(Kertas Penerangan) : Information Sheet
(Kertas Penerangan) : Information Sheet
(Kertas Penerangan) : Information Sheet
INFORMATION SHEET
Muka / Page : 1
NO. KOD / CODE NUM. IT-020-3:2013/C01/P(1/2)
Drpd/of : 44
Page 1 of 45
PENERANGAN/INFORMATION:
Historical/Conceptual
How the PC Works
You’ve undoubtedly seen a PC in action: a nice, glossy monitor displaying a picture
that changes according to the actions of the person sitting in front of it, typing away
on a keyboard and clicking on a mouse. Sound pours out of tiny speakers that flank
the screen, and a box whirs happily beneath the table.
Ever heard of Morse code? Morse code is nothing more than dots and dashes to
those who do not understand it, but if you send dots and dashes (in the right order)
to someone who understands Morse code, you can tell the recipient a joke. Think of
programming as Morse code for the computer. You may not understand those ones
and zeros, but your computer certainly does!
Computer musing that a string of ones and zeros makes perfect sense. There’s more
to the ones and zeros than just programming. All of the data on the computer—the
Web pages, your documents, your e-mail—is also stored as ones and zeros.
Programs know how to translate these ones and zeros into a form humans
understand.
Page 2 of 45
Programming comes in two forms. First are the applications: the programs that get
work done. Word processing programs, Web browsers, and e-mail programs are all
considered applications. But applications need a main program to support them.
They need a program that enables you to start and stop applications, copy, move,
and delete data, talk to the hardware, and perform lots of other jobs. This program is
called the operating system (OS). Microsoft Windows is the most popular OS today,
but there are other computer operating systems, such as Apple Mac OS X and the
popular (and free) Linux. Computer people lump operating systems and applications
into the term software to differentiate them from the hardware of the computer.
Figure 1: Desktop
Laptop
o Ultra book
Ultrabooks are a new category of notebook computers that seeks to fill the
gap between lightweight laptops and tablets. Intel dubbed the ultrabook
category when it announced it would be directing its mobile computing
efforts towards a new class of laptops that would offer an extremely thin
(less than 20 millimeters, or 0.8 inches) and lightweight profile to go along
with high-powered, low voltage processors in the Sandy Bridge or Ivy
Bridge families, long battery life, near instant-on and instant-resume
capabilities, and fast storage, typically via solid state disk drives (SSDs).
Page 3 of 45
Figure 2: Ultra book
o Net
A small portable computing device, similar to a notebook. However, it has a
smaller form factor and comes with more limited features. What
differentiates a netbook from a notebook is its physical size and computing
power.
A netbook typically has a small display, ranging from 7 to 10 inches. It
weighs under 3 pounds, and support a keyboard that is reduced in size
from 75 to 80 percent when compared to a standard keyboard. Netbooks
have build-in Wi-Fi, Ethernet, USB ports and slots for flash memory cards.
To keep the devices small and compact, netbooks do not have a CD or
DVD drive, and most use solid-state disks (SSD) for storage. Netbooks
commonly run Linux or Windows XP Home edition operating systems.
Page 4 of 45
Thin client
In client/server applications, a client designed to be especially small so that the
bulk of the data processing occurs on the server.
Although the term thin client usually refers to software, it is increasingly used
for computers, such as network computers and Net PCs that are designed to
serve as the clients for client/server architectures. A thin client is a network
computer without a hard disk drive, whereas a fat client includes a disk drive.
Page 5 of 45
o Productivity suite:
Licensed
Open source
o Application :
Licensed - Proprietary software or closed source software is computer
software licensed under exclusive legal right of the copyright holder with
the intent that the licensee is given the right to use the software only
under certain conditions, and restricted from other uses, such as
modification, sharing, studying, redistribution, or reverse engineering.
Usually the source code of proprietary software is not made available.
Open source - Open-source software (OSS) is computer software with
its source code made available and licensed with a license in which the
copyright holder provides the rights to study change and distribute the
software at no cost to anyone and for any purpose. Open-source
software is very often developed in a public, collaborative manner.
Open-source software is the most prominent example of open-source
development and often compared to (technically defined) user-
generated content or (legally defined) open-content movements.
