasing passive airflow.
TV Tuner or TV Video Capture

A TV tuner card is a computer component that


allows television signals to be received by a computer.
Most TV tuners also function as video capture cards,
allowing them to record television programs onto a
hard disk.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 56 of 76
NC II
Revision # 1
Trainer
SUPPORT HARDWARE

Lesson 2 covered the basic hardware that makes up a computer. There are, however,
additional components needed to support safe computer operation. In this lesson, we look at
several devices that protect and enhance the value of a computer.
A
fter this lesson, you will be able to

 Identify additional support hardware for a computer


 Understand the functions of some of the add-on hardware

Estimated lesson time: 5 minutes


In
additionto the devices that support a computer's data-processing functions, there are others that
enhance its operation and performance. The following table lists some of these devices.

Device Description

Power supply
Converts a local power source (typically 110 volts AC in
the United States) to 3.3, 5, or 12 volts DC. Most power
supplies also perform some basic line conditioning and
surge-protection functions.

Surge suppressor

Used to prevent large power spikes (for instance,


lightning) from damaging a computer.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 57 of 76
NC II
Revision # 1
Trainer
UPS Uninterruptible power supply. Acts as both a surge
suppresser (to prevent high-power spikes) and a power
leveler to provide the computer with a constant source of
power. Can even provide power during a power failure or
interruption (although the duration depends on the UPS
and the computer's power consumption) so that the user
can safely save data before shutting down.

Case
The box that houses most of the system must provide an
environment that minimizes electrical interference to
other electronic devices in the area. It should provide a
proper heat level for safe operation and bays and
connections for drives, circuit boards, and I/O devices.

Don't let the term support hardware lead you to underestimate the importance of these
components. How important are roads to commerce, or water to a city? Without a reliable
power source, modern PCs would not exist. The internal power supply keeps a clean current
running to the system.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 58 of 76
NC II
Revision # 1
Trainer
SELF CHECK 3.1.3-1

Please read the questions carefully

1. Describe the following devices

Device

Printer

Monitor

Plotter

Speakers

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 59 of 76
NC II
Revision # 1
Trainer
ANSWER KEY 3.1.3-1

Please read the questions carefully

1. Describe the following devices

Device Description

Printer
Generates a "hard copy" of
information. Includes dot matrix,
ink jet, and laser varieties.

Monitor
The primary output device.
Visually displays text and
graphics.

Plotter Similar to a printer, but uses


pens to draw an image. Most
often used with graphics or
drawing programs for very large
drawings.

Speakers Reproduce sound. Optional


high-quality speakers can be
added to provide improved
output from games and
multimedia software.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 60 of 76
NC II
Revision # 1
Trainer
LO 4: PRODUCE ACCURATE & COMPLETE DATA ACCORDING TO THE
REQUIREMENTS

Assessment Criteria:

1. Systems for cleaning, minor maintenance and replacement of consumables are


implemented.
2. Procedures for ensuring security of data, including regular back-ups and virus
check are implemented in accordance with standard operating procedures.
3. Basic file maintenance procedures are implemented in line with the standard
operating procedures.

Contents:

 Reading skills required to interpret \work instruction.


 Communication skills

Condition:

 Writing Materials
o Hand outs
o Visual aids
o Hardware and peripheral devices
o Computers
o Networked system
o Communication equipment
o Printers
o Scanner
o Keyboard mouse
o Software
o Storage media

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 61 of 76
NC II
Revision # 1
Trainer
Methodology/Training Delivery:

 Lecture
 Discussion

Assessment Method:
 Questioning
 Practical demonstration

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 62 of 76
NC II
Revision # 1
Trainer
LEARNING OUTCOME

LO 4: PRODUCE ACCURATE & COMPLETE DATA ACCORDING TO THE


REQUIREMENTS

Learning Activities Special Instructions

1. Read Information sheet 3.1.4-1 on


how to manage files
The focus of this learning outcome is to
2. Answer Self-Check 3.1.4-1 and
provide knowledge on how to manage files
Compare your answers with Answer
Key 3.1.4-1. The output of this learning outcome is for
you to be aware of the importance of each
usage. This material is based on the
session plan the trainers develop.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 63 of 76
NC II
Revision # 1
Trainer
INFORMATION SHEET 3.1.4-1
HOW TO MANAGE FILES
After reading this INFORMATION SHEET you must be able to:
1. Know how to organize files
2. Know where to place

Thought file management was just for paper files? Think again. It's just as important to
keep the files on your computer and/or mobile devices organized and up-to-date. Just as
with paper files, the goal of computer file management is to ensure that you can find what
you're looking for, even if you're looking for it years after its creation. These file
management tips will help you keep your files accessible:

1. Organize by file types.


Make applications easier to find by creating a folder called Program Files on your drive and
keeping all your applications there. For instance, the executables for Word, PowerPoint and
Simply Accounting would all reside in the Program Files folder.

