BCT Textbook 2021
BCT Textbook 2021
Course Objectives:
Course Contents:
Upon successful completion of training,;
The student will be able to familiarize computer parts, and demonstrate how to:
This section will show you which parts and programs the computer needs in
order to function. In addition, you will learn the basics of managing files and
directories, you will know the most common applications, Diagnosing and
troubleshooting of different computer hardware and software is also under of
this textbook and you will be able to solve some of the most common
problems that occur when using a computer. When you have acquainted
yourself with this section, you will also understand the basic structure of the
internet, know the different kinds of services on the internet, and understand
e.g. ‘netiquette’. You will also know how to utilize the various kinds of sound
and video connections and materials available on the Internet in your studies.
Keyboard
A standard keyboard has 102 keys. The keys are divided into
alphabetical (a-z), numerical (1-0) and special (Function, Ctrl, Alt
etc keys).
In addition to the usual alphabetical and numerical keys, you
should know at least the following special keys that are located
among the alphabetical ones.
Below are shown some typical keys on a PC keyboard. The keyboard mapping on Mac computers is
almost identical to PC keyboards, but the special keys Ctrl and Alt work slightly differently. In
addition, the Mac keyboard has Fn and Cmd keys instead of the Windows key.
Ctrl: (Control) is used in combination with other keys for different actions. The
combination Ctrl+C, for example, copies the chosen data to the memory.
Alt: (Alternative) is used like the Ctrl key. Sometimes both these keys are used in
combination: Ctrl+Alt+Del, for example, brings up the task manager(in Windows
XP).
Alt Gr: (Alternative Graphics) produces the ‘third character’ of the keys, e.g. @, $, £
and }. With this key, you can also create the ~ character (important for the
internet). Create the ~ character as follows: press ALT-GR and the ~ key at the
same time, and finish with the space bar.
Shift: capitalizes letters and the special characters on the numerical keys, among
others.
Caps Lock: locks the capitalization of letters. This function is connected with an A
or Caps lock pilot light on the keyboard. It turns on the light when the function is in
use.
Tab: the tabulator is mainly used in word processing: each time you press the tab
button, the cursor moves to the next tab stop on the same row. The key can also be
used for alternating between window displays.
Backspace: removes the characters to the left of the cursor, i.e. what you just
wrote. This key can also be used to remove a larger portion of text.
Enter: by pressing this key you can change paragraphs or e.g. accept a function.
There are more special keys above the alphabetical keys; of these the function keys(please see
next image) are used for different functions, depending on situation and the program currently
being used. The manual for these functions is usually available in the manual for the program.
To the left and right of the function keys, you will find the following additional keys:
Esc (Escape): mostly used to cancel a function, or e.g. to close a menu
window.
Home and End: these keys bring the cursor to the top or the bottom of
the line.
Page Up and Page Down: move the page up or down.
Insert: starts the insert function, where the text you are writing replaces
the text to the right of the cursor.
Delete: deletes the character to the right of the cursor.
Arrow keys: move the cursor in the direction shown by the arrows.
The keyboard also has the rarely used keys Print Screen, Scroll Lock and Pause. The Print Screen
key lets you take a picture of the display (Alt+PrintScreen takes a picture of the currently activated
window) and send it to your clipboard, Scroll Lock locks the scrolling of the display and the Pause
key can be used e.g. for stopping the loading of the system during start-up.
For more information on hotkeys and key combinations, see the additional reading material.
Pointing devices
Traditionally, most programs have been designed to be used with a mouse. The mouse cursor seen
on the screen of the computer moves along with the mouse. The cursor can be used to select menu
commands and areas, as well as activating different objects by clicking the mouse keys.
optical mouse | pointing stick and touchpad | touchscreen
Mouse
You can attach a traditional mouse with or without a cord to any computer. Cordless mice use radio
waves to relay movement from the mouse to the computer (for this mouse, a small radio receiver is
attached to the computer).
Touchpad
Almost all laptop computers have a touchpad which is used to move the cursor. Some models also
have a so-called pointing stick. In addition, portable computers have keys with the clicking
function of mouses. The touchpad is a pad where you can control the cursor by moving your finger
along the pad. Tapping the pad serves the same function as clicking a mouse.
Pointing stick
The pointing stick is a ‘nub’ located in the middle of the keyboard, and controls the cursor. The
pointing stick can be ‘clicked’ by tapping the stick or using the separate buttons in the keyboard. In
the right-hand image above, you can see a portable computer with both a pointing stick (blue) and a
touchpad (the large, dark grey area in front of the keyboard).
When using a mouse, keyboard and similar devices, please consider your ergonomics. Among other
things, make sure that your wrists are resting squarely on the worktop or on a separate wrist rest, and
that your work position does not strain your shoulders.