Page 6 of 45
iii.Computer system work function:
Administrative works
Multimedia
Engineering works
Sales
iv.Mobility requirement:
Mobile: Mobile devices, such as portable computers, have needs that differ
from those of desktop computers, notably the need to consume as little
electricity as possible. This helps in two ways: extending battery charge and
creating less heat. Both Intel and AMD have engineers devoted to making
excellent mobile versions of their CPUs that sport advanced energy-saving
features (see Figure 6-21). Intel’s SpeedStep technology, for example,
enables the CPU to run in very low power mode and scale up automatically if
the user demands more power from the CPU. If you’re surfing the Web at an
airport terminal, the CPU doesn’t draw too much power. When you switch to
playing an action game, the CPU kicks into gear. Saving energy by making the
CPU run more slowly when demand is light is generically called throttling.
v. User’s venue
Internal
External
Page 7 of 45
1. Computer set-up tools, computer hardware parts and computer software:
Modern CPUs generate a lot of heat and thus require a cooling fan and heat sink
assembly to avoid overheating (see Figure 3-36). A heat sink is a big slab of copper
or aluminum that helps draw heat away from the processor. The fan then blows the
heat out into the case. You can usually remove this cooling device if you need to
replace it, although some CPU manufacturers have sold CPUs with a fan
permanently attached.
Page 8 of 45
CPUs have a make and model, just like automobiles do. When talking about a
particular car, for example, most people speak in terms of a Ford Taurus or a Toyota
Camry. When they talk about CPUs, people say Intel Core i7 or AMD Phenom. Over
the years, there have been only a few major CPU manufacturers, just as there are
only a few major auto manufacturers. The two most common makes of CPUs used in
PCs are AMD and Intel. Although only a few manufacturers of CPUs have existed,
those manufacturers have made hundreds of models of CPUs. Some of the more
common models made over the past few years have names such as Core 2 Duo,
Core i5, Core i7, Phenom II, and AMD-FX. Finally, CPUs come in a variety of
packages. The package defines how the CPU looks physically and how it connects
to the computer. Intel CPUs currently use a package type called land grid array
(LGA), and AMD likes pin grid array (PGA). Every CPU package type has a number
of versions, and each package type is designed to fit into a particular connection
called a socket. Sockets have such names as Socket AM3 or Socket B.
Intel and AMD have built in support for running more than one operating system at a
time, a process called virtualization. Virtualization is very cool.The key issue from a
CPU standpoint is that virtualization used to work entirely through software.
Programmers had to write a ton of code to enable a CPU—that was designed to run
one OS at a time—to run more than one OS at the same time. Think about the
issues involved. How does the memory get allocated, for example, or how does the
CPU know which OS to update when you type something or click an icon? With
Page 9 of 45
hardware-based virtualization support, CPUs took a lot of the burden off the
programmers and made virtualization a whole lot easier.
Parallel Execution
Modern CPUs can process multiple commands and parts of commands in parallel,
known as parallel execution. Early processors had to do everything in a strict, linear
fashion. The CPUs accomplish this parallelism through multiple pipelines, dedicated
cache, and the capability to work with multiple threads or programs at one time. To
understand the mighty leap in efficiency gained from parallel execution, you need
insight into the processing stages.
Selecting a CPU
When selecting a CPU, you need to make certain you get one that the motherboard
can accommodate. Or, if you’re buying a motherboard along with the CPU, then get
the right CPU for the intended purpose. You need to have a lot more knowledge of
all the pieces around the CPU to get the full picture, so we’ll wait until then to discuss
the “why” of a particular processor. Instead, this section assumes you’re placing a
new CPU in an already-acquired motherboard. You need to address two key points
in selecting a CPU that will work. First, does the motherboard support Intel or AMD
CPUs? Second, what socket does the motherboard have?
Just as Intel and AMD make many types of CPUs, motherboards are manufactured
with various different types of sockets.
Page 10 of 45
Intel-based sockets
AMD-based sockets
Page 11 of 45
Figure 5 : RAM
o Motherboard - The motherboard is the main circuit board of a computer. It
contains the central processing unit (CPU), the Basic Input/Output System
(BIOS), memory, mass storage interfaces, serial and parallel ports,
expansion slots, and all the controllers for standard peripheral devices like
the keyboard, disk drive and display screen.