2. One place for all.


Place all documents in the My Documents folder and no where else. So whether it’s a
spreadsheet, a letter or a PowerPoint presentation, it goes into My Documents. This will
make it easier to find things and to run backups.

3. Create folders in My Documents.


These are the drawers of your computer’s filing cabinet, so to speak. Use plain language to
name your folders; you don’t want to be looking at this list of folders in the future and
wondering what “TFK” or whatever other interesting abbreviation you invented means.

4. Nest folders within folders.


Create other folders within these main folders as need arises. For instance, a folder called

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 64 of 76
NC II
Revision # 1
Trainer
“Invoices” might contain folders called “2013”, “2012” and “2011”. A folder named for a
client might include the folders "customerdata" and "correspondence". The goal is to have
every file in a folder rather than having a bunch of orphan files listed.

5. Follow the file naming conventions.


Do not use spaces in file names, keep file names under 27 characters, and use all lower
case. So a file named for a client should be jackdawson rather than Jack Dawson. If you
break any of these rules, be consistent about it.

6. Be specific.
Give files logical, specific names and include dates in file names if possible. The goal when
naming files is to be able to tell what the file is about without having to open it and look. So
if the document is a letter to a customer reminding him that payment is overdue, call it
something like "overdue081212"; rather than something like “letter”. How will you know
who the letter is to without opening it? See the next point.

7. File as you go.


The best time to file a document is when you first create it. So get in the habit of using the
"Save As" dialogue box to file your document as well as name it, putting it in the right place
in the first place.

8. Order your files for your convenience.


If there are folders or files that you use a lot, force them to the top of the file list by
renaming them with a ! or an AA at the beginning of the file name.

9. Cull your files regularly.


Sometimes what's old is obvious as in the example of the folder named "Invoices" above. If
it's not, keep your folders uncluttered by clearing out the old files. Do not delete business
related files unless you are absolutely certain that you will never need the file again.
Instead, in your main collection of folders in My Documents, create a folder called "Old" or
"Inactive" and move old files into it when you come across them.

10. Back up your files regularly.


Whether you're copying your files onto another drive or onto tape, it's important to set up
and follow a regular back up regimen. See The 3 Steps to a Successful Backup System for
more information.

The search function is a wonderful thing but it will never match the ease of being able to go

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 65 of 76
NC II
Revision # 1
Trainer
directly to a folder or file. If you follow these file management tips consistently, even if you
don't know where something is, you know where it should be - a huge advantage when it
comes to finding what you're looking for.

SELF CHECK 3.1.4-1

Please read the questions carefully

1. How to back up your files?


2. How to order your files
3. How to create folders?

ANSWER KEY 3.1.4-1

Please read the questions carefully

1. How to back up your files?

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 66 of 76
NC II
Revision # 1
Trainer
Answer: Whether you're copying your files onto another drive or onto tape, it's
important to set up and follow a regular back up regimen.

2. How to order your files


Answer: If there are folders or files that you use a lot, force them to the top of the file
list by renaming them with a ! or an AA at the beginning of the file name.

3. How to create folders?


Answer: These are the drawers of your computer’s filing cabinet, so to speak. Use
plain language to name your folders; you don’t want to be looking at this list of
folders in the future and wondering what “TFK” or whatever other interesting
abbreviation you invented means.

LO 5: MAINTAIN COMPUTER SYSTEM

Assessment Criteria:

1. Entered data are processed using appropriate software commands.


2. Data are printed out as required using computer hardware/peripheral devices in
accordance with standard operating procedures.
3. Files and data are transferred between compatible systems using computer
software hardware/peripheral devices in accordance with standard operating.

Contents:

 Basic economics of keyboard and computer use


 Main types of computers and basic features of different operating systems
 Main parts of a computer
 Storage devices and basic categories of memory
 Relevant types of software
Condition:

 Writing materials
o Hand outs
o Visual aids
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 67 of 76
NC II
Revision # 1
Trainer
o Hardware and peripheral devices
o Computers
o Networked system
o Communication equipment
o Printers
o Scanner
o Keyboard mouse
o Software
o Storage media

Methodology/Training Delivery:
 Lecture
 Discussion

Assessment Method:
 Questioning
 Practical demonstration

LEARNING OUTCOME

LO 5: MAINTAIN COMPUTER SYSTEM

Learning Activities Special Instructions

1. Read Information sheet 3.1.5-1 on


how to maintain computer system
The focus of this learning outcome is to
2. Answer Self-Check 3.1.5-1 and
provide knowledge on how to maintain
Compare your answers with Answer
computer system
Key 3.1.5-1.
The output of this learning outcome is for
you to be aware of the importance of each
usage. This material is based on the
session plan the trainers develop.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 68 of 76
NC II
Revision # 1
Trainer
INFORMATION SHEET 3.1.5-1
MAINTAIN COMPUTER SYSTEM
After reading this Information sheet you must be able to
1. Know how to back up your data
2. How to clean computer

1. Back up your data.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 69 of 76
NC II
Revision # 1
Trainer
When was the last time that you backed up your data? Not ‘when was the last time you
thought about it’, or ‘when was the last time you told someone how important it is’, but
when was the last time you actually backed up your data? And how much will you lose if
your current hard drive fails right now and you have to rely on that backup? 