The motherboard
The processor
How do I find out the amount of RAM on my computer?You can check the amount of memory on your
computer in the following manner in Windows: Open the Control Panel from the Start menu, and
click System and Security and thenSystem. You will see the amount of memory on your computer on
the screen.If you are using a Mac computer, you can see its memory by clicking the Mac button in the
top left corner of the screen, and clicking About this Mac in the opening menu.
Hard drive
Please note that the above images only show some of the most common ports; there are often more
ports in the side and front panels of the computer etc….
Power connector
The power connector is generally in the back panel of the computer. The power source of a portable
computer is generally in an external AC adapter, so the power connector of a portable computer
(below left) is smaller than that of a desktop computer (below right).
Display port
The display port is usually in the back panel of the computer. The following double image shows an
older VGA port and a newer so-called DVI port . These most computers use a DVI connector for
relaying the image to an external display (the upper connector and the white cable in the image
below).
USB port
Some devices that can be connected to the USB port are
mouses, keyboards, digital cameras, USB memory sticks
and scanners. The following image shows two USB ports
and a USB cable.
Audio ports
If you want to attach e.g.headphones or loudspeakers to your computer, plug them into the green
sound-out port.
Other ports
Many new computers have an HDMI (High Definition Multimedia Interface) port (see the
port to the left on the image below) where you can connect e.g. a DVD or Blueray player, stereo
speaker or flat-screen TV. HDMI enables excellent image and sound reproduction over the
connected hardware.
Some computers have a competitor to HMDI, a Displayport connection (see the middle port in the
image below), where you can also connect e.g. the computer screen or a stereo speaker.
Some newer computers also have a eSata port (see port on the right in the image above). Typically,
an external hard drive can be connected to this port, and you can store information through it much
faster than with the older FireWire connection.
Modern laptop computers have several card slots. The image below shows anExpressCard
(EC) slot where you can connect many kinds of hardware, and a Secure digital (SD) slot, where you
can insert e.g. a camera memory card for fast transferral of digital images. In addition to these very
common card slots, there are many others.
Windows 7:
Note: that when you are using a WLAN or Bluetooth network, there are usually small icons
indicating this at the bottom right of you display (on the Windows Vista operating system).
If you are having trouble connecting to a LAN or WLAN on your computer, you can check their
status as follows:
Windows 7: Click the network connections icon down to the right on the task bar (see
image). This will show you the network connections available to your computer and their
current status. If you cannot find the icon, press the triangle-shaped Show hidden
icons button in the task bar.
Storage
Online storage is often the best option if you want to back up your files or access them at another
location. However, an online location is not always the best or most convenient storage place: a
network connection is not necessarily available at all times and in all places. The storage and
retrieval of large amounts of data to and from an online location may take a lot of time, whereas
storing to and downloading from a removable USB memory stick, for example, can often be done in
an instant.
Online storage
SERVICES PROVIDED BY THE UNIVERSITY
As a student of the University of Helsinki, the UH home directory (the Z: drive on UH computers)
available to you is the most advisable online storage location as there your data is safe from
unauthorised used and is backed up automatically every night. You can access your home directory
not only at the University of Helsinki but also anywhere in the world.
Apart from the home directory, you may come across other online storage locations or group
directories used in group work at the University of Helsinki during your studies.
Smaller individual files can be transferred quickly by sending them to yourself as e-
mailattachments.
OTHER SERVICES
In addition to the services provided by the University, the Internet is full of storage services
available to you. Various online storage services are usually referred to using the general
term cloud services. Different operating system manufacturers have their own services: OneDrive
is available for Windows devices, whereas Apple offers iCloud. Furthermore, there are several
independent (such as Funet Filesender) and commercial (e.g. DropBox) storage services.
Cloud services should be used with discretion as their information security may be rather weak. They
are not necessarily permanent so in the worst case, the files you have stored there may disappear
without separate notification. You should also keep in mind that you cannot access the data in the
cloud services without a network connection. The use of some services may even be expressly
prohibited at the university or workplaces. For further information on the information security of
various cloud services, see the instructions provided by Aalto University, for example.
Storage media
When using removable storage media (such as USB memory sticks, certain DVDs, external hard
drives, etc.), saving to the memory can be done the same way as saving to the computer’s own hard
drive. However, the use and application of different media vary, so it is important for you to be
aware of which media are suited for which kind of storage, e.g. backing up files and moving them
from one location to another.
USB MEMORY STICKS
USB memory sticks (USB, Universal Serial Bus) are connected to
the USB port of a computer or another device. USB memory
sticks can be used to transfer data between different devices
(such as laptops, desktop computers and modern televisions)
Because of their small size and usability, USB sticks are well suited for your file storage and transfer
needs as a student. There are USB sticks with different capacities, but once you are buying one, buy
one with a high enough capacity (e.g. 16 GB). More information on file size measurement units may
be found here.
B L U - R A Y, D V D A N D CD
If your computer has a DVD-RW drive (Digital Versatile Disk Re-Writeable), you can use it to write
both to DVDs and CDs. A DVD will usually take 4.7 GB of data, while a CD will only take around 700
MB (=0.7 GB) of data.
