Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

(Kertas Penerangan) : Information Sheet

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 45

(KERTAS PENERANGAN)

INFORMATION SHEET

KOD DAN NAMA


PROGRAM /
IT-020-3:2013 - COMPUTER SYSTEM OPERATION
PROGRAM’S CODE &
NAME
TAHAP / LEVEL 3 (THREE)

NO. DAN TAJUK UNIT


KOMPETENSI /
C01 : COMPUTER SYSTEM SETUP
COMPETENCY UNIT NO.
AND TITLE

1. ANALYSE JOB ORDER/CHANGE REQUEST


2. PREPARE COMPUTER SET-UP TOOLS, COMPUTER
HARDWARE PARTS AND COMPUTER SOFTWARE
NO. DAN PENYATAAN
3. SET-UP COMPUTER HARDWARE
AKTIVITI KERJA / WORK
ACTIVITIES NO. AND 4. CARRY OUT COMPUTER SOFTWARE INSTALLATION
STATEMENT
5. SET-UP COMPUTER PERIPHERALS
6. CARRY OUT UNIT FUNCTIONALITY TEST
7. PREPARE COMPUTER SYSTEM SET-UP REPORT

Muka / Page : 1
NO. KOD / CODE NUM. IT-020-3:2013/C01/P(1/2)
Drpd/of : 44

TAJUK/TITLE : COMPUTER SYSTEM SETUP

TUJUAN/PURPOSE: THE PURPOSE OF THIS MODULE IS TO able to assemble


computer hardware, computer peripheral and installs the software and make the
computer ready to be used.

Page 1 of 45
PENERANGAN/INFORMATION:

Historical/Conceptual
How the PC Works
You’ve undoubtedly seen a PC in action: a nice, glossy monitor displaying a picture
that changes according to the actions of the person sitting in front of it, typing away
on a keyboard and clicking on a mouse. Sound pours out of tiny speakers that flank
the screen, and a box whirs happily beneath the table.

The PC is a computer: a machine that enables you to do work, produce documents,


play games, balance your checkbook, and look up the latest sports scores on the
Internet. Although the computer is certainly a machine, it’s also programming: the
commands that tell the
computer what to do to get work done. These commands are just ones and zeros
that the computer’s hardware understands, enabling it to do amazing actions, such
as perform powerful mathematical functions, move data (also ones and zeros),
realize the mouse has moved, and put pretty icons on the screen. So a computer is a
complex interaction between hardware and computer programming, created by your
fellow humans.

Ever heard of Morse code? Morse code is nothing more than dots and dashes to
those who do not understand it, but if you send dots and dashes (in the right order)
to someone who understands Morse code, you can tell the recipient a joke. Think of
programming as Morse code for the computer. You may not understand those ones
and zeros, but your computer certainly does!

Computer musing that a string of ones and zeros makes perfect sense. There’s more
to the ones and zeros than just programming. All of the data on the computer—the
Web pages, your documents, your e-mail—is also stored as ones and zeros.
Programs know how to translate these ones and zeros into a form humans
understand.

Page 2 of 45
Programming comes in two forms. First are the applications: the programs that get
work done. Word processing programs, Web browsers, and e-mail programs are all
considered applications. But applications need a main program to support them.
They need a program that enables you to start and stop applications, copy, move,
and delete data, talk to the hardware, and perform lots of other jobs. This program is
called the operating system (OS). Microsoft Windows is the most popular OS today,
but there are other computer operating systems, such as Apple Mac OS X and the
popular (and free) Linux. Computer people lump operating systems and applications
into the term software to differentiate them from the hardware of the computer.

i. Type of computer such as:


 Desktop
A desktop computer is a personal computer in a form intended for regular use
at a single location, as opposed to a mobile laptop or portable computer. Early
desktop computers are designed to lie flat on the desk, while modern towers
stand upright. Most modern desktop computers have separate screens and
keyboards.

Figure 1: Desktop

 Laptop
o Ultra book
Ultrabooks are a new category of notebook computers that seeks to fill the
gap between lightweight laptops and tablets. Intel dubbed the ultrabook
category when it announced it would be directing its mobile computing
efforts towards a new class of laptops that would offer an extremely thin
(less than 20 millimeters, or 0.8 inches) and lightweight profile to go along
with high-powered, low voltage processors in the Sandy Bridge or Ivy
Bridge families, long battery life, near instant-on and instant-resume
capabilities, and fast storage, typically via solid state disk drives (SSDs).

