What Is Computer Systems Servicing (CSS NCII) ?
What Is Computer Systems Servicing (CSS NCII) ?
What Is Computer Systems Servicing (CSS NCII) ?
Computer Systems Servicing (CSS NCII) is the upgraded version of what is then
called Computer Hardware Servicing (CHS NCII) qualification. During the late CHS,
the qualification was said to be of the NCII level, meaning that in a ranking basis, it
is the baseline level.
Some competencies have the NCII, NCIII and NCIV levels. CHS was given an NCII
level because, well, for a fact, it was not that difficult to pass, but still, many students
and/or even professionals fail.
When TESDA decided to upgrade the CHS competency, they forgot or maybe they
have just decided not to adjust its ranking level. Most IT professionals would certainly
agree that the CSS competency deserves to be of the NCIV level.
What are the differences between CHS NCII and CSS NCII?
The old CHS competency covered just two (2) modules and you are only expected to
perform a couple of tasks to pass the actual examination. The examination includes
a question and answer portion before proceeding with the actual hands-on
configurations and the same goes for the CSS NCII exam.
To cope up with the hastened trend of technology advancement, CSS was introduced,
and instead of having just two (2) modules, this new competency has four (4). This
seems to be a great move to ensure that we are not left behind on what is the new
global standard in technology.
The good news is that we will tackle every important detail about this and every
module on each succeeding post on this blog. Links on the tools (software / installers)
will also be provided.
In the future post, we will configure a Virtual Lab environment for module two (2)
practice which can also be maximized for module three (2).
For personal practice, all these can be done on our Virtual Lab.
There we go! All these tasks for eight (8) hours but I assure you, you would not need
that much time.
Next, we will start with module one (1), definition of terms, the technologies, their
functions and importance before we proceed with the actual task performance.
In this blog, we will tackle these components As Fast and As Simple As Possible.
1. The CPU. The CPU - Central Processing Unit, commonly called processor is where all of
the functions, tasks, and computations occur. Although it is the powerhouse center, it cannot
do these processes alone. It needs other components to do its tasks.
You will also see the Northbridge and the Southbridge in the motherboard. The Northbridge
controls the data pathways and communication of the heavily used components of the system;
the memory, cpu, video. The Southbridge, on the other hand, controls communication on the
"not so important" and minimal components of the system; the usb, serial ports, BIOS, audio
et cetera.
3. The Memory or RAM. The memory does not control anything. It serves as the storage of
all the functions, applications, services, programs, features, instructions that are being utilized
by the CPU. It is in the memory where our Operating System is loaded.
Your computer has 1 gigabyte of memory. When the Operating System is loaded, it occupies
let's say, about 100 Megabytes. You then opened a few web browsers, lots of websites
(YouTube, Facebook, Twitter), and you also opened PC applications such as Microsoft Word,
Powerpoint, Photoshop et cetera. You will then notice slowness on your computer depending
on how occupied your memory is. If you've reached the maximum of 1 Gigabyte, some
systems tend to see the BSOD - Blue Screen of Death error. This is the result of memory
overload wherein the memory has to offload a few programs or functions to accommodate to
the ones being currently used by the processor.
4. The Hard Disk Drive. The HDD is our non volatile storage. Contrast to the memory being
volatile (it loses all data on power loss), the HDD retains all that is saved permanently. When
we first install our Operating System, it is saved in the HDD, a recovery partition is also
created amounting to 100 to 300MB. This allows for system recovery in case of errors.
The HDD is also where we save our files; music, videos, documents, pictures et cetera. When
you install an application, it is also installed in the hard disk drive.
The newer version of the HDD is the SSD or Solid State Drive. They both function as storage
but instead of using disk platters, SSDs use Integrated Circuits and memory organized as disk
drives.
Now, these are only the main components of the computer system. There are still quite a few
that contributes to the total functioning of the system.
Saturday, 26 August 2017
1, The most common end points in our networks are the computers. Inside the computers
we have the Network Interface Card or NIC. This is what allows our computers to be able to
communicate in the network. We do have the wired and the wireless. It is in these NICs where
theMedia Access Control Address or MAC Address is burned to. No two NICs can have the
same MAC Address. This is for the purpose of identification.
2. The switch is most commonly what is on the other side of our cables connected to our
devices. The purpose of the switch is simple; to allow our devices to
communicate internally and to be able to connect more devices in one network. Embedded
on each switch port is the ASIC, Application Specific Integrated Circuit which allows
simultaneous data transfer as contrast to the old hubwhich only allowed one communication
at a time no matter how many ports it has.