However, if you have a writing, i.e. burning, Blu-ray drive on your computer, you can use it to store
information not only on CDs and DVDs but also on Blu-ray discs, which have a capacity that is vastly
superior to the above mentioned disc types. One Blu-ray disc can hold 25–100 GB of data,
depending on its model.
In order to write or “burn” to discs, you will usually need a separate burner program. Most
operating systems come with such a program by default, but often more versatile programs are
used (please see the Helpdesk site for more information on different burner programs).
Since the prices, quality and usability vary for different storage media, you should be able to
choose the right media for the type of recording you need to make. The following table shows
examples of the general features and application fields of different media.
Medium Price Application Usability Reliability
USB stick EUR 5- Moving and saving files Very quick, easy Not 100%
25 reliable!
DVD EUR 1-2 Moving, saving and back-up Fairly quick, fairly Not 100%
copying of files. easy reliable!
Blu-ray disc EUR 2-5 Moving, saving and back-up Fairly quick, fairly Not 100%
copying of files. easy reliable!
USB sticks and external hard drives are used in the same way as the computer’s own hard drive,
while writing to CDs and DVDs is usually done with the help of a separate ‘burner’ program.
Whichever medium you choose, you should consider the following facts:
Different storage media may contain ‘duds.’ You may receive the announcement “Not
formatted,” for example, which in the worst case may mean that the files in the memory have
been destroyed. In such a case, please stay calm and try reading the memory on another
computer, for example. This means that it is a good idea to make backup copies of the
files on removable media every now and then!
Sometimes it takes a while for the removable medium to appear in the operating system. Do
not panic, but wait calmly for the medium to appear.
When unplugging the removable medium from your computer, make sure you have
closed all files on the storage medium (removing the medium may damage the open file).
Remember to remove storage media safely with the help of the so-called Safely Remove
Hardware function: this is done by clicking the green icon in the image (A) below with your
primary mouse button, and choosing the media you want in the menu that opens up (B).
Whatever storage method or media you use, please do not forget to make backup copies of your
files regularly. None of the storage media (USB sticks, DVDs, CDs etc) are 100% safe! More
information on backup copying.Peripheral devices
Printers
The most common types of printers are laser printers and inkjet printers. Standard desktop
printers are usually used at home (see picture below). Some desktop printers can also be used for
scanning and copying. Such printers are also called multi-function printers.
The kinds of bigger printers found e.g. at the university (see picture below) are often multi-function
printers. In addition to network printing, they can be used for copying, scanning images as image
JPGR Basic Computer Troubleshooting textbook 2021
14
files and reading books directly into text files, for example, thanks to the optical character
recognition properties offered (OCR, see below for more information). If the printer is connected to
the network, you can order it to send the scanned files to an e-mail address.
Further general information on printing can be found at the end of this chapter. Printing in the HY
environment is discussed in chapter two of the materials.
Image scanners
With a scanner, you can “read” or scan a printed document into digital form. With a flatbed scanner,
you can scan e.g. photos and text.
Flatbed scanners are used as follows:
1. place the image or document on the glass bed of the scanner
2. start a scanning program on your computer
3. with the scanning program, outline the area to be scanned
4. specify the resolution you want (please see more information)
5. scan the area you have chosen, either directly into the program you want or save the image
as a separate file.
You can scan text with the scanner and convert the text directly into a format that can be modified
in a word processor. For this, you will need an OCR (Optical Character Recognition) program,
which is usually provided with the scanner.
Softwares:
Operating system and user interface
As already mentioned, in addition to the hardware, a computer also needs a program to control the
devices. This program is called an operating system, OS. This page will discuss the following:
There are different kinds of operating systems: such as Windows, Linux and Mac OS
JPGR Basic Computer Troubleshooting textbook 2021
15
There are also different versions of these operating systems, e.g. Windows 7, 8 and 10
Operating systems can be used with different user interfaces (UI): text user interfaces
(TUI) and graphical user interfaces (GUI) as examples
Graphical user interfaces have many similarities in different operating systems: such
as the start menu, desktop etc.
When you can recognize the typical parts of each operating system’s user interface, you will mostly
be able to use both Windows and Linux as well as e.g. Mac OS.
Why an OS is important for the computer
An OS (operating system) is a set of programs which ensure that the computer and its programs
(the hardware and the software) are working together. Among other things, the OS enables the
following:
– The computer starts to check the functionality of its parts and any devices connected to it, and
starts to look for the OS on its storage devices (hard drives or memories).
– If the OS is discovered, BIOS starts to load the OS into the RAM (Random Access Memory).
– When the OS has loaded, the computer waits for commands from you.
Different operating systems
Over the years, several different operating systems have been developed for different purposes.
The most typical OSs in ordinary desktop computers and laptops are Windows, Linux and Mac OS.
