Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

LO1 Confirm Requirements of Client: MODULE TITLE: Administrating Network and Hardware Peripherals

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

MODULE TITLE: Administrating Network and Hardware


Peripherals
MODULE CODE: ICT ITS2M03 0812
LEARNING OUTCOMES:

At the end of the module the trainee will be able to:

LO1 confirm requirements of client LO6 administer and support peripheral services

LO2 obtain required peripherals LO7 maintain peripherals and fix common
problems
LO3 connect hardware peripherals
LO8 use and maximize operating system
LO4 install peripherals to a network
LO9 support input and output devices
LO5 configure peripheral services

LO1 Confirm requirements of client


Information Sheet – 1: - Confirm requirements of client
1.1. Identifying and conforming Client peripheral with organizational standard
Overview of peripheral devices

Peripheral devices are the devices that are attached to the computer’s system unit. They can be
divided into either:
 input
 output
 communication, or
 secondary storage devices

1.1.1 Peripheral device

1.1.1.1 Input Devices


In computing, an input device is a piece of computer hardware equipment used
to provide data and control signals to an information processing system such
as a computer or information appliance. Examples of input devices include
keyboards, mouse, scanners, digital cameras, joysticks, and microphones.
1.1.1.2 Output Devices
An output device is any piece of computer hardware equipment which
converts information into human-readable form. In brief, output unit is

1
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

responsible for providing the output in user readable form. It can be text,
graphics, tactile, audio, and video.

Component of input device

Mouse

A mouse is a device that controls the movement of the cursor on a screen.

Scanners

A scanner is a device that captures text or illustrations on paper and

converts the information into a form the computer can use.

Keyboard

A combination of a typewriter keyboard and numeric keypad,

a keyboard enables you to enter data into a computer.

Web Cam

Web cams are small cameras that plug into your computer which allow the
user to share a moving image of themselves with others on other computers through the Internet.

Light Pen

It is an input device that with utilize alight sensitive detector to select objects a display screen.

2
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Microphones

Microphone is attaching a computer by a cable that can transmit sounds and used to

gather sound information to the computer when the computer is a multimedia

system.

Digital camera

The digital camera takes a still photograph, stores it and then sends it as

digital input in to computer.

Joy Stick

Joystick is popular pointing device, used mostly for playing computer games.

Bar Code

The bar code is identifies the product to the supermarket’s computer and has
a description and the latest price of the product.

Component of Output device

Monitor (LED, LCD, and CRT):


The age of CRT (cathode ray tube) displays is over and LCD displays are already being replaced with
LED screens. ... While LCD monitors use CCFL (cold cathode fluorescent lamps) for backlighting,
the latter use light emits diodes. This is the prime difference between the two display technologies.
Printers (all types):- a printer is a peripheral device which makes a persistent representation of graphics
or text on paper. While most output is human-readable, bar code printers are an example of an expanded
use for printers.
Plotters: - A plotter is a printer that interprets commands from a computer to make line drawings on
paper with one or more automated pens. Unlike a regular printer, the plotter can draw continuous point-
to-point lines directly from vector graphics files or commands. ... As a rule, plotters are much more
expensive than printers.

3
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Projector: - A projector is an output device that can take images generated by a computer or Blu-ray
player and reproduce them by projection onto a screen, wall, or another surface. ... Projectors can
produce either still (slides) or moving images (videos). ... Today, most projectors use either an HDM
Speaker(s):- A loudspeaker is an electro acoustic transducer; a device which converts an electrical audio
signal into a corresponding sound.
Head Phone: - Headphones traditionally refer to a pair of small loudspeaker drivers worn on or around
the head over a user's ears. They are electro acoustic transducers, which convert an electrical signal to a
corresponding sound.

1.2.1 organizational standard


Organisations often have a set of standards which are required to be adhered to when it comes to
purchasing equipment. Standards allow organisations to:
 Ensure that all equipment used within the organisation meets satisfactory levels of
operation.
 Ensure that the equipment used is compatible with other equipment in use.
 Ensure that support staff is trained to service and maintain the equipment in use.
 Budget for and plan the timely upgrade of equipment.