3. The router. I have written a more detailed article about a router here. But, mainly, a
router's role is to allow our devices to communicate to other networks. It serves as the
receiving point in and out of the internet which the switch is not capable of doing.
4. The cables. In networking, you will always encounter different types of cables with
different purpose, specifications and limitations. The most widely used cables are the Twisted
Pair and Fiber Optics. These cables are very much different. The twisted pairs have a limit
of 100 meters and usepulses of electricity to transmit data while the fiber optics use Light
Emitting Diode and Lasertechnology and are used for very long distances ranging from 2
to 100 kilometers.
So, to summarize, all we need are these four essential devices / materials to be able to create
our networks.
1. Remove all jewelries, watches, and static. Or at least show the assessor you are doing so.
2. Disassemble the computer while taking notes on what peripherals you are taking out from the unit. You will
have to remove also the processor, power supply and the motherboard from the case.
a. Example, if you remove a memory card, write the quantity (1 piece), the type (DDR3), and description (1GB).
That’s why it is important that you know the parts of a computer.
b. TIP: count the cables that you disconnect from the motherboard and know to which they are attached to.
c. Pay attention also to the cables for the front panel of the PC. E.g. light indicators for HDD, reset button,
power button, usb power et cetera. One missed cable will cost you lots of time.
5. Once done, the assessor will hand you a working bootable usb which you will use in reformatting the PC.
NOTE: If the usb isn’t working, ask for another one. I had an experience wherein the one they
gave me did not work. Remember, time is limited.
6. Insert the usb, configure the BIOS to boot from the usb then restart your PC.
8. Once OS installation is finished, you will be handed a new usb containing the drivers and applications
which you will use.
a. Install the drivers first
b. Install MS Office Suite
c. Install Anti-virus
d. Pin the shortcuts to the desktop
END OF Module 1
3. Once all devices are connected, get the mac addresses of the pc, server and laptop for the
purpose of assigning them IP Addresses using DHCP reservations.
Note the mac addresses down together with the corresponding unit to avoid confusion. To get
the MAC Address, open command prompt and type “getmac” or “ipconfig”.
a. Here, although the devices are all configured to get IP addresses using DHCP, you will be
instructed to select an IP address specifically that is why DHCP Reservations should be
configured.
b. For example. Create a DHCP Pool of 192.168.1.100 to 192.168.1.200
c. From the pool, the IP 192.168.1.114 should be assigned to the pc
d. 192.168.1.117 should be assigned to the server
e. 192.168.1.155 should be assigned to the laptop
4. Configure the router using your web browser to access it's interface
a. In order to access the router’s interface, look for its IP address at the back of the device. If
it’s not there, you can ask the assessor. If the router’s address is indicated on the back of the
device but you are unable to access it using that address, reset first the router by pressing
the power button for 10 to 20 seconds. Usually, the password to access the interface is
indicated also on the device. Ask the assessor if otherwise.
b. Create the DHCP Pool as instructed; the ranges will be given by the assessor.
c. Change the SSID and configure wireless security using WPA2.
d. Configure DHCP reservations.
e. Check your work by pinging the connected devices, if task is accomplished, move on to the
access point.
7. Test interconnectivity of all the devices by using the “PING” command. Make sure the devices
got the correct IP addresses reserved to them.
8. Create folders on all the devices, share the folders and make sure everyone has read/write
permissions.
9. Show your work to the assessor, he will give you instructions to test your work.
END OF module 2
CSS: Creating our CSS NCII Virtual Lab Part 1
2. Virtual labs are safe for practice. Safe in a sense that if you try to
configure something that has a potential to disrupt your configuration
totally, you need not worry because if you made a mistake you
just build it again and that has no effect on your physical system.
Virtualization does have tons of benefits but for our purpose, we only
need to learn a few - the basics. It does have, as most things do,
some catch. The first concern is the ability of your device (desktop /
laptop) to support virtualization. If it does, how many machines
can it support? Typically, the ideal machine to build a virtual lab on
is one that has is a 64-bit architecture.
64-bit systems break the limit for memory usage, thus, you can have
more than 4 GB in your system. Keep in mind that when you create
one (1) virtual machine, the resources that you allocate to it are really
being taken from the physical machine.