Windows
Windows is a commercial OS that uses windows to execute programs: each program has its own
window, and you can have several programs open at the same time. Windows is the most popular
OS for home PCs, and there are several versions of it. The newest version is Windows 10.
Mac OS X
Apple’s Mac computers have their own operating system, OS X. Most of the same programs are
available for computers that use OS X as for PCs, but the exact same programs cannot be used in
these two types of computers: the Mac version of the Microsoft Office suite cannot be installed on a
Windows computer, for example. You can install other operating systems on Mac computers, but
the OS X operating system is only available for computers made by Apple. Apple’s lighter portable
devices (iPads, iPhones) use a light version of the same operating system, iOS.
Mac computers are popular because OS X is considered fast, easy to learn and very stable and
Apple’s devices are considered well-designed – although rather expensive. Please see the additional
reading material for more information on OS X.
Android
Android is an operating system designed for phones and other mobile devices. Android is not
available for desktop computers, but in mobile devices, it is an extremely popular operating system:
more than a half of all mobile devices in the world run on Android.
User interfaces
A user interface (UI) is the part of an operating system, program or device that the user uses to
input and receive data. A text user interface (TUI, see the image to the left below) shows text, and
its commands are usually written from the keyboard to the command line. The functions
of graphical user interfaces (GUI, right-hand image below) are carried out by clicking and moving
buttons, icons and menus with the mouse.
text UI | graphical UI
If you look closer at the above images, you will see that they contain the same information: the
directory list of one of the computer’s directories, so note that you can often carry out the same
tasks with a computer regardless of which kind of UI you are using.
If you wish, you can use most operating systems with a text user interface. In this case, you will give
the commands as text (e.g. “cat tale.txt”), or by controlling the UI menus, scroll bars, and other
structures with the arrow keys and other keys.
In Windows 7, you can access a command prompt by following this procedure: open theStart
menu and type cmd in its search field. Then press Enter on the keyboard to launch the command
prompt in a separate window. With the command prompt, you can type your commands from the
keyboard rather than using the mouse.
Standby, Sleep, Suspend: sets the computer in a state from which you can quickly return
to using open programs and files. Some power is expended in the standby state, but it is less
than with normal computer usage. The advantage of standby over hibernation is that it is
quicker to return to using the computer. Starting and ending the standby state is also done
through the Start menu.
For periods longer than a few hours (e.g. over night), it is recommendable to shut down the
computer entirely via the Shut down function. Accordingly, if the computer ‘freezes,’ it is always
If you want to change which features and programs you can see in the start menu, click on Start
with your secondary mouse button, then select Properties from the menu that opens. Open the Start
menu tab and click on Customize. You can select the features you want to see in your start menu
from the window that opens. When you have finished, click on OK to continue.
The task bar
Among other things, the task bar shows which programs are currently running. You can alternate
between programs by clicking the button of the program you want. In the following image, the
programs running are the Mozilla Firefox browser and the graphics programPaint Shop Pro.
Desktop
When your computer operating system has loaded, you will see the Desktop on the screen. On the
desktop, you will usually find various icons for managing and starting different programs. The
desktops of different operating systems are usually slightly different graphically; below left shows a
Windows 7 desktop, below right shows a Linux (UHL RedHat) desktop.
Windows desktop | Linux desktop
Depending on the settings and instalment, the desktop usually contains the following icons:
a link to the storage folder for your own files (My Documents, Home etc): please note that
the folder itself may be located on the net rather than on the computer.
the recycle bin: storage for discarded data.
start icons for different programs: you can open programs from these icons. Please note
that you can add your own icons to the desktop. These icons, also known as shortcuts, can be
added in Windows 7 by “dragging” the icon you want with the mouse from the source
location (e.g. the Start menu) to the desktop.
Projects that you have saved (e.g. a set of slides) are saved as files on your computer. The file
content is shown by its icon and name. The following icons show some of the most common file
types and their icons. By double clicking a file icon, you will start the program that has been used to
create the contents of the file (please see file types for more information). This will open the file in
the program automatically.
JPGR Basic Computer Troubleshooting textbook 2021
20
Programs – or rather, program files – also have their own icons, which are usually individually
dedicated. You can start the program by double clicking the program icon. You can see some
program icons below.
Programs installed on the computer often create a shortcut icon on the desktop, making it easier to
start and find the program.
The shortcut is not the original file, nor a copy of it, but rather a link to a program file located
elsewhere. If you remove the shortcut, nothing will happen to the program it is linked to.
You will recognize a shortcut from the arrow symbol in the bottom left corner of the icon (see
above). By double-clicking the shortcut, the item linked to it will open up.
Buttons
When using different programs, you will often be required to confirm the choices you have made.
For this end, the dialog boxes of the programs contain buttons with which to confirm your choice.
The buttons OK and Cancel come up for most actions, but the dialog box also often shows an Apply
button as shown below. By clicking this button, you will see what clicking OK would result in, so
you could say Apply is a sort of preview function.
