LO1 Confirm Requirements of Client: MODULE TITLE: Administrating Network and Hardware Peripherals
LO1 Confirm Requirements of Client: MODULE TITLE: Administrating Network and Hardware Peripherals
LO1 Confirm Requirements of Client: MODULE TITLE: Administrating Network and Hardware Peripherals
LO1 confirm requirements of client LO6 administer and support peripheral services
LO2 obtain required peripherals LO7 maintain peripherals and fix common
problems
LO3 connect hardware peripherals
LO8 use and maximize operating system
LO4 install peripherals to a network
LO9 support input and output devices
LO5 configure peripheral services
Peripheral devices are the devices that are attached to the computer’s system unit. They can be
divided into either:
input
output
communication, or
secondary storage devices
1
ICT Level II
responsible for providing the output in user readable form. It can be text,
graphics, tactile, audio, and video.
Mouse
Scanners
Keyboard
Web Cam
Web cams are small cameras that plug into your computer which allow the
user to share a moving image of themselves with others on other computers through the Internet.
Light Pen
It is an input device that with utilize alight sensitive detector to select objects a display screen.
2
ICT Level II
Microphones
Microphone is attaching a computer by a cable that can transmit sounds and used to
system.
Digital camera
The digital camera takes a still photograph, stores it and then sends it as
Joy Stick
Joystick is popular pointing device, used mostly for playing computer games.
Bar Code
The bar code is identifies the product to the supermarket’s computer and has
a description and the latest price of the product.
3
ICT Level II
Projector: - A projector is an output device that can take images generated by a computer or Blu-ray
player and reproduce them by projection onto a screen, wall, or another surface. ... Projectors can
produce either still (slides) or moving images (videos). ... Today, most projectors use either an HDM
Speaker(s):- A loudspeaker is an electro acoustic transducer; a device which converts an electrical audio
signal into a corresponding sound.
Head Phone: - Headphones traditionally refer to a pair of small loudspeaker drivers worn on or around
the head over a user's ears. They are electro acoustic transducers, which convert an electrical signal to a
corresponding sound.
Investigate and document a solution to the requirements. Document any additional requirements
discovered in the investigation and provide advice and support on the
After analysis of the client’s requirements, you should fully document the client’s requirements and report
them to your supervisor.
4
ICT Level II
Assignment
Identifying the client means obtaining certain basic information about your client and any
third party directing, instructing or who has the authority to direct or instruct your client
such as a name and address. You must obtain this information whenever you are retained
to provide legal services to a client unless an exemption applies.
Methods of verification
Verification techniques can be classified into formal or informal, and static or dynamic. Four main
verification methods are inspection, demonstration, testing, and analysis. Some of the popular verification
techniques include desk checking, inspections, walkthroughs, and reviews.
1.2 Taking action to ensure client support expectation by vendor warranty and
support services
Warranties and support
Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties,
service and support, prospective suppliers will provide.
Warranties
A warranty is an agreed upon term which covers a computer or computer component. Generally,
most computers have a 1 or 3 year warranty. This warranty may or may not cover the service,
repair and replacement of computer parts.
An extended warranty is an available option provided by manufacturers or third-party companies
that provides additional support and/or repair of a computer or other hardware devices beyond its
standard warranty.
It is important to know what kind of support services are offered by the prospective supplier.
There are many questions to consider such as:
If a device requires repairs does it have to be sent back to the supplier (called ‘Return to
base’) or will they provide on-site visits?
What is the average response time if service is required?
5
ICT Level II
What kinds of maintenance and repair costs could be incurred during the duration of use of
the device?
Will the device require regular servicing? If so, how many services will be necessary over
a one-year period?
Email is the modern way to send letters – you can send a message to the other side of the world and get a
reply in minutes! Email is short for electronic mail. An email is a letter that is sent over a computer
network instead of being sent through the post. You can attach documents and photos to emails, just like
you can include a photo or a document with a letter.
Internet has been the most useful technology of the modern times which helps us not only in our daily
lives, but also our personal and professional lives developments
For the students and educational purposes the internet is widely used to gather information so as to do the
research or add to the knowledge of various subjects.
Consider the e-mail ID.john@hotmail.com In the above example john is the username of the person who
will be sending/receiving the email. Hotmail is the mail server where the username john has been
registered and com is the type of organization on the internet which is hosting the mail server.