Think about that for a second. Now, go


create a backup. 

If you don’t know how, don’t have a regular


plan, or just want to see what’s new in the
field, Consumer Reports has a good
overview of the most common options.
Personally, I have very little media on my
computer, so I burn my files to CD once a
year or so, and copy files to a flash drive in
between. It’s quick, inexpensive, and
secure enough for my needs. 

Another decent solution is to use a program like Foldershare to synchronise your files


between two computers (even better, two locations).

If you have the opportunity, make a full disk image (a ‘snapshot’ of your entire hard
drive) immediately after reloading the OS and all your programs. This gives you a clean
starting point to go back to if you need to reload everything again, and will be much
faster than redoing everything manually. Acronis True Image 11 is good for the job.

2. Clean dust from your computer.

Computers are some of the most efficient dust collectors known to man. Aside from
looking gross and possibly being an allergy hazard, a dusty computer will trap heat,
which can reduce its performance and lifespan. The easiest way to clean it is with
compressed air – open up the case, take it outside, and blow the dust out. The exterior of
the case can be wiped down with a damp cloth. Be careful about using household
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 70 of 76
NC II
Revision # 1
Trainer
cleaners, as they can easily destroy circuit boards. For most computers, cleaning once
every year or eighteen months should be adequate. 

Beyond just getting the dust out, here are some other steps to consider:
Dust often collects inside the CPU and video card heatsinks, consider
disassembling and cleaning them if you’re comfortable doing so, or at
least using compressed air to specifically blow them out. While the case is
open, plug in the computer and turn it on long enough to make sure all
the fans are still spinning. Replace any that are dead or noisy (a common
sign of a worn-out fan). If there is sticky residue or dirt on the circuit boards, it can be
removed with a cotton swab dipped in rubbing alcohol, which will evaporate cleanly.
(Make sure the computer is unplugged first!) If you’re not comfortable with working inside
your computer or suspect your computer has chronic overheating issues, Puget Systems
or another professional repair service can help you out.

3. Clean up your cabling, and everything else too.

There are probably two things behind your computer: a mess of cables, and dust
bunnies. If you’re moving your computer, take the opportunity to clean your desk and
floor as well. While I can’t claim that a clean work area will improve your computer’s
performance or lifespan, it will certainly improve your peace of mind, and clean cabling
will help prevent snags and stresses on your computer ports. If you have a lot of
peripherals, consider using cable management of some type. Twist ties work fine, or
make a trip to any large office supply store. You can use a full out cable solution, but
even a five dollar cable wrap can neaten up your desk considerably.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 71 of 76
NC II
Revision # 1
Trainer
While you’re wiping down your desk, wipe down the monitor too. CRT screens can
be cleaned with any mild glass cleaner, but LCD screens can’t tolerate it. Use a
dampened cloth or a product specifically made for LCD screens.
Keyboards can be turned upside down to dump out crumbs and dirt, or keys can
be pried off and the whole assembly cleaned with compressed air. There are some good
step-by-step guides available on Lifehacker. Take a picture first so you can put the keys
back in the right place! If you’re feeling adventurous (or just have a really disgusting
keyboard), some people advocate running it through the dishwasher.

This is a good time to take a look at where your computer is located. Is there
adequate ventilation? Is the computer out of direct sunlight, and away from heat
sources? What is it plugged in to? There’s no excuse for not having a good surge
protector (not just a plastic power strip!), and battery backup units have become
affordable for most users. This will affect the lifespan of your computer.

Smoking will make a mess of a computer faster than anything else I know of.
While we at Puget Systems have never seen one quite this bad, we can always identify a
smoker’s computer as soon as we unbox it. Electronics absorb the smell very easily, and
even an all-metal case will retain the odor after all the components have been removed.
Plus, there’s usually a layer of dust and tar on the circuitry that tends to be a giveaway
as well. Please, if I can’t convince you to quit smoking all together, at least take it
somewhere away from the computer!

4. Organize your installation disks

Keep software, peripheral, and driver disks in a single location, preferably close to the
computer. A shoebox works fine. Make sure you have them handy before attempting
computer maintenance or repairs – it’s amazing what can become necessary in the
middle of a lengthy troubleshooting session, and it is common to not know what you're
missing until you need it!