Information Sheet – 2:- Documenting client requirements and peripherals

Investigate and document a solution to the requirements. Document any additional requirements
discovered in the investigation and provide advice and support on the

Steps to document requirements

1. Create a comprehensive explanation of what is needed for a product. ...


2. Interview various sources. ...
3. List system requirements or properties. ...
4. Identify any constraints for the project. ...
5. Consider any interface requirements. ...
6. Identify parameters like cost and scheduling. ...
7. Work up a development plan. ...
8. Insert visuals.

After analysis of the client’s requirements, you should fully document the client’s requirements and report
them to your supervisor.

4
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Assignment

1. What is computer peripheral?


2. What is an input device ? Gve any four examples of it.
3. What is an output device ? Give any four examples of it.
4. What is the difference between printer and scanner?
5. What are the steps to document the requirements?
Information Sheet – 3 :-Verifying and reporting client requirement

Identifying the client means obtaining certain basic information about your client and any
third party directing, instructing or who has the authority to direct or instruct your client
such as a name and address. You must obtain this information whenever you are retained
to provide legal services to a client unless an exemption applies.

Methods of verification

Verification techniques can be classified into formal or informal, and static or dynamic. Four main
verification methods are inspection, demonstration, testing, and analysis. Some of the popular verification
techniques include desk checking, inspections, walkthroughs, and reviews.

Information Sheet – 4 Ensure client support expectation by vendor


warranty

1.2 Taking action to ensure client support expectation by vendor warranty and
support services
Warranties and support

Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties,
service and support, prospective suppliers will provide.
Warranties
A warranty is an agreed upon term which covers a computer or computer component. Generally,
most computers have a 1 or 3 year warranty. This warranty may or may not cover the service,
repair and replacement of computer parts.
An extended warranty is an available option provided by manufacturers or third-party companies
that provides additional support and/or repair of a computer or other hardware devices beyond its
standard warranty.
It is important to know what kind of support services are offered by the prospective supplier.
There are many questions to consider such as:
 If a device requires repairs does it have to be sent back to the supplier (called ‘Return to
base’) or will they provide on-site visits?
 What is the average response time if service is required?
5
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

 What kinds of maintenance and repair costs could be incurred during the duration of use of
the device?
 Will the device require regular servicing? If so, how many services will be necessary over
a one-year period?

1.2.1.1 Personal use of emails and internet access


Internet is the worldwide network of computers. It is formed by joining millions
of computers all over the world.
Email is one of the fundamental internet technologies, a tool used by nearly every person with an
internet connection. It allows you to, at no cost; send a letter of unlimited length to one person – or many
people at once. It arrives almost instantly, and they can reply straight away.

Email is the modern way to send letters – you can send a message to the other side of the world and get a
reply in minutes! Email is short for electronic mail. An email is a letter that is sent over a computer
network instead of being sent through the post. You can attach documents and photos to emails, just like
you can include a photo or a document with a letter.

Internet has been the most useful technology of the modern times which helps us not only in our daily
lives, but also our personal and professional lives developments
For the students and educational purposes the internet is widely used to gather information so as to do the
research or add to the knowledge of various subjects.

1.2.1.2 Content of emails


As in the case of normal mail system, e-mail is also based upon the concept of a recipient
address. The email address provides all of the information required to get a message to the recipient from
anywhere in the world.

Consider the e-mail ID.john@hotmail.com In the above example john is the username of the person who
will be sending/receiving the email. Hotmail is the mail server where the username john has been
registered and com is the type of organization on the internet which is hosting the mail server.

1.2.1.4 Opening mail with attachments

You can open an attachment from the Reading Pane or from an open message. In either case, double-click
the attachment to open it. To open an attachment from the message list, right-click the message that has
the attachment, click View Attachments, and then click the name of the attachment.

Follow these step-by-step instructions to open an attachment


Step 1: Log in to your email account.
Step 2: Make sure you’re in your inbox.
Step 3: An email with an attachment will have a paperclip icon next to it to show that there’s
something attached to the email you’ve received. Click on the icon.
 