You can open an attachment from the Reading Pane or from an open message. In either case, double-click
the attachment to open it. To open an attachment from the message list, right-click the message that has
the attachment, click View Attachments, and then click the name of the attachment.
Step 4: The email will open up with the attachment shown at the bottom.
Step 5: Hover over the attachment to see the download options. In this instance, you can open
the document as a 'Google Doc' or download it to your computer. We will click the down
arrow to download it to our computer.
Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click
Save.
You may see a box similar to this.
Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click
Save.You may see a box similar to this:
Or this:
Step 6: Find a
place to save your
document and download
it to your computer.
Once the document has been downloaded, you may be offered another dialogue box with further
options: open the document itself by clicking Open; or open the folder to which the document
has been saved by clicking Open folder.
7
ICT Level II
Step 7: Click Back to Inbox to go back to your list of received emails. You’ll now be able to
access through your Windows folders the attachment saved on your computer.
The first step in obtaining a peripheral device is to locate suppliers of that device. Then, there
are factors you need to consider about the supplier and the devices on offer, such as support
provided and purchase price. This will help you to compare and choose the most appropriate
supplier and the exact model of the device according to client requirements. Finally, you are
ready to place an order for your organisation or client to purchase the device.
Locating a supplier:- There are many ways to find a supplier of peripheral equipment. Some
ways include:
Other ways to investigate suppliers are to follow links from a website such as a manufacturer’s
website, or to browse website directories that may be linked to search engine home pages.
PC magazines
Computing magazines often contain a large section devoted to advertising current hardware
suppliers.
Newspapers
Major newspapers have computer/IT sections or classified advertisements which can be a source
for finding suppliers.
Brochures/advertising material
Many larger hardware suppliers use television, radio or leaflet deliveries to inform potential
customers of their latest hardware.
Telephone directory: - A telephone directory is useful if you need to find a hardware supplier
located within your local area.
Contacting the manufacturer directly
Manufacturers generally have their own websites. These may list major suppliers in your area.
Emailing or telephoning the manufacturer may also be a way to find out names of local
suppliers.
Choosing a supplier
With so many choices of suppliers available, how do you find the right one? There are a few
factors to consider:
How long has the supplier been operating? It is a good idea to find a supplier who will
still be around for the lifetime of the hardware.
Does the supplier offer suitable support and training? If the client will be requiring a
lot of additional assistance, training could be a major contributing factor for choosing a
particular supplier.
Does the supplier offer competitive pricing? Considering the support and stability, it is
also important to weigh up these factors in relation to price. For a client with a strict
budget, price may be a big issue when determining where to purchase hardware.
9
ICT Level II
Is the supplier a preferred supplier for your organisation? Some organisations have
arrangements that equipment must be purchased from suppliers who are considered to be
the preferred provider for the organisation. Organisations create these agreements because
customer loyalty offers substantial discounts, extended warranties and additional support.
Selecting a peripheral
Once you have selected suitable suppliers you need to contact each supplier. Information you
should find out from the supplier includes:
model and manufacturer names of peripherals that will satisfy the majority of your clients
requirements (including system specifications, physical dimensions, support)
price of each model
Availability of each model.
You may find it helpful to keep a record of any details that you collect so you refer to this
information quickly and easily.
Placing an order
Depending on the type of organisation you work for, placing an order for a hardware peripheral
device could be done in a variety of ways. In a small organisation you may be responsible for
ordering the device yourself. However, in a larger organisation there may be employees who are
responsible for purchasing new equipment. You may need to fill out an order form that can be
given to the purchasing department.
Before an order is submitted, it could also be necessary to obtain final approval from senior staff.
Often an order form might require signatures from the manager or supervisor before it can be
processed. A purchasing department might require written quotes from three suppliers, a
recommendation and justification for the chosen supplier.
Make sure that you find out from your supervisor or manager what procedures you need to
follow when placing an order within your organisation.
From _______________________
Date ________________________
10
ICT Level II
COST
GST
TOTAL
Self Test
Name:____________________
Date:_________________
Direction: Choose the best answer for the following question, if you have some clarifications – feel free
to ask your teacher.