Figure 6: Motherboard
o Hard disk - A hard disk drive (HDD) is a data storage device used for
storing and retrieving digital information using rapidly rotating discs
(platters) coated with magnetic material. An HDD retains its data even
when powered off. Data is read in a random-access manner, meaning
individual blocks of data can be stored or retrieved in any order rather than
sequentially. An HDD consists of one or more rigid ("hard") rapidly rotating
Page 12 of 45
discs (platters) with magnetic heads arranged on a moving actuator arm to
read and write data to the surfaces.
Figure 7: Hardisk
Page 13 of 45
Assuming your system meets the requirements, you next need to find out how well
Windows supports the hardware and software you intend to use under Windows.
You have three sources for this information. First, the Setup Wizard that runs during
the installation does a quick check of your hardware. Microsoft also provides a free
utility, usually called Upgrade Advisor, which you can run on a system to see if your
hardware and software will work with a newer version of Windows. Second,
Microsoft provides Web sites where you can search by model number of hardware or
by a software version to see if it plays well with Windows. Third, the manufacturer of
the device or software will usually provide some form of information either on the
product box or on their Web site to tell you about Windows compatibility. Let’s look at
all three information sources.
Chips Architecture:
From roughly 1986 to around 2001, all CPUs were 32-bit. While we will save the big
discussion of what 32-bit means for Chapter 6, for now let’s keep it simple: a 32-bit
CPU can only use a maximum of 4 gigabytes (232 bytes = 4,294,967,296 bytes) of
RAM. Starting in 2001, we began to see 64-bit CPUs that could accept more than 4
gigabytes. 64-bit-capable CPUs are now the norm, while 32-bit-only CPUs are
mostly relegated to netbooks and smartphones. The leap from 32-bit to 64-bit
processing has a number of advantages. The really big compelling reason to go from
32- to 64-bit is that 64-bit CPUs support more than 4 GB of RAM. The more RAM
you have, the more programs—and the bigger the programs—your system can run.
Until fairly recently, not too many of us cared to go above 4 GB of RAM. We didn’t
need the extra RAM, and we didn’t have a CPU that could run at 64 bits. My, how
things have changed over the past few years!
o 32 bit:
The earlier 32-bit stuff had been marketed as x86, not x32, so now we have
x86 (old, 32-bit stuff) vs. x64 (new, 64-bit stuff). It’s not pretty, but do you get
the difference? To make matters even worse, however, x64 processors quite
happily handle x86 code and are, by definition, x86 processors too!
o 64 bit:
Page 14 of 45
Over successive generations of microprocessors, engineers have upgraded
many physical features of CPUs. The EDB gradually increased in size, from
8- to 16- to 32- to 64-bits wide. The address bus similarly jumped, going from
20- to 24- to 32-bits wide (where it stayed for a decade). The technological
features changed as well. Engineers added new and improved registers, for
example, that used fancy names like multimedia extensions (MMX) and
Streaming SIMD Extensions (SSE). A mighty shift started a couple of years
ago and continues to evolve: the move to 64-bit computing. Most new CPUs
support 64-bit processing, meaning they can run a compatible 64-bit
operating system, such as Windows 7, and 64-bit applications. They also
support 32-bit processing for 32-bit operating systems, such as Windows XP,
and 32-bit applications. The general-purpose registers also make the move
up to 64-bit. The primary benefit to moving to 64-bit computing is that modern
systems can support much more than the 4 GB of memory supported with
32-bit processing. With a 64-bit address bus, CPUs can address 264 bytes of
memory, or more precisely, 18,446,744,073,709,551,616 bytes of memory
that’s a lot of RAM! This number is so big that gigabytes and terabytes are no
longer convenient, so we now go to an exabyte (260), abbreviated EB. A 64
bit address bus can address 16 EB of RAM. In practical terms, 64-bit
computing greatly enhances the performance of programs that work with
large files, such as video editing applications. You’ll see a profound
improvement moving from 4 GB to 8 GB or 12 GB of RAM with such
programs.
Page 16 of 45
PCs. In text mode, VGA systems provide a resolution of 720 by 400 pixels. In
graphics mode, the resolution is either 640 by 480 (with 16 colors) or 320 by
200 (with 256 colors). The total palette of colors is 262,144.