6
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Step 4: The email will open up with the attachment shown at the bottom.  
Step 5: Hover over the attachment to see the download options. In this instance, you can open
the document as a 'Google Doc' or download it to your computer. We will click the down
arrow to download it to our computer.  

Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click
Save.
You may see a box similar to this.

Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click
Save.You may see a box similar to this:

Or this:

Step 6: Find a
place to save your
document and download
it to your computer.
Once the document has been downloaded, you may be offered another dialogue box with further
options: open the document itself by clicking Open; or open the folder to which the document
has been saved by clicking Open folder.

7
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Step 7: Click Back to Inbox to go back to your list of received emails. You’ll now be able to
access through your Windows folders the attachment saved on your computer.

Information Sheet – 1 Obtaining a peripheral

2.1. Obtaining peripherals under instruction

The first step in obtaining a peripheral device is to locate suppliers of that device. Then, there
are factors you need to consider about the supplier and the devices on offer, such as support
provided and purchase price. This will help you to compare and choose the most appropriate
supplier and the exact model of the device according to client requirements. Finally, you are
ready to place an order for your organisation or client to purchase the device.

Locating a supplier:- There are many ways to find a supplier of peripheral equipment. Some
ways include:

Searching the Internet


The Internet provides different methods for searching for suppliers. Using search engines such as
Google or Yahoo can help you find a hardware supplier anywhere in the world. Suppliers will
often have their own websites that can provide you with catalogues of available equipment.
8
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Other ways to investigate suppliers are to follow links from a website such as a manufacturer’s
website, or to browse website directories that may be linked to search engine home pages.

PC magazines
Computing magazines often contain a large section devoted to advertising current hardware
suppliers.

Newspapers
Major newspapers have computer/IT sections or classified advertisements which can be a source
for finding suppliers.

Brochures/advertising material
Many larger hardware suppliers use television, radio or leaflet deliveries to inform potential
customers of their latest hardware.

Telephone directory: - A telephone directory is useful if you need to find a hardware supplier
located within your local area.
Contacting the manufacturer directly
Manufacturers generally have their own websites. These may list major suppliers in your area.
Emailing or telephoning the manufacturer may also be a way to find out names of local
suppliers.

Choosing a supplier
With so many choices of suppliers available, how do you find the right one? There are a few
factors to consider:
 How long has the supplier been operating? It is a good idea to find a supplier who will
still be around for the lifetime of the hardware.
 Does the supplier offer suitable support and training? If the client will be requiring a
lot of additional assistance, training could be a major contributing factor for choosing a
particular supplier.
 Does the supplier offer competitive pricing? Considering the support and stability, it is
also important to weigh up these factors in relation to price. For a client with a strict
budget, price may be a big issue when determining where to purchase hardware.

9
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

 Is the supplier a preferred supplier for your organisation? Some organisations have
arrangements that equipment must be purchased from suppliers who are considered to be
the preferred provider for the organisation. Organisations create these agreements because
customer loyalty offers substantial discounts, extended warranties and additional support.
Selecting a peripheral
Once you have selected suitable suppliers you need to contact each supplier. Information you
should find out from the supplier includes:
 model and manufacturer names of peripherals that will satisfy the majority of your clients
requirements (including system specifications, physical dimensions, support)
 price of each model
 Availability of each model.

You may find it helpful to keep a record of any details that you collect so you refer to this
information quickly and easily.
Placing an order
Depending on the type of organisation you work for, placing an order for a hardware peripheral
device could be done in a variety of ways. In a small organisation you may be responsible for
ordering the device yourself. However, in a larger organisation there may be employees who are
responsible for purchasing new equipment. You may need to fill out an order form that can be
given to the purchasing department.
Before an order is submitted, it could also be necessary to obtain final approval from senior staff.
Often an order form might require signatures from the manager or supervisor before it can be
processed. A purchasing department might require written quotes from three suppliers, a
recommendation and justification for the chosen supplier.
Make sure that you find out from your supervisor or manager what procedures you need to
follow when placing an order within your organisation.