The button alternatives of different dialog boxes often vary a bit. Below is an example of a dialog
box without the Apply function mentioned above. Instead, the program offers the user a Help
function.
Display settings
JPGR Basic Computer Troubleshooting textbook 2021
23
The appearance of your operating system depends on its settings. The image may be e.g. very good
or extremely poor. Since the previous user may have set the display settings incorrectly (e.g. the
picture resolution may be incorrect, in which case the picture looks fuzzy), it will be useful for you
to know how to set the display according to your needs.
By changing your operating system settings, you can affect e.g. the resolution, font size and power-
management settings of the display. The following images (you can enlarge the images by clicking
them) show the most important display settings in Windows 7. You can access them by clicking on
the Appearance and Personalization icon in the control panel:
By selecting Change Screen Saver, you can specify screen-saver and power-
management settings. You can improve the battery life of a portable
computer, for example, by specifying it to use power-saving settings with
the Power feature.
Under the header Display you will find the most important settings of the
display. This view contains specification of e.g. the display resolution
(Adjust resolution), which is measured in vertical and horizontal pixels. The
display resolution may be e.g. 1920×1080; this means that the image
consists of 1920 pixels horizontally and 1080 pixels vertically.
All displays have a so-called native resolution, i.e. a certain pre-set resolution that gives the best,
sharpest image in that display. The typical resolution in modern desktop displays is 1920×1080,
or Full HD. Laptop displays may have smaller resolutions. You can find the native resolution of
your display by referring to its user manual.
You can change the resolution by moving the Resolution slider to the setting you want. The larger
the number you choose, the more well-defined but smaller will the elements on the screen be
(please also note that different programs have their own zoom features that are separate from this
setting). You can also change the number of colours your display uses: depending on computer,
display and operating system, the number of colours can vary from a few hundred up to several
million.
Volume control
In order to listen to web files and other material e.g. in connection with your studies, your
computer needs to be connected with loudspeakers or headphones. Most loudspeakers have their
own button for volume control and power, so before adjusting the volume settings of your
operating system, you had better check those of the loudspeakers.
The following example shows the volume control window of Windows 7, which allows you to
change the settings for volume and sound. The easiest way to open this window is to click on the
loudspeaker icon on the right in the taskbar and select Mixer from the window that opens. You can
also often control the sound settings from your keyboard.
In Windows 7, you can check how much free space there is on your hard drive as follows: double-click
on Computer in the Start menu. The opening window shows your the disk space available on the
storage devices in your computer both in numbers and as a horizontal bar: the blue part shows the
space in use and the white part free space left (see the example image below).
Removing a program
The word network can be used to describe a very large and complicated set of equipment. In its
most accurate and simplest definition a network refers to the cables and electronic components
that amplify the signals going through the cables. The amplifying equipment is necessary to ensure
accurate communication and make the signal stronger if it needs to go long distances.
In a network, computers and other (optional) devices are connected to share resources. When a
computer or device A is requesting a resource from another computer or device B, the item A is
referred to as a client. Because all or most items that are part of a network live in association or
cooperation, almost any one of them can be referred to as a client. Based on this, there can be
different types of clients.
Before building a computer network, you should plan it. In some cases, you may want to use one
or more computers you already have, or you are can purchase new computers.
Monitors
A monitor is a display that a user looks at when performing daily assignments:
You can buy a monitor from a computer store or from a web store.
JPGR Basic Computer Troubleshooting textbook 2021
28
When purchasing a monitor, keep in mind that users may stare at it
all day long. You should put as much care as possible when acquiring
one.
After getting the card, you must install it by shutting down the computer, opening the computer,
and inserting the card in an appropriate slot. In most cases, the installation is very easy because,
after inserting the car and turning on the computer, the machine should recognize the card. You
have the choice of replicating the same view on both monitors or showing a different view on
each monitor.
Printers
If you want you (or your users) want to be able to print, you can use an existing printer or
purchase a new one. The simplest printers will be attached to one computer and "shared" to
allow other computers to access it. Many printers used nowadays in a home or small network are
wireless, which means they don't use cable to connect to the network. If you want to use such a
printer, first purchase and the installation is usually easy.
Broader Definition:
When many people talk about a network, they are talking about a network using a very broad
concept. For instance if someone cannot get to their email, they may say "the network is down".
Likewise they may say this if they cannot surf the internet or get to their files. They may not stop to
think that in each specific instance there is a single piece of equipment that may provide the
capability which they are trying to use.
Most people who work on a corporate or organizational network think about the network in
component parts. The three main parts are:
Services
Services include:
Email service
File service - Allows users to use and share file space on a computer with a lot of file space.
Print service - Allows printing to printers connected on the network.
Web surfing - Allowing someone to open web pages and see web sites on the internet.
Filtering out undesired sites on the internet.
Allowing someone to access the network from the outside (from home).