5. Run antivirus and spyware scans regularly.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 72 of 76
NC II
Revision # 1
Trainer
This item should go without saying, but I’ll say it anyway. Any
computer that is connected to the internet needs to have some sort of
antivirus software. There is a tremendous variety available, everything
from AVG Free to enterprise-level solutions. Use whichever you like
best. Most antivirus software will monitor the system for threats in
real time, so a full daily scan probably isn’t necessary, but do make
time to run a full scan every month at the least. 

Some antivirus programs also protect against adware and spyware, but not all. If yours
doesn’t, or if you just want an extra layer of security, AdAware and SpyBot are two of the
best known (and free!) products available. While they may not be as destructive as
viruses, adware and spyware will compromise privacy and slow your computer
drastically. Run scans for them at the same time as your antivirus.

6. Clean up your software.

Every few months, look through the ‘Add or Remove Programs’ interface that is found in
the control panel. If there’s software on there that you don’t use any more, remove it.
This goes triple for browser toolbars, free games, and other resource-eating bits of fluff.
Be a little cautious, though – some system drivers appear in this list, and can cause
hardware to stop working if you remove them. 

There’s an excellent scanning utility on Steffen Gerlach’s website that gives a graphical


representation of the data stored on your hard drive. This will give you a good idea of just
how much room your music collection really takes, or how much space is going to old
games.

7. Clean up your OS

Windows is not the most efficient operating system, and sometimes needs attention itself.
It saves a large amount of unnecessary information, mostly in the form of ‘temporary’
files (which never get deleted) lists of recently performed searches, and the like. There’s
an excellent program called CCleaner, which will clear out most of the unneeded data
automatically. If you’re interested in further optimizing your OS, there’s a wealth of
information available online, including an article on improving XP performance available
Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 73 of 76
NC II
Revision # 1
Trainer
here on Puget’s website.

8. Update everything

Check for updates for your hardware and software. This includes
running Windows Updates, checking for updated drivers, and checking for
software patches. The easiest way to find these is to go to the
manufacturer’s website, to their support section, and then look for a
‘downloads’ section or search for your product’s name. If you’ve been
having problems with a piece of hardware or software, be sure to check for patches or
updates – if other people have been having similar problems, it’s likely the manufacturer
has released a fix for it.

The exception to this is motherboard BIOS updates. Flashing a BIOS can be difficult, and
if it’s done incorrectly you may need to send the computer for professional repair to get it
working again. If the update was specifically released to address problems that you’ve
been dealing with, it’s probably worth it. Follow the manufacturer’s directions carefully!
Otherwise, leave it alone.

9. Defragment

Once your hard drive has been cleaned up, it’s a good time to defragment. This organizes
your files, leading to faster disk access times and improved system performance. The
Windows defragmenting tool (Start > All Programs > Accessories > System Tools > Disk
Defragmenter) works well, or there’s a list of open source and commercial defragmenting
software available on Wikipedia if you’d rather use something else.

10. Read more articles like this one

Last but not least, continue to read articles like this one, and anything else computer
related that catches your eye. The computer industry is constantly changing – even if you
have the same computer, there will be innovations that affect you. At the very least, you’ll
go into your next computer purchase far better informed than you would be otherwise. 

We at Puget Systems always encourage our customers to learn about computers in

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 74 of 76
NC II
Revision # 1
Trainer
general and their system in particular. Well educated users tend to have fewer difficulties
with their system, and besides, we love computers and think everyone else should too!
Our commitment is to create a computer to meet your needs and budget, using our
experience to assist you every step of the way from the first visit to our website to tech
support calls two years later. We accomplish this in part through friendly sales and
support reps, an informative website, and publishing articles on a regular basis. Give us
a call or email, we’d love to hear from you!

SELF CHECK 3.1.5-1

Please read the questions carefully

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 75 of 76
NC II
Revision # 1
Trainer
1. What is defragment?
2. How to update everything?

ANSWER KEY 3.1.5-1

Please read the questions carefully

1. What is defragment?
Answer: This organizes your files, leading to faster disk access times and improved
system performance. The Windows defragmenting tool (Start > All Programs >
Accessories > System Tools > Disk Defragmenter) works well, or there’s a list of open
source and commercial defragmenting software available on Wikipedia if you’d
rather use something else.

2. How to update everything?


Answer: Check for updates for your hardware and software. This includes
running Windows Updates, checking for updated drivers, and checking for
software patches. The easiest way to find these is to go to the manufacturer’s
website, to their support section, and then look for a ‘downloads’ section or
search for your product’s name. If you’ve been having problems with a piece of
hardware or software, be sure to check for patches or updates – if other people
have been having similar problems, it’s likely the manufacturer has released a
fix for it.

Document No.
Date Developed:
Computer 01-18-2020
Issued by:
Systems
Servicing
Developed by: Page 76 of 76
NC II
Revision # 1
Trainer

You might also like