Page 18 of 45
viii. Computer system setup tools:
Tools needed for computer system setup:
Screw driver
Multi meter - An electronic measuring instrument that combines several
measurement functions in one unit. A typical multi meter would include basic
features such as the ability to measure voltage, current, and resistance.
Anti-electrostatic wristband - Ground bracelet is an antistatic device used to
safely ground a person working on very sensitive electronic equipment, to
prevent the build up of static electricity on their body, which can result in
electrostatic discharge (ESD). It is used in the electronics industry by workers
working on electronic devices which can be damaged by ESD, and also
sometimes by people working around explosives, to prevent electric sparks
which could set off an explosion.
Vacuum cleaner – To remove dust in the computer system components.
Page 19 of 45
To ensure that the work area is cleaned and hygienic environment is maintained
while carrying the tasks.
Page 20 of 45
1. Apply a thermal pad or several rice grain
size drops of thermal paste to the exposed
portion of the processor that the heat sink
will be in contact with. If using paste, be
sure it is spread in an even thin layer across
the whole portion of the processor that will
be in contact with the heat sink. It is best to
spread the paste evenly by covering your
finger with a new clean plastic bag. This
prevents the paste from being
contaminated.
2. Align the heat sink or cooling solution above
the processor so that the clamps are in line
with the mounting points around the
processor.
3. Clamp the heat sink in place using the
proper mounting technique required by the
solution. This may be lifting a tab over a
mounting clip or screwing down the heat
sink to the board. Please refer to the
documentation for the heat sink to ensure
proper installation.
4. It is important to be careful at this stage as a
lot of pressure will be placed on the board.
A slip of a screwdriver can cause a lot of
damage to a motherboard.
5. Locate the power lead for the cooling
solution's fan and the CPU fan header on
the motherboard. Plug the cooling solution
fan power connector into the fan header on
the board. It should be keyed, but make
sure it is properly plugged in.
6. Once these steps are taken, the CPU
should be physically installed into the
motherboard for proper operation. When
Page 21 of all
45
1. Carefully position the motherboard on top of
the brass standoffs line up all the holes,
and use the screws that accompanied the
case to fasten down the motherboard. If
you are using a removable tray in your
system, slide the tray and motherboard
back into the case and then secure the tray.
Page 22 of 45
1. Install the graphics board in that slot, and
then secure the card with a screw.
2. Some graphics boards require a dedicated
connection to your computer's power
supply. If yours does, you should plug in the
correct power connector now. Some video
cards allow the insertion of a second video
card connected to the first. If you purchased
such a configuration, install and connect the
second video card.
1. Find a free PCI slot on your motherboard,
remove the adjacent slot bracket that exits
the rear of the case, and insert the Audigy 4
card (sound card) into the slot.
2. Attach the card's power cable to your power
supply and connect the external breakout
box.
3. Close the case, reconnect the PC to its AC
outlet, and power up.
Page 23 of 45
1. First, plug the large ATX power connector
(Figure 12a) from your power supply into the
matching port on your motherboard. Look
Figure X for details.
2. Locate the smaller, square processor power
connector (Figure 13) (you cannot miss it - it
is the one sprouting the yellow and black
wires) and attach it to the motherboard.
Note: your connector is usually located near
the processor. As always, refer to your
motherboard's manual for the exact
locations.
3. Use your motherboard user manual and find
the description about front-panel
connectors.
Page 24 of 45
1. Mount the DVD-ROM drive. After
connecting the ATA cable to the device,
hook it up to the power supply.
Page 25 of 45
Customised casing such as
o Cooling system:
- System Fan: 2 fans, 6 fans.
- Air-condition
o Hard disk bays
- 2 bays
- 6 bays
- 8 bays
iv. Types of computer warning alarm, such as:
Long beep
Short beep
POST Cards
Beep codes, numeric codes, and text error codes, although helpful, can sometimes
be misleading. Worse than that, an inoperative device can sometimes disrupt the
POST, forcing the machine into an endless loop. This causes the PC to act dead no
beeps and nothing on the screen. In this case, you need adevice, called a POST
card, to monitor the POST and identify which piece of hardware is causing the
trouble. POST cards are simple cards that snap into expansion slots on your system.
A small, two-character lightemitting diode (LED) readout on the card indicates which
mdevice the POST is currently testing as below figure.