B. News paper
C. Contacting the manufacturing directly
D. All
3. Factor of considering choosing a supplier?
A. Telephone directory
B. Does the supplier offer suitable support and training
C. Contacting the manufacturing directly
D. Placing an ordered
4. Information you should find out from the supplier is
A. Selecting a peripheral
B. Written quotes from three suppliers
C. Model and manufacturer names of peripherals that will satisfy the majority of your
clients requirements
D. All
The purpose of a hardware inventory (or registry) is to keep detailed information about all the
hardware equipment within an organisation. Every piece of hardware, including each computer
and peripheral device, should be recorded on the inventory. As well as providing an excellent
quick reference guide to the organisation’s hardware, an inventory can be very useful for
insurance, warranty and service purposes.
12
ICT Level II
In order for an inventory to be a valuable source of information, it is vital that the information be
maintained regularly. New devices need to be entered into the inventory as soon as they have
been obtained.
There are a number of tools available to create hardware inventories. Databases and spreadsheets are
often used to store the information. There are also software programs that you can purchase, designed
specifically for recording hardware and software details.
Manufacturer: Dell
Model: OptiPlex GX280MT Monitor: Dell UltraSharp™
Minitower—Power 1905FP flat panel,
Operating System: Windows XP Printer: HP LaserJet IID
13
ICT Level II
14
ICT Level II
database servers. In theory, whenever computers share resources with client machines they are
considered servers.
A peripheral is a “device that is used to put information into or get information out of the computer.”
Output, which provides output to the user from the computer (monitors, printers, etc.) Storage, which
stores data processed by the computer (hard drives, flash drives, etc.)
2.2.5 Switches
A network switch is networking hardware that connects devices on a computer network by using packet
switching to receive, and forward data to the destination device. A network switch is a multiport network
bridge that uses media access control addresses to forward data at the data link layer of the OSI model.
2.2.6 Hubs
A hub, also called a network hub, is a common connection point for devices in a network. Hubs are
devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
2.2.7 Bridge
A network bridge is a computer networking device that creates a single aggregate network from multiple
communication networks or network segments. This function is called network bridging. Bridging is
distinct from routing.
15
ICT Level II
2.2.8 Router
A router is a device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at
gateways, the places where two or more networks connect.
2.2.9 Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network. You can
implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent
unauthorized internet users from accessing private networks connected to the internet, especially
intranets.
Direction: filling the appropriate answer for the following question in the specie provided, if you
have some clarifications- feel free to ask your teacher.
Self Test
1. _____________ is a device that forwards data packets along networks.
2. _____________ is a computer networking device that creates a single aggregate network
from multiple communication networks or network segments.
3. _____________ is a common connection point for devices in a network.
4. _____________ is a system designed to prevent unauthorized access to or from a private
network.
5. _____________ is a multiport network bridge that uses media access control addresses to
forward data at the data link layer of the OSI model.
6. _____________ is a device that is used to put information into or get information out of the
computer.
7. _____________ is a computer, a device or a program that is dedicated to managing network
resources.
8. _____________ is a special computer designed for technical or scientific applications.
1. Backup your data. Before you do anything, backup your hard drive so you don't lose any data.
2. Wipe your hard drive. Clearing data off our computer is no easy process.
3. Donate, resell, or recycle. You can't just throw your computer away.
1. Physical hazards
A physical hazard is defined as "A factor within the environment that can harm the body without
necessarily touching it.
Vibration and noise are examples physical hazard
A chemical hazard is simply the risks involved with using a chemical.
LG 20 page 7
3.1.1.3 Ergonomics
Ergonomics (from the Greek word ergon meaning work, and nomoi meaning natural
laws), is the science of refining the design of products to optimize them for human use.
3.1.1.4 Psychological factors
Physiological factors are things related to your physical body that affect your thinking.
3.1.1.5 Burglary
The criminal offense of breaking and entering a building illegally for the purpose of committing a crime.
3.1.1.6 Fire
Fire is the product from a chemical reaction between oxygen in the atmosphere and some sort of fuel
3.1.1.7 Power accidents
Nuclear power plants are complex systems operated by human beings who can and do make mistakes.
Direction: filling the appropriate answer for the following question in the specie provided, if you have
some clarifications- feel free to ask your teacher.
17
ICT Level II
1. _______________ is defined as A factor within the environment that can harm the body
without necessarily touching it.
2. _______________ are things related to your physical body that affect your thinking.
3. _______________ is the product from a chemical reaction between oxygen in the
atmosphere and some sort of fuel
4. ______________ is the science of refining the design of products to optimize them for
human use.
5. _____________ Constitutional mandate to safeguard the worker's social and economic
well-being as well as his physical safety and health.