Sample order form

From _______________________
Date ________________________

10
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Code Quantity Description Price Supplier: name and


telephone

COST
GST
TOTAL

Delivery point ___________________________________________


Budget holder’s signature _________________

Please return to the Purchasing Department

Self Test
Name:____________________
Date:_________________

Direction: Choose the best answer for the following question, if you have some clarifications – feel free
to ask your teacher.

1. The first step in obtaining a peripheral device is?


A. Locate suppliers
B. Placing an ordered
C. Selecting
D. All
2. Which of the following is locating of supplier?
A. Searching in internet
11
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

B. News paper
C. Contacting the manufacturing directly
D. All
3. Factor of considering choosing a supplier?
A. Telephone directory
B. Does the supplier offer suitable support and training
C. Contacting the manufacturing directly
D. Placing an ordered
4. Information you should find out from the supplier is
A. Selecting a peripheral
B. Written quotes from three suppliers
C. Model and manufacturer names of peripherals that will satisfy the majority of your
clients requirements
D. All

Information Sheet – 2 Entering peripherals into equipment inventory

2.2 Entering peripherals into equipment inventory


Hardware inventories

The purpose of a hardware inventory (or registry) is to keep detailed information about all the
hardware equipment within an organisation. Every piece of hardware, including each computer
and peripheral device, should be recorded on the inventory. As well as providing an excellent
quick reference guide to the organisation’s hardware, an inventory can be very useful for
insurance, warranty and service purposes.

12
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

In order for an inventory to be a valuable source of information, it is vital that the information be
maintained regularly. New devices need to be entered into the inventory as soon as they have
been obtained.

There are a number of tools available to create hardware inventories. Databases and spreadsheets are
often used to store the information. There are also software programs that you can purchase, designed
specifically for recording hardware and software details.

Details that should be included within a hardware inventory include:

 description of hardware device  serial number


 manufacturer  warranty or maintenance conditions
 supplier  components
 model number  location
 number and identity of authorised users  purchase price
 date of purchase
Documenting peripherals used with each computer
If the peripheral is an essential part of the computer system (for example mouse, keyboard or
monitor) it is logical to record information about the device within the documentation for the
computer to which it is connected. Individual computer inventories will often contain detailed
information about the computer’s related hardware and software. It may also be more practical to
record information about the peripheral inside the computer’s record, if the device is also
permanently connected to a computer (for example a printer or scanner).

Hardware inventory (Example 1)

Details for Administration Computer

Manufacturer: Dell
Model: OptiPlex GX280MT Monitor: Dell UltraSharp™
Minitower—Power 1905FP flat panel,
Operating System: Windows XP Printer: HP LaserJet IID 

13
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Serial number: 12345 Keyboard: Dell USB keyboard


RAM: 128 Mb  Pointing device: Dell USB 2-button
optical mouse with
scroll
Hard disk space: 160 Gb
Individually documenting each peripheral device
If the device is shared between several computers, it makes more sense to keep information
about the peripheral as an individual entry in an inventory. Devices such as digital cameras, data
projectors and USB drives would more likely to be used by many computers, thus it would make
more sense to record their details separate to the computer details.

Hardware inventory (Example 2)

2.2.1 Workstations: - is a special computer designed for technical or scientific applications,


workstations offered higher performance than mainstream personal computers,
especially with respect to CPU and graphics, memory capacity, and multitasking
capability.
2.2.2 Server
A server is a computer, a device or a program that is dedicated to managing network resources. There
are a number of categories of servers, including print servers, file servers, network servers and

14
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

database servers. In theory, whenever computers share resources with client machines they are
considered servers.

2.2.3 Modems or other connectivity devices


Broadband Modems Cellular modems are a type of digital modem that establishes internet connectivity
between a mobile device and a cell phone network. The word modem is a mash up of the term
modulation/demodulation, which is the technical term for the conversion between digital and analog
signals.

2.2.4 Printers, hard drives, monitors

A peripheral is a “device that is used to put information into or get information out of the computer.”
Output, which provides output to the user from the computer (monitors, printers, etc.) Storage, which
stores data processed by the computer (hard drives, flash drives, etc.)