Page 3 of 45
Figure 2: Ultra book

o Net
A small portable computing device, similar to a notebook. However, it has a
smaller form factor and comes with more limited features. What
differentiates a netbook from a notebook is its physical size and computing
power.
A netbook typically has a small display, ranging from 7 to 10 inches. It
weighs under 3 pounds, and support a keyboard that is reduced in size
from 75 to 80 percent when compared to a standard keyboard. Netbooks
have build-in Wi-Fi, Ethernet, USB ports and slots for flash memory cards.
To keep the devices small and compact, netbooks do not have a CD or
DVD drive, and most use solid-state disks (SSD) for storage. Netbooks
commonly run Linux or Windows XP Home edition operating systems.

Figure 3: Net book vs. notebook

Page 4 of 45
 Thin client
In client/server applications, a client designed to be especially small so that the
bulk of the data processing occurs on the server.
Although the term thin client usually refers to software, it is increasingly used
for computers, such as network computers and Net PCs that are designed to
serve as the clients for client/server architectures. A thin client is a network
computer without a hard disk drive, whereas a fat client includes a disk drive.

Figure 4: Thin client


ii. Computer system software
 Computer Software - System software (or systems software) is computer
software designed to operate and control the computer hardware and to
provide a platform for running application software.
o Operating system - An operating system (OS) is a collection of software
that manages computer hardware resources and provides common
services for computer programs. The operating system is a vital component
of the system software in a computer system. Application programs usually
require an operating system to function.
 Licensed – Eg. of proprietary OS are: Windows 7, Windows 8, MAC OS.
Window server 2012, OS/2 IBM.
 Open source – E.g. of open source OS are: Linux (Ubuntu, Mint), Unix,
Open Solaris.

Page 5 of 45
o Productivity suite:
 Licensed
 Open source

o Application :
 Licensed - Proprietary software or closed source software is computer
software licensed under exclusive legal right of the copyright holder with
the intent that the licensee is given the right to use the software only
under certain conditions, and restricted from other uses, such as
modification, sharing, studying, redistribution, or reverse engineering.
Usually the source code of proprietary software is not made available.
 Open source - Open-source software (OSS) is computer software with
its source code made available and licensed with a license in which the
copyright holder provides the rights to study change and distribute the
software at no cost to anyone and for any purpose. Open-source
software is very often developed in a public, collaborative manner.
Open-source software is the most prominent example of open-source
development and often compared to (technically defined) user-
generated content or (legally defined) open-content movements.

Computer peripherals such as:

 Input: an input device is any peripheral (piece of computer hardware


equipment) used to provide data and control signals to an information
processing system such as a computer or other information appliance.
Examples of input devices include keyboards, mice, scanners, digital cameras
and joysticks.
 Output: An output device is any piece of computer hardware equipment used
to communicate the results of data processing carried out by an information
processing system (such as a computer) which converts the electronically
generated information into human-readable form. E.g. of output devices are
Monitor, Printer, speaker.

Page 6 of 45
iii.Computer system work function:
 Administrative works
 Multimedia
 Engineering works
 Sales

iv.Mobility requirement:
 Mobile: Mobile devices, such as portable computers, have needs that differ
from those of desktop computers, notably the need to consume as little
electricity as possible. This helps in two ways: extending battery charge and
creating less heat. Both Intel and AMD have engineers devoted to making
excellent mobile versions of their CPUs that sport advanced energy-saving
features (see Figure 6-21). Intel’s SpeedStep technology, for example,
enables the CPU to run in very low power mode and scale up automatically if
the user demands more power from the CPU. If you’re surfing the Web at an
airport terminal, the CPU doesn’t draw too much power. When you switch to
playing an action game, the CPU kicks into gear. Saving energy by making the
CPU run more slowly when demand is light is generically called throttling.

Desktop vs. mobile, fight!