18
ICT Level II
Compatibility is nothing but the capability of existing or living together. In normal life, Oil is not
compatible with water, but milk can be easily combined with water.
Compatibility Testing is a type of Software testing to check whether your software is capable of
running on different hardware, operating systems, applications, network environments or Mobile
devices.
Let's look into compatibility testing types
1. Compatibility testing is
19
ICT Level II
A virtual private network (VPN) is programming that creates a safe and encrypted
connection over a less secure network, such as the public internet.
A local-area network (LAN) is a computer network that spans a relatively small area.
20
ICT Level II
Example: a single room, building or group of buildings; however, one LAN can be connected to
other LANs over any distance via telephone lines and radio waves.
Wide Area Network (WANs) are built for one particular organization and are private.
The Internet is a global wide area network that connects computer systems across the world.
A Private Line service is a private data connection securely connecting two or more locations
with high data speeds.
Installing software to manage networked peripherals
Network Management
Network management is defined as the process of managing a network for fault and
performance using various tools and technologies to keep up with the business requirements.
The objective of network management is to achieve an error free network.
Installation or setup is the act of making the system or program ready for execution.
21
ICT Level II
Hotmail. Hotmail is Microsoft Network's (MSN) solution to free web-based email. ...
Outlook Express. ...
Eudora. ...
Opera. ...
Yahoo! Mail.
A web browser, or simply "browser," is an application used to access and view websites.
Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox,
and Apple Safari.
The System Browser is an effective tool for finding components that are not assigned to a
system.
22 Page 15
Procedure of configuring Workstation
23 page 10
Installation and connection
Practical Learning: Installing the Server Operating System
1. Run fewer programs at the same time. Don't have too many programs running at the
same time.
2. Restart your computer.
3. Remove viruses and malware.
4. Free up hard disk space.
5. Verify windows system files.
6. Uninstall unnecessary programs.
7. Adjust windows visual effects.
8. Run a disk scan.
22
ICT Level II
The first step is to always check the hardware. The cables may be damaged or the USB
hub you’re using between your PC and the peripheral may not have power.
If attached peripherals suddenly stop working, check the Device Manager to see if the
port itself is to blame. A red exclamation mark (!) means there’s an error with the port.
Delete a device from the Device Manager and then reboot your computer. Once your
PC is up and running again, install the device driver.
Especially with PS/2 ports, one or two of those holes could be clogged with dust,
causing a loss in connection with the pins. The same thing could happen when the pins
on the peripheral connector are damaged.
A USB port can get damaged, too, resulting in no power or connection. A solution would
be to use another USB port.
Newer USB devices may not run on old USB ports. Most of them would need a 3.0
cable for high-speed processing. If the USB port and device are incompatible, attached
peripherals will not work.
Operating System:
An operating system is a collection of system programs that control computer and any
other peripherals connected to it. The program that hides the truth about the hardware
from the programmer and present and a nice simple view a named file that can be read
23
ICT Level II
& written as “operating system”. Operating system shields the programmer from the
interface, the abstraction offers by the operating system is slower & easier to use than
the underlying hardware.
8 bits=1 bytes
1024 bytes=1 kilobyte
1024 kilobyte=1 megabyte
1024 megabyte = 1 GB
24
ICT Level II
An operating system (OS) is software, consisting of programs and data, that runs on
computers, manages computer hardware resources, and provides common services for
execution of various application software. The operating system is the most important
type of system software in a computer system. Without an operating system, a user
cannot run an application program on their computer, unless the application program is
selebooting.
Examples of popular modern operating systems include Linux, Android, iOS, Mac OS X,
and Microsoft Windows.
Direction: Choose the best answer for the following question, if you have some clarifications –
feel free to ask your teacher.
D. All
3. Without ________________ the computer does not work perfectly
A. Allow user to share data C. Hardware
B. Operating system D. software
You can follow the steps below to install an application from an .exe file.
An update is new, improved, or fixed software, which replaces older versions of the
same software.
To remove programs and software components in Windows 7 from your computer hard disk
drive, follow these steps:
1. Check the File and Help menus for update instructions. ...
2. Choose Start→Programs→All Programs.
3. Look for the install directory of an application you want to update. ...
4. Point your Internet browser to the software manufacturer's Web site and look for update
instructions.
5. Download a newer version than the version you're running.
26
ICT Level II
27