2.2.5 Switches
A network switch is networking hardware that connects devices on a computer network by using packet
switching to receive, and forward data to the destination device. A network switch is a multiport network
bridge that uses media access control addresses to forward data at the data link layer of the OSI model.

2.2.6 Hubs

A hub, also called a network hub, is a common connection point for devices in a network. Hubs are
devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

2.2.7 Bridge
A network bridge is a computer networking device that creates a single aggregate network from multiple
communication networks or network segments. This function is called network bridging. Bridging is
distinct from routing.
15
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

2.2.8 Router
A router is a device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at
gateways, the places where two or more networks connect.

2.2.9 Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network. You can
implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially
intranets.

Direction: filling the appropriate answer for the following question in the specie provided, if you
have some clarifications- feel free to ask your teacher.
Self Test
1. _____________ is a device that forwards data packets along networks.
2. _____________ is a computer networking device that creates a single aggregate network
from multiple communication networks or network segments.
3. _____________ is a common connection point for devices in a network.
4. _____________ is a system designed to prevent unauthorized access to or from a private
network.
5. _____________ is a multiport network bridge that uses media access control addresses to
forward data at the data link layer of the OSI model.
6. _____________ is a device that is used to put information into or get information out of the
computer.
7. _____________ is a computer, a device or a program that is dedicated to managing network
resources.
8. _____________ is a special computer designed for technical or scientific applications.

Removing old Peripherals


Disposal of packaging
To make sure you dispose of old computers and hardware safely follows these steps.
16
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

1. Backup your data. Before you do anything, backup your hard drive so you don't lose any data.
2. Wipe your hard drive. Clearing data off our computer is no easy process.
3. Donate, resell, or recycle. You can't just throw your computer away.
1. Physical hazards
A physical hazard is defined as "A factor within the environment that can harm the body without
necessarily touching it.
Vibration and noise are examples physical hazard
A chemical hazard is simply the risks involved with using a chemical.
LG 20 page 7

3.2.1 OHS standards (Occupational Safety and Health Standards)


Equipment designated to be installed in the home will have to meet stringent standards regarding audio
noise and radio frequency interference. They also need to meet relevant safety standards.
3.1.1.1 Physical hazards
A physical hazard is defined as "A factor within the environment that can harm the body without
necessarily touching it. Vibration and noise are examples of physical hazards".
3.1.1.2 Chemical hazards
A chemical hazard is simply the risks involved with using a chemical.

3.1.1.3 Ergonomics
Ergonomics (from the Greek word ergon meaning work, and nomoi meaning natural
laws), is the science of refining the design of products to optimize them for human use.
3.1.1.4 Psychological factors
Physiological factors are things related to your physical body that affect your thinking.
3.1.1.5 Burglary
The criminal offense of breaking and entering a building illegally for the purpose of committing a crime.
3.1.1.6 Fire
Fire is the product from a chemical reaction between oxygen in the atmosphere and some sort of fuel
3.1.1.7 Power accidents
Nuclear power plants are complex systems operated by human beings who can and do make mistakes.

Self Check 2 Written Test

Direction: filling the appropriate answer for the following question in the specie provided, if you have
some clarifications- feel free to ask your teacher.

17
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

1. _______________ is defined as A factor within the environment that can harm the body
without necessarily touching it.
2. _______________ are things related to your physical body that affect your thinking.
3. _______________ is the product from a chemical reaction between oxygen in the
atmosphere and some sort of fuel
4. ______________ is the science of refining the design of products to optimize them for
human use.
5. _____________ Constitutional mandate to safeguard the worker's social and economic
well-being as well as his physical safety and health.

(4)Testing and confirming compatibility issues and hardware peripherals to


meet client satisfaction

18
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Compatibility is nothing but the capability of existing or living together. In normal life, Oil is not
compatible with water, but milk can be easily combined with water.
Compatibility Testing is a type of Software testing to check whether your software is capable of
running on different hardware, operating systems, applications, network environments or Mobile
devices.
Let's look into compatibility testing types

 Hardware: It checks software to be compatible with different hardware configurations.