 In-house – Need not travel or stationed at one place.

v. User’s venue
 Internal
 External

Page 7 of 45
1. Computer set-up tools, computer hardware parts and computer software:

i. Computer hardware compatibility check-up such as:


 Computer components specification:
o Processor – The central processing unit (CPU), also called the
microprocessor, performs all of the calculations that take place inside a PC.
CPUs come in a variety of shapes and sizes, as shown below:

Modern CPUs generate a lot of heat and thus require a cooling fan and heat sink
assembly to avoid overheating (see Figure 3-36). A heat sink is a big slab of copper
or aluminum that helps draw heat away from the processor. The fan then blows the
heat out into the case. You can usually remove this cooling device if you need to
replace it, although some CPU manufacturers have sold CPUs with a fan
permanently attached.

Page 8 of 45
CPUs have a make and model, just like automobiles do. When talking about a
particular car, for example, most people speak in terms of a Ford Taurus or a Toyota
Camry. When they talk about CPUs, people say Intel Core i7 or AMD Phenom. Over
the years, there have been only a few major CPU manufacturers, just as there are
only a few major auto manufacturers. The two most common makes of CPUs used in
PCs are AMD and Intel. Although only a few manufacturers of CPUs have existed,
those manufacturers have made hundreds of models of CPUs. Some of the more
common models made over the past few years have names such as Core 2 Duo,
Core i5, Core i7, Phenom II, and AMD-FX. Finally, CPUs come in a variety of
packages. The package defines how the CPU looks physically and how it connects
to the computer. Intel CPUs currently use a package type called land grid array
(LGA), and AMD likes pin grid array (PGA). Every CPU package type has a number
of versions, and each package type is designed to fit into a particular connection
called a socket. Sockets have such names as Socket AM3 or Socket B.
Intel and AMD have built in support for running more than one operating system at a
time, a process called virtualization. Virtualization is very cool.The key issue from a
CPU standpoint is that virtualization used to work entirely through software.
Programmers had to write a ton of code to enable a CPU—that was designed to run
one OS at a time—to run more than one OS at the same time. Think about the
issues involved. How does the memory get allocated, for example, or how does the
CPU know which OS to update when you type something or click an icon? With

Page 9 of 45
hardware-based virtualization support, CPUs took a lot of the burden off the
programmers and made virtualization a whole lot easier.

Parallel Execution
Modern CPUs can process multiple commands and parts of commands in parallel,
known as parallel execution. Early processors had to do everything in a strict, linear
fashion. The CPUs accomplish this parallelism through multiple pipelines, dedicated
cache, and the capability to work with multiple threads or programs at one time. To
understand the mighty leap in efficiency gained from parallel execution, you need
insight into the processing stages.

Selecting a CPU
When selecting a CPU, you need to make certain you get one that the motherboard
can accommodate. Or, if you’re buying a motherboard along with the CPU, then get
the right CPU for the intended purpose. You need to have a lot more knowledge of
all the pieces around the CPU to get the full picture, so we’ll wait until then to discuss
the “why” of a particular processor. Instead, this section assumes you’re placing a
new CPU in an already-acquired motherboard. You need to address two key points
in selecting a CPU that will work. First, does the motherboard support Intel or AMD
CPUs? Second, what socket does the motherboard have?

Just as Intel and AMD make many types of CPUs, motherboards are manufactured
with various different types of sockets.

Page 10 of 45
Intel-based sockets

AMD-based sockets

o RAM - RAM is Primary Storage, also called internal storage. Serves as


computers workspace, storing all or part of the program that is being
executed, as well as data being used by the program. RAM provides
instructions and data to the CPU. These instructions/data are coded in
bytes. Each byte is placed in a precise location in memory, called an
address. To access data or instructions in memory, the computer
references the addresses containing the bytes. The amount of memory
available is therefore measured in bytes.

Page 11 of 45
Figure 5 : RAM
o Motherboard - The motherboard is the main circuit board of a computer. It
contains the central processing unit (CPU), the Basic Input/Output System
(BIOS), memory, mass storage interfaces, serial and parallel ports,
expansion slots, and all the controllers for standard peripheral devices like
the keyboard, disk drive and display screen.

Figure 6: Motherboard

o Hard disk - A hard disk drive (HDD) is a data storage device used for
storing and retrieving digital information using rapidly rotating discs
(platters) coated with magnetic material. An HDD retains its data even
when powered off. Data is read in a random-access manner, meaning
individual blocks of data can be stored or retrieved in any order rather than
sequentially. An HDD consists of one or more rigid ("hard") rapidly rotating

Page 12 of 45
discs (platters) with magnetic heads arranged on a moving actuator arm to
read and write data to the surfaces.