Updating virus definitions on workstations.
Allowing someone to log onto the network.
Even giving a workstation an address on the network is a service. If your computer does not
have an address, it cannot access the internet or any other resource on the network.
A Typical Network
Of
course there are variations on this network layout and some details have been left out for the sake
of simplicity but this drawing should give you some idea about what goes on behind the scene on
The private network is of course the most secure part of the network. There are several servers on
this network including:
A login server (called a domain controller) which controls everyones permissions and
access to the network resources such as files. Without this server, they cannot login to the
network.
An address server (called a DHCP server) which provides addresses to computers on the
network so they can communicate as discussed earlier.
A file server which provides common files and a private folder for users.
A remote access server which allows users to connect to the network by telephone from the
outside.
Conclusion
Knowing the above information, if someone cannot get their mail, they may think the network is
down. This is not likely to be the case. The mail server may be down but the network is not likely to
be down. The same goes for when someone can't surf the web. There may be a problem with the
firewall or the line connecting to the internet, but it is unlikely that the whold netwlrk is down.
When problems are noticed it is best for the user to describe what they were trying to do and what
happened
Network Distribution
Introduction
Network Cables
Cable is used to connect computers. Although we may use wireless
networking, you should always have cables with you. The most
commonly used cable is referred to as Category 5 cable RJ-45. The
ends of the cable appear as follows:
A hub is rectangular box that is used as the central object on which computers and other devices
are connected. To make this possible, a hub is equipped with small holes called ports. Here is an
example of a hub:
When configuring it, you connect an RJ-45 cable from the network card of a computer to one port
of the hub.
In most cases for a home-based or a small business network, you may not need (or shouldn't use)
a hub.
Routers: Wired or Wireless
Like a hub, a router is another type of device that acts as the central point among computers and
other devices that are part of a network. Here is an example of a wired router:
What this card looks like may not be particularly important and
it may depend on the manufacturer but some of its aspects are
particularly important. To start, there are two types of cards and
you should know which one is suited (or which one you want to
use) for your computer. One type of NICs uses a peripheral
component interconnect (PCI) connection. Another type uses
industry standard architecture (ISA).
There are two primary ways you replace an internal network card. In most cases, you will remove
the card your computer already has and install a new one. In some other cases, you will only add
a new card but you cannot replace the existing one because it is part of the motherboard. The
area where you add a network card is called a slot.
To proceed, you must find out what your computer has to offer when it comes to network cards.
To do this, you have three main alternatives. You can open the computer and examine the
available slots of your computer. They are usually located inside of what would be considered as
the back wall of the computer. If you know where you connect the monitor, you should be able to
locate the area that has the slots. Unfortunately, unless you have experience with this, simply
looking at the slots will not tell you what type of connection you are dealing with.
The second alternative is to open the manual that came with your computer (provided you
haven’t thrown it away). The manual usually lists the (types of) slots that your computer
provides and where they are located.
IP Addressing Overview
Introduction
This lab will help you develop an understanding of IP addresses and how TCP/IP networks
operate. IP addresses are used to uniquely identify individual TCP/IP networks and hosts
(computers and printers) on those network in order for devices to communicate. Workstations
and servers on a TCP/IP network are called "HOSTS" and each will have a unique IP address
which is referred to as its "HOST" address. TCP/IP is the most widely used protocol in the
world. The Internet or World Wide Web uses only IP addressing. In order for a host to access
the Internet, it must have an IP address.
In its basic form, the IP address has two parts; a Network Address and a Host Address. The
network portion of the IP address is assigned to a company or organization by the Internet
Network Information Center (InterNIC). Routers use the IP address to move data packets
between networks. IP Addresses are 32 bits long (with current version IPv4) and are divided
into 4 octets of 8 bits each. They operate at the network layer, Layer 3 of the OSI model, (the
Internetwork Layer of the TCP/IP model) and are assigned statically (manually) by a network
administrator or dynamically (automatically) by a Dynamic Host Configuration Protocol
(DHCP) Server. The IP address of a workstation (host) is a "logical address" meaning it can be
changed. The MAC address of the workstation is a 48-bit "physical address" which is burned
into the NIC and cannot change unless the NIC is replaced. The combination of the logical IP
address and the physical MAC address help route packets to their proper destination.
There are 5 different classes of IP addresses and depending on the class, the network and
host part of the address will use a different number of bits. In this lab you will work with the
different classes of IP addresses and become familiar with the characteristics of each. The
understanding of IP addresses is critical to your understanding of TCP/IP and Internetworks in
general.
Review IP Address Classes and Their Characteristics
There are 5 classes of IP addresses (A thru E). Only the first 3 classes are used commercially.
We will discuss a class A network address in the table to get started. The first column is the
class of IP address. The second column is the first octet which must fall within the range shown
for a given class of address. The class A address must start with a number between 1 and 126.