 Operating Systems: It checks your software to be compatible with different Operating Systems
like Windows, Unix, Mac OS etc.
 Software: It checks your developed software to be compatible with other software. For example,
MS Word application should be compatible with other software like MS Outlook, MS Excel,
VBA etc.
 Network: Evaluation of performance of a system in a network with varying parameters such as
Bandwidth, Operating speed, Capacity. It also checks application in different networks with all
parameters mentioned earlier.
 Browser: It checks the compatibility of your website with different browsers like Firefox, Google
Chrome, Internet Explorer etc.
 Devices: It checks compatibility of your software with different devices like USB port Devices,
Printers and Scanners, Other media devices and Blue tooth.
 Mobile: Checking your software is compatible with mobile platforms like Android, iOS etc.
 Versions of the software: It is verifying your software application to be compatible with
different versions of the software. For instance checking your Microsoft Word to be compatible
with Windows 7, Windows 7 SP1, Windows 7 SP2, Windows 7 SP3.

Self Check 4 Written Test


Direction: Choose the best answer for the following question, if you have some clarifications – feel free
to ask your teacher.

1. Compatibility testing is

19
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

A. a type of software testing used to ensure compatibility of the


system/application/website built with various
B. Evaluation of performance of a system in a network with varying parameters
C. It checks compatibility of your software with different devices
D. It checks software to be compatible with different hardware configurations.
2. Type of compatibility testing is
A. Hardware C. Network
B. Browser D. All
3. ____ is verifying your software application to be compatible with different versions of
the software.
A. Browser C. Software
B. Versions of the software D. All
4. ____ It checks your developed software to be compatible with other.
A. Versions of the software C. Software
B. Browser D. Devices

Connecting peripherals to the network

1.2 Connecting peripherals to the network


Peripherals are devices physically connected to a computer.
4.1.1 Large and small LANs, WANs and VPNs

A virtual private network (VPN) is programming that creates a safe and encrypted
connection over a less secure network, such as the public internet.

A local-area network (LAN) is a computer network that spans a relatively small area.

20
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Example: a single room, building or group of buildings; however, one LAN can be connected to
other LANs over any distance via telephone lines and radio waves.
Wide Area Network (WANs) are built for one particular organization and are private.
The Internet is a global wide area network that connects computer systems across the world.
A Private Line service is a private data connection securely connecting two or more locations
with high data speeds.
Installing software to manage networked peripherals

System installation and configuration: - A configuration that allows an operating system or


application to automatically download and install system updates.

Network Management
Network management is defined as the process of managing a network for fault and
performance using various tools and technologies to keep up with the business requirements.
The objective of network management is to achieve an error free network.
Installation or setup is the act of making the system or program ready for execution.

Configuration is an arrangement of functional units according to their nature, number, and


chief characteristics.

Database programs, word processors, email programs,


internet browsers, system browsers and spreadsheets
A database program is the heart of a business information system and provides file creation,
data entry, update, query and reporting functions.
A word processor is software or a device that allows users to create, edit, and print
documents.
Top 10 Email Programs

 Thunderbird. Thunderbird is a free email client brought to you by Mozilla. ...


 Gmail. Gmail is a browser-based email program provided to you by Google. ...
 Outlook. Outlook is a paid email client by Microsoft. ...

21
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

 Hotmail. Hotmail is Microsoft Network's (MSN) solution to free web-based email. ...
 Outlook Express. ...
 Eudora. ...
 Opera. ...
 Yahoo! Mail.

A web browser, or simply "browser," is an application used to access and view websites.
Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox,
and Apple Safari.
The System Browser is an effective tool for finding components that are not assigned to a
system.

22 Page 15
Procedure of configuring Workstation
23 page 10
Installation and connection
Practical Learning: Installing the Server Operating System

Fixing peripherals unfortunate accident and malfunction


Speeding up a slow computer troubleshoot basic computer problems

1. Run fewer programs at the same time. Don't have too many programs running at the
same time.
2. Restart your computer.
3. Remove viruses and malware.
4. Free up hard disk space.
5. Verify windows system files.
6. Uninstall unnecessary programs.
7. Adjust windows visual effects.
8. Run a disk scan.