Page 27 of 45
v. Types of power on self test (POST) messages, such as:
The computer power-on self-test (POST) tests the computer to make sure it
meets the necessary system requirements and that all hardware is working
properly before starting the remainder of the boot process. If the computer
passes the POST the computer will have a single beep (with some computer
BIOS manufacturers it may beep twice) as the computer starts and the computer
will continue to start normally. However, if the computer fails the POST, the
computer will either not beep at all or will generate a beep code, which tells the
user the source of the problem. Examples of messages are:
Keyboard not connected
BIOS date
Processor bus speed error
Memory module incorrect configuration
vi. Manufacturer instruction manual.
Manufacturer instruction manual is an instructional book or booklet that is
supplied with almost all technologically advanced consumer products such as
vehicles, home appliances and computer peripherals. Example of manufacturer
instruction manual is shown in figure 13 below.
Page 28 of 45
Figure 13 : Manufacturer Instruction Manual
3. Carry out computer software installation
i. Computer Operating System(OS) installation:
Types of OS and its version
o Licensed – Please refer to previous notes in page 3.
o Open source - Please refer to previous notes in page 3.
OS Licensing
o Licensed – Please refer to previous notes in page 3.
o Open source - Please refer to previous notes in page 3.
Page 30 of 45
iii.Software application installation:
Minimum installation requirement
For software installation, usually minimum requirement are needed for the PC
to support the execution of the software. Therefore in each software
installation usually the basic requirements will be based on the following
requirements:
o Hard disk space
o Memory
o Processor
o Optical drive
Installation licence key – For licensed software usually it will come together
with installation licence key. An installation licence key, also known as a
software key, is a specific software-based key for a computer program. It
certifies that the copy of the program is original. Activation is sometimes done
offline by entering the key, or with software like Windows 7, online activation is
required to prevent multiple people using the same key. Not all software has a
product key, as some publishers may choose to use a different method to
protect their copyright, or in some cases, such as open source software,
copyright protection is not used.
Computer games use product keys to verify that the game has not been
illegally copied. Likewise, one is not allowed to play online with two identical
product keys at the same time.
Page 31 of 45
Figure 15: Product Key
iv.Software update
Software Update is a free software client designed to inform you of available
software updates for your computer, so as to keep your software up-to-date.
Software Update scans your computer and notifies you if there is a program has
not been updated to the latest version. It offers you a link to update software and
other related information.
The Basic Firewall Policy Design helps you to protect the computers in your
organization from unwanted network traffic that gets through the perimeter
defenses, or that originates from inside your network. In this design, you
deploy firewall rules to each computer in your organization to allow traffic that
is required by the programs that are used. Traffic that does not match the rules
is dropped.
Page 33 of 45
and so on. This design can also be deployed together with one or more of the
other designs that add IPsec protection to the network traffic permitted.
Internet browser security setting – we can also protect our host by configuring
at the Internet browser setting.
User credential
o User account information
o Network configuration
o E-mail account
vi.Software back-up
Types of software back-up
o System setting back-up
Page 34 of 45
Figure 19: System Back
Page 35 of 45
o OS restore back-up
Page 36 of 45
Figure 22: Printer Setup
Scanner
Multi function.
Uninterrupted Power Supply (UPS)
We need to tell your system what to do during various cases of battery failure.
Our system will constantly monitor the condition of the battery, just as a laptop
does. So, if the AC power fails, presumably the UPS switches on, and our PC
keeps running. Then under the power profile fine-tune the profile:
Page 37 of 45
2. Under Select a Power Plan, choose the power plan you want. Under that
plan, click Change Plan Settings.
3. In the next dialog box, click Change Advanced Power Settings. You'll see
the dialog box shown in Figure below.
Here you can set the UPS and system behaviour for cases of power outage.
Set the Low Battery Level and the Critical Battery Level after considering your
computer's power needs and the capacity of your power supply. To make it
safe, set Critical to 10% and have the computer hibernate at that point.
Parallel cable
Serial cable
SCSI cable
Page 39 of 45
Thunder bolt
Page 40 of 45
Page 41 of 45
SOALAN/QUESTION:
1. What does BIOS provide for the computer? (Choose the best answer.)
A. BIOS provides the physical interface for various devices such as USB and
FireWire ports.
B. BIOS provides the programming that enables the CPU to communicate
with other hardware.