The first bit of a class "A" address is always a zero meaning the High Order Bit (HOB) or the 128
bit cannot be used. 127 is reserved for loop back testing. The first octet alone defines the
network ID for a class A network address. The default subnet mask uses all binary ones
(decimal 255) to mask the first 8 bits of the class A address. The default subnet mask helps
routers and hosts determine if the destination host is on this network or another one. Since
JPGR Basic Computer Troubleshooting textbook 2021
40
there are only 126 class A networks, the remaining 24 bits (3 octets) can be used for hosts. Each
class A network can have 2^24 power (2 to the 24th power) or over 16 million hosts.
The network or host or host portion of the address can not be all ones or all zeros. As an
example, the class A address of 118.0.0.5 is a valid IP address since the network portion (first
eight bits equal to 118) is not all zeros and the host portion (the last 24 bits) is not all zeros or
all ones. If the host portion were all zeros it would be the network address itself. If the host
portion were all 1's it would be a broadcast for the network address. The value of any octet can
never be greater than decimal 255 or binary 11111111.
Cls 1st 1st Network / Default Number of Hosts per
Octet Octet Host ID Subnet Mask Networks Network(usable
Decima High (N=Network addresses)
l Range Order , H=Host)
Bits
A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (27 – 2) 16,777,214 (2 24 – 2)
14
B 128 – 10 N.N.H.H 255.255.0.0 16,382 (2 - 2) 65,534 (2 16 – 2)
191
C 192 – 110 N.N.N.H 255.255.255.0 2,097,150 (221 – 2) 254 (2 8 – 2)
223
D 224 – 1 1 1 0 Reserved for Multicasting
239
E 240 – 1 1 1 1 0 Experimental, used for research
254
* Class A address 127 cannot be used and is reserved for loopback and diagnostic functions
Equipment:
Windows 7 Workstation
Your task in this lab is to:
Print out the attached PDF file. ---> IP Addressing Overview
Answer all of the questions on the PDF file.
Turn in the completed PDF file to your instructor.
“Reviewer”
This provides examples, hint and basic outline of the examination of TESDA in Computer Hardware
and Servicing NC II
- Prepare the computer case (Install power supply, I/O shield and spacers)
- Install drives (DVD, Floppy and HDD)
- Install the CPU, fan, heat sink and memory module on the motherboard
- Install the motherboard into the casing and expansion cards
- Install the cablings (Power connectors, FDD Connector, IDE/SATA Connector, USB
headers and system panel header).
- Attach the monitor, keyboard, mouse and plug into a power source.
- Troubleshoot if necessary
- Assemble and install network connection
The type of operating system to be installed might change overtime. For LAN cable colour
coding memorize the pairings below.
- Start > Settings > Control Panel > System > Computer Name tab >
Change Tab > Type new Computer Name and Workgroup > OK, OK, OK,
restart
- Start > Settings > Control Panel > Printer and Faxes > Add Printer
(Printer Tasks) > Add Printer Wizard >Next > Select “A network printer,
or …. “ > Next > Browse Printer > Next > Select Installed Network Printer
> Next > Yes > Finish!
- Right click folder to share > Properties > Sharing Tab > Network Sharing
and Security(Click “If you understand the Security Risk…”) > Just Enable
Sharing > OK > Select share this folder on the network > OK
SHARING PRINTER
- Start > Settings > Control Panel > Printer and Faxes > Right Click
Installed Printer > Sharing > Share this printer > OK
6. QUESTIONING/INTERVIEW (Oral)
- Most of the questions will be on troubleshooting but anything around the subject matter
can be asked. You also need to master the parts of the computer particularly of the Main
Circuit Board or the Mother Board and their specific functions and cable colour-coding.
Parallel port
VGA port
FDDcontroller
Central Processing Unit (CPU) – Interpret and carries out basic instructions that operate a
computer
Heat Sink – Components with fins that cools processor used by thermal paste.
Random Access Memory (RAM) – Memory chips that can be read from and written to by
processor. Also called main memory or primary storage, most RAM is volatile; information inside
it is lost when computer’s power is turned off.
JPGR Basic Computer Troubleshooting textbook 2021
55
Read Only Memory (ROM) – Memory chips that store permanent data and instructions. Non
volatile memory, information in ROM is not lost when the computer power is off.
Basic Input Output System (BIOS) – The first program to run when you turn on your
computer. It is stored in ROM chip on the motherboard.
Complementary Metal Oxide Semiconductor ‐ Stores date, time and computer start up
information. Maintain by a small battery after you turn the computer off.
Adapter Card – Enhances system unit or provides connections to external devices called
peripherals; also called expansion card.
Expansion Slot – An opening or socket on the motherboard that can hold adapter card.
BASIC TROUBLESHOOTING
- 5’S
Sort – Clearly distinguish needed items from unneeded and eliminate the latter.
Straighten – Keep needed items in the correct place to allow for easy and
immediate retrieval
JPGR Basic Computer Troubleshooting textbook 2021
56
Shine – Keep the workplace neat and clean
Standardize – The method by which sort, straighten, shine are made habitual.