22
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Peripheral Failure and Solutions

The first step is to always check the hardware. The cables may be damaged or the USB
hub you’re using between your PC and the peripheral may not have power.

#1: Problems with a port

If attached peripherals suddenly stop working, check the Device Manager to see if the
port itself is to blame. A red exclamation mark (!) means there’s an error with the port.
Delete a device from the Device Manager and then reboot your computer. Once your
PC is up and running again, install the device driver.

#2: Problems with the port connectors

Especially with PS/2 ports, one or two of those holes could be clogged with dust,
causing a loss in connection with the pins. The same thing could happen when the pins
on the peripheral connector are damaged.
A USB port can get damaged, too, resulting in no power or connection. A solution would
be to use another USB port.

#3: USB standards don’t match

Newer USB devices may not run on old USB ports. Most of them would need a 3.0
cable for high-speed processing. If the USB port and device are incompatible, attached
peripherals will not work.

Information Sheet – 1 Configuring operating system

8.1 Configuring Operating system

Operating System:
An operating system is a collection of system programs that control computer and any
other peripherals connected to it. The program that hides the truth about the hardware
from the programmer and present and a nice simple view a named file that can be read
23
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

& written as “operating system”. Operating system shields the programmer from the
interface, the abstraction offers by the operating system is slower & easier to use than
the underlying hardware.

Operating system is collection of software which is close to hardware. We can view


operating system as a resource – hardware and software collector.

The main functions of operating system are

1. Implementing using interface


2. Sharing hardware among number of users.
3. Allow user to share data
4. Protecting user from each other
5. Control the execution of programs
We can call operating system as resource allocator. A computer has many resource
hardware and software’s, CPU, main memory I/O devices etc. The operating system
acts as manager of these resources. Operating system is the control program.
A control program manages the execution of user program to prevent error and
improve use of computer. The storage device used to store operating system are
expressed In bytes.

8 bits=1 bytes
1024 bytes=1 kilobyte
1024 kilobyte=1 megabyte
1024 megabyte = 1 GB

Operating system Structure

24
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

Fig 1.1 Common features

An operating system (OS) is software, consisting of programs and data, that runs on
computers, manages computer hardware resources, and provides common services for
execution of various application software. The operating system is the most important
type of system software in a computer system. Without an operating system, a user
cannot run an application program on their computer, unless the application program is
selebooting.
Examples of popular modern operating systems include Linux, Android, iOS, Mac OS X,
and Microsoft Windows.

Direction: Choose the best answer for the following question, if you have some clarifications –
feel free to ask your teacher.

1. Operating system in computer is _________?


A. A collection of system programs that control computer.
B. And any other peripherals connected to it.
C. Control the overall activity of a computer.
D. All
2. Which of the following is the function of operating system?
A. Sharing hardware among number of users
B. Allow user to share data
C. Control the execution of programs
25
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

D. All
3. Without ________________ the computer does not work perfectly
A. Allow user to share data C. Hardware
B. Operating system D. software

You can follow the steps below to install an application from an .exe file.

1. Locate and download an .exe file.


2. Locate and double-click the .exe file. (It will usually be in your Downloads folder.)
3. A dialog box will appear. Follow the instructions to install the software.
4. The software will be installed.

An update is new, improved, or fixed software, which replaces older versions of the
same software.

To remove programs and software components in Windows 7 from your computer hard disk
drive, follow these steps:

1. Click Start , and then click Control Panel.


2. Under Programs, click Uninstall a program. ...
3. Select the program you want to remove.
4. Click Uninstall or Uninstall/Change at the top of the program list.

How to Update Applications Software

1. Check the File and Help menus for update instructions. ...
2. Choose Start→Programs→All Programs.
3. Look for the install directory of an application you want to update. ...
4. Point your Internet browser to the software manufacturer's Web site and look for update
instructions.
5. Download a newer version than the version you're running.

26
ICT Level II

Hand Out for : Administrating Network and Hardware Peripherals

27

You might also like