Figure 7: Hardisk

 Power supply specification - A power supply is a device that supplies electric


power to an electrical load. The term is most commonly applied to electric
power converters that convert one form of electrical energy to another,
though it may also refer to devices that convert another form of energy
(mechanical, chemical, solar) to electrical energy. A regulated power supply
is one that controls the output voltage or current to a specific value; the
controlled value is held nearly constant despite variations in either load
current or the voltage supplied by the power supply's energy source.
o 110V
o 240V

Figure 8 : Power Supply

ii. Computer Operating System and software information, such as:


 Software Version:

Page 13 of 45
Assuming your system meets the requirements, you next need to find out how well
Windows supports the hardware and software you intend to use under Windows.
You have three sources for this information. First, the Setup Wizard that runs during
the installation does a quick check of your hardware. Microsoft also provides a free
utility, usually called Upgrade Advisor, which you can run on a system to see if your
hardware and software will work with a newer version of Windows. Second,
Microsoft provides Web sites where you can search by model number of hardware or
by a software version to see if it plays well with Windows. Third, the manufacturer of
the device or software will usually provide some form of information either on the
product box or on their Web site to tell you about Windows compatibility. Let’s look at
all three information sources.

 Chips Architecture:

From roughly 1986 to around 2001, all CPUs were 32-bit. While we will save the big
discussion of what 32-bit means for Chapter 6, for now let’s keep it simple: a 32-bit
CPU can only use a maximum of 4 gigabytes (232 bytes = 4,294,967,296 bytes) of
RAM. Starting in 2001, we began to see 64-bit CPUs that could accept more than 4
gigabytes. 64-bit-capable CPUs are now the norm, while 32-bit-only CPUs are
mostly relegated to netbooks and smartphones. The leap from 32-bit to 64-bit
processing has a number of advantages. The really big compelling reason to go from
32- to 64-bit is that 64-bit CPUs support more than 4 GB of RAM. The more RAM
you have, the more programs—and the bigger the programs—your system can run.
Until fairly recently, not too many of us cared to go above 4 GB of RAM. We didn’t
need the extra RAM, and we didn’t have a CPU that could run at 64 bits. My, how
things have changed over the past few years!
o 32 bit:

The earlier 32-bit stuff had been marketed as x86, not x32, so now we have
x86 (old, 32-bit stuff) vs. x64 (new, 64-bit stuff). It’s not pretty, but do you get
the difference? To make matters even worse, however, x64 processors quite
happily handle x86 code and are, by definition, x86 processors too!

o 64 bit:

Page 14 of 45
Over successive generations of microprocessors, engineers have upgraded
many physical features of CPUs. The EDB gradually increased in size, from
8- to 16- to 32- to 64-bits wide. The address bus similarly jumped, going from
20- to 24- to 32-bits wide (where it stayed for a decade). The technological
features changed as well. Engineers added new and improved registers, for
example, that used fancy names like multimedia extensions (MMX) and
Streaming SIMD Extensions (SSE). A mighty shift started a couple of years
ago and continues to evolve: the move to 64-bit computing. Most new CPUs
support 64-bit processing, meaning they can run a compatible 64-bit
operating system, such as Windows 7, and 64-bit applications. They also
support 32-bit processing for 32-bit operating systems, such as Windows XP,
and 32-bit applications. The general-purpose registers also make the move
up to 64-bit. The primary benefit to moving to 64-bit computing is that modern
systems can support much more than the 4 GB of memory supported with
32-bit processing. With a 64-bit address bus, CPUs can address 264 bytes of
memory, or more precisely, 18,446,744,073,709,551,616 bytes of memory
that’s a lot of RAM! This number is so big that gigabytes and terabytes are no
longer convenient, so we now go to an exabyte (260), abbreviated EB. A 64
bit address bus can address 16 EB of RAM. In practical terms, 64-bit
computing greatly enhances the performance of programs that work with
large files, such as video editing applications. You’ll see a profound
improvement moving from 4 GB to 8 GB or 12 GB of RAM with such
programs.

x86 Versus x64


The terminology of CPUs can trip up new techs, so here’s the scoop. CPUs
from the early days can be lumped together as x86 CPUs, because they
used an instruction set that built upon the earliest Intel CPU architecture. The
Intel Core 2 Duo, for example, could run a program written for an ancient
80386 processor that was in fashion in the early 1990s. When the 64-bit
CPUs went mainstream, marketing folks needed some way to mark
applications,operating systems, and so on such that consumers could quickly
tell the difference between something compatible with their system or
Page 15 of 45
something not compatible. Since you generally cannot return software after
you open it, this is a big deal. The marketing folks went with x64, and that
created a mess. The earlier 32-bit stuff had been marketed as x86, not x32,
so now we have x86 (old, 32-bit stuff) vs. x64 (new, 64-bit stuff). It’s not
pretty, but do you get the difference? To make matters even worse, however,
x64 processors quite happily handle x86 code and are, by definition, x86
processors too!

iii. Types of computer cable connector such as:


 Network connector RJ45
 Phone connector RJ11

Figure 9 : Network connectors vs. Phone Connector


Differences between network and phone cables: A phone cable has a
narrower (RJ-11) plug, and there are only four wires which connect into the
end. An ethernet cable's plug (RJ-45) is wider and has eight wires connecting
into the end. In addition, Ethernet cables will usually have the words CAT-5
or CAT-5e stamped onto the cord.

iv. Connector orientation such as:


 Power cable
 USB(1.1, 2.0, 3.0)
 Monitor cable
 Network cable (RJ45)
v. Types of computer monitor connector such as:
 VGA - Abbreviation of video graphics array, a graphics display system for
PCs developed by IBM. VGA has become one of the de facto standards for

Page 16 of 45
PCs. In text mode, VGA systems provide a resolution of 720 by 400 pixels. In
graphics mode, the resolution is either 640 by 480 (with 16 colors) or 320 by
200 (with 256 colors). The total palette of colors is 262,144.

Figure 10: VGA

 DVI - Digital Visual Interface (DVI) is a video display interface developed by


the Digital Display Working Group (DDWG). The digital interface is used to
connect a video source to a display device, such as a computer monitor.
DVI was developed to create an industry standard for the transfer of digital
video content. The interface is designed to transmit uncompressed digital
video and can be configured to support multiple modes such as DVI-D (digital
only), DVI-A (analog only), or DVI-I (digital and analog).

Figure 11: DVI

 HDMI - HDMI (High-Definition Multimedia Interface) is a compact audio/video


interface for transferring uncompressed video data and
Page 17 of 45
compressed/uncompressed digital audio data from a HDMI-compliant device
("the source device") to a compatible computer monitor, video projector,
digital television, or digital audio device. HDMI is a digital replacement for
existing analog video standards.

Figure 12: HDMI

vi. Plug layout


 Three pins
 Two pins
 International adaptor

Plug 3 pins Plug 2 pins International adapter

vii. Electrical safety requirements:


 Electrostatic precaution - Electrostatic discharge (ESD) is the sudden flow of
electricity between two objects caused by contact, an electrical short, or
dielectric breakdown. ESD can be caused by a buildup of static electricity by
tribocharging, or by electrostatic induction. To avoid this, it is advisable to
wear the Anti-electrostatic wristband while installing the computer system
components.

Page 18 of 45
viii. Computer system setup tools:
Tools needed for computer system setup:
 Screw driver
 Multi meter - An electronic measuring instrument that combines several
measurement functions in one unit. A typical multi meter would include basic
features such as the ability to measure voltage, current, and resistance.
 Anti-electrostatic wristband - Ground bracelet is an antistatic device used to
safely ground a person working on very sensitive electronic equipment, to
prevent the build up of static electricity on their body, which can result in
electrostatic discharge (ESD). It is used in the electronics industry by workers
working on electronic devices which can be damaged by ESD, and also
sometimes by people working around explosives, to prevent electric sparks
which could set off an explosion.
 Vacuum cleaner – To remove dust in the computer system components.

Screw driver Multi meter Anti-electrostatic Vacuum cleaner


wristband

ix. Computer hardware components arrangement concept:


 Last In First Out (LIFO) – Last component to be installed will be the first
component to be removed.
 First In First Out (FIFO) - First component to be installed will be the first
component to be removed.
 Last In Last Out (LILO) - Last component to be installed will be the last
component to be removed.

x. Work area cleanliness and hygiene:

Page 19 of 45
To ensure that the work area is cleaned and hygienic environment is maintained
while carrying the tasks.

2. Set-up Computer Hardware

i. Computer hardware components installation:

1. Use the unlocking mechanism to open the


CPU socket which is usually a lever.
2. Carefully line up the pins and place the chip
in its socket; it will fit only when oriented the
proper way. An arrow or a missing pin on
one corner of the chip will show you how to
line things up.
3. Align Triangular CPU and socket key marks
as shown in opposite figure.
4. Lower the lever to lock the CPU into place.

Page 20 of 45
1. Apply a thermal pad or several rice grain
size drops of thermal paste to the exposed
portion of the processor that the heat sink
will be in contact with. If using paste, be
sure it is spread in an even thin layer across
the whole portion of the processor that will
be in contact with the heat sink. It is best to
spread the paste evenly by covering your
finger with a new clean plastic bag. This
prevents the paste from being
contaminated.
2. Align the heat sink or cooling solution above
the processor so that the clamps are in line
with the mounting points around the
processor.
3. Clamp the heat sink in place using the
proper mounting technique required by the
solution. This may be lifting a tab over a
mounting clip or screwing down the heat
sink to the board. Please refer to the
documentation for the heat sink to ensure
proper installation.
4. It is important to be careful at this stage as a
lot of pressure will be placed on the board.
A slip of a screwdriver can cause a lot of
damage to a motherboard.
5. Locate the power lead for the cooling
solution's fan and the CPU fan header on
the motherboard. Plug the cooling solution
fan power connector into the fan header on
the board. It should be keyed, but make
sure it is properly plugged in.
6. Once these steps are taken, the CPU
should be physically installed into the
motherboard for proper operation. When
Page 21 of all
45
1. Carefully position the motherboard on top of
the brass standoffs line up all the holes,
and use the screws that accompanied the
case to fasten down the motherboard. If
you are using a removable tray in your
system, slide the tray and motherboard
back into the case and then secure the tray.

1. Locate an available slot within the computer


and gently push the card into the slot until it
snaps and holds place.

1. In order to install the memory modules,


insert them into the proper sockets
opposite figure and push down firmly but
evenly until the clips on both sides of the
socket pop into place.
2. If your motherboard supports dual-channel
memory, consult the user manual to
determine which pairs of RAM sockets you
should use.

Page 22 of 45
1. Install the graphics board in that slot, and
then secure the card with a screw.
2. Some graphics boards require a dedicated
connection to your computer's power
supply. If yours does, you should plug in the
correct power connector now. Some video
cards allow the insertion of a second video
card connected to the first. If you purchased
such a configuration, install and connect the
second video card.
1. Find a free PCI slot on your motherboard,
remove the adjacent slot bracket that exits
the rear of the case, and insert the Audigy 4
card (sound card) into the slot.
2. Attach the card's power cable to your power
supply and connect the external breakout
box.
3. Close the case, reconnect the PC to its AC
outlet, and power up.

Page 23 of 45
1. First, plug the large ATX power connector
(Figure 12a) from your power supply into the
matching port on your motherboard. Look
Figure X for details.
2. Locate the smaller, square processor power
connector (Figure 13) (you cannot miss it - it
is the one sprouting the yellow and black
wires) and attach it to the motherboard.
Note: your connector is usually located near
the processor. As always, refer to your
motherboard's manual for the exact
locations.
3. Use your motherboard user manual and find
the description about front-panel
connectors.

4. Attach each of the tiny leads from the power


and reset switches (Figure 14), the hard-
disk activity lights, the PC speaker, and any
front-panel USB and FireWire ports to the
corresponding pin on your motherboard.
The needle-nose pliers are useful for
manipulating small pieces.

1. Mount the Hard disk and connect it to the


power supply and the motherboard. There
should be separate connections for the
power supply and the motherboard. In
SATA Hard disk case, should remove the
jumper.

Page 24 of 45
1. Mount the DVD-ROM drive. After
connecting the ATA cable to the device,
hook it up to the power supply.

1. Replace the casing and screw it tightly and


finally set it in an upright position.

ii. Types of computer casing such as:

Types of casing Picture


These cases usually support up to multiple drive bays,
and as a result, are the most expensive computer cases in
the market.

There is actually a middle-ground tower, called the midi,


which can host 4-5 drive bays, but some manufacturers
don’t usually separate the two types.

Tower cases are differentiated by the number of drive


bays that they support.
Tower case – (Full,