C. BIOS provides memory space for applications to load into from the hard
drive.
D. BIOS provides memory space for applications to load into from the main
system RAM.
3. Jill decided to go retro and added a second floppy disk drive to her computer. She
thinks she has it physically installed correctly, but it doesn’t show up in Windows.
Which of the following options will most likely lead Jill where she needs to go to
resolve the issue?
A. Reboot the computer and press the F key on the keyboard twice. This
signals that the computer has two floppy disk drives.
B. Reboot the computer and watch for instructions to enter the CMOS setup
utility (for example, a message may say to press the DELETE key). Do what it
says to go into CMOS setup.
C. In Windows, press the DELETE key twice to enter the CMOS setup utility.
D. In Windows, go to Start | Run and type floppy. Click OK to open the
Floppy Disk Drive Setup Wizard.
Page 42 of 45
4. Henry bought a new card for capturing television on his computer. When he
finished going through the packaging, though, he found no driver disc, only an
application disc for setting up the TV capture software. After installing the card and
software, it all works flawlessly. What’s the most likely explanation?
A. The device doesn’t need BIOS, so there’s no need for a driver disc.
B. The device has an option ROM that loads BIOS, so there’s no need for a
driver disc.
C. Windows supports TV capture cards out of the box, so there’s no need for
a driver disc.
D. The manufacturer made a mistake and didn’t include everything needed to
set up the device.
5. Which of the following most accurately describes the relationship between BIOS
and hardware?
A. All hardware needs BIOS.
B. All hardware that attaches to the motherboard via ribbon cables needs
BIOS.
C. All hardware built into the motherboard needs BIOS.
D. Some hardware devices need BIOS.
Page 43 of 45
7. Davos finds that a disgruntled former employee decided to sabotage her computer
when she left by putting a password in CMOS that stops the computer from booting.
What can Davos do to solve this problem?
A. Davos should boot the computer while holding the left SHIFT key. This will
clear the CMOS information.
B. Davos should try various combinations of the former employee’s name.
The vast majority of people use their name or initials for CMOS passwords.
C. Davos should find the CMOS clear jumper on the motherboard. Then he
can boot the computer with a shunt on the jumper to clear the CMOS
information.
D. Davos should find a replacement motherboard. Unless he knows the
CMOS password, there’s nothing he can do.
8. Richard over in the sales department went wild in CMOS and made a bunch of
changes that he thought would optimize his PC. Now most of his PC doesn’t work.
The computer powers up, but he can only get to CMOS, not into Windows. Which of
the following tech call answers would most likely get him up and running again?
A. Reboot the computer about three times. That’ll clear the CMOS and get
you up and running.
B. Open up the computer and find the CMOS clear jumper. Remove a shunt
from somewhere on the motherboard and put it on the CMOS clear jumper.
Reboot and then put the shunt back where you got it. Reboot, and you should
be up and running in no time.
C. Boot into the CMOS setup program and then find the option to load a plug-
and play operating system. Make sure it’s set to On. Save and exit CMOS;
boot normally into Windows. You should be up and running in no time.
D. Boot into the CMOS setup program and then find the option to load
Optimized Default settings. Save and exit CMOS; boot normally into
Windows. You should be up and running in no time.
Page 44 of 45
9. Jill boots an older Pentium III system that has been the cause of several user
complaints at the office. The system powers up and starts to run through POST, but
then stops. The screen displays a “CMOS configuration mismatch” error. Of the
following list, what is the most likely cause of this error?
A. Dying CMOS battery
B. Bad CPU
C. Bad RAM
D. Corrupt system BIOS
Rujukan/ References :
1. CompTIA A+ Certification
2. CCNA NetworkPlus
3. Jyoti Snehi. (2006). Computer Peripherals and Interfacing. Firewall Media.
ISBN-13:978-81-7008-929-2
4. Ultrabook : http://www.webopedia.com/TERM/U/ultrabook.html
5. Thin client: http://aspboss.blogspot.com/2011/02/thin-vs-thick-clients.html
6. Plu 3 pin : http://www.quadtronics.co.uk/13-amp-3-pin-plug-94-p.asp
7. Manufacturer instructional manual:
http://www.aerocool.us/images/peripheral/powerpanel/user-guide
Page 45 of 45