Sustain – Maintain established procedures
Q – You have just installed Windows 98. During the testing, it fails to start after the “Starting
Windows 98” message appears. What should you do to troubleshoot this problem? Name at least
two ways.
A – Type Win /d:m at the command prompt to start windows, or press F8 when windows restarting
and select safe mode.
Q – You have configured a dual boot system consisting Windows 98 in FAT 32 partition and
Windows 2000 using NTFS partition. You check your Windows 2000 installation and it looked
good. However, when you boot to Windows 98 you can’t see the files in the NTFS partition. What
might be the source of the problem?
Q – You successfully install Windows 2000 Professional and you want to check your drives for
errors. Name one way of checking for errors
A – Open control panel, click administer tool, click computer management and within the storage
tab click disk defragmenter
Q – You want to setup a dual boot scenario between Windows 98 and Windows 2000. How would
you do this?
A – Partition your hard drive. Install Windows 98 first and then install Windows 2000 to the second
partition.
Q – A customer complains that his hard disk is making lots of noise. After examining the computer
and hearing the noise for yourself, you notice that high pitch noise seems to be coming from the fan
in the power supply. Which component should be replaced?
A – Power Supply
A – FUSER
Q – A customer complains that he can’t get his computer to work. When he turn it on, there is no
video and hears a series of beeps. The beeps are in the sequence of one long beep, then two short
beeps. You tell the customer to bring the machine in. Upon further examination you are able to
identify the problem. What should be your next step? What is the error?
A – Bad memory. Most of the error begins with 2 indicate memory error of some sort.
Q – What two command files are used by DOS to configure the computer?
Q – You install a newly purchase sound card into your computer, but upon rebooting you find that
the new device is not recognized by the system. Moreover, your modem, which has always worked
perfectly, has stopped functioning. What is probably the problem?
Q – What is the correct way to use the protocol utility IPCONFIG in a Windows 2000 environment?
A – Choose start, click run and type cmd then press enter key. At the command prompt type
IPCONFIG
A – Choose start > Programs > Then Accessories > Then System Tools > Then Backup.
Q – You’ve setup a network whereby each computer act as a client and a server and in which each
user shares each other’s resources, including printers. What is the correct term for such
arrangement?
Q – Sending and receiving electronic mail (e-mail) is a common benefit of the internet. Assuming a
user has access to the internet on a properly configure PC. What is needed before a user can begin
using e-mail?
Q – What is the name of the executable file for Microsoft Backup FOR dos? For Windows 3.x?
A – MSBACKUP.EXE
Q – What would you type at a DOS command line to start the Microsoft Anti-Virus?
Q – What program in the control panel can be used to create a start-up disk?
A – Compatibility test
Q – The MSBACKUP Program in DOS receives its settings from what file?
A – SET file
A – Disk Administrator
Q – Which is the proper command to install Windows 2000 recovery console as a start-up option in
the CD Rom in drive E?
A – E:\i386\winnt32.exe /cmdcons
Q – During the Windows 2000 setup, you are asked to choose between NTFS file system and the
FAT file system. Can you site disadvantage on NTFS?
A – NTFS is more sophisticated file system however it is not compatible with DOS.
Q – After the successful upgrading to Windows 2000, what should you do with the temporary files
generated during the setup process?
A – Nothing. Because all generated temporary files are automatically remove during the process.
Q – You are preparing the computer for dual booting between Windows 98 and 2000. Your drive is
partitioned, and Windows 98 is already installed. What should be your next step?
Q – Which of the following is not the Windows 2000 key Boot file? Why?
A – Autoexec.bat – This is the key boot for Windows 3.1 and 9x are not necessary for Windows
2000
Q – What is the most likely cause of a paper jam on a dot matrix printer?
Q – HP printer laser jet III printer is not printing at all. The computer indicates that the “device on
LPT1 is not ready”. You perform a service self test to the printer and it prints on the page of vertical
A – The Formatter
Q – A computer is experiencing random reboots and phantom problems that disappear after reboot.
What should you do?
Q – Using either a Windows 9X or Windows 2000 workstation, what components do you need to
connect to a Microsoft network server?
Q – You are enable file and printer sharing on your Windows 9X system. You must now specify how
security will be handled. What could be the options?
Q – A Windows 9x workstation includes default support for what network OS/client types?
A – MS Windows Networking and Novell’s Netware within a Windows 9x workstation, clients are
provided for Microsoft and Novell Network
Q – What is the third element required to configure a Windows 2000 system as a network client? A
client, an adapter, and ___?
A – Protocol
Q – What would you need to do to create a new dial-up networking (DUN) connection within a
Windows 9x system?
A – Choose Start > Programs > Accessories , then choose and click Dial up networking then double
click “Make new connection” or double click “My computer” icon on the desktop then click dial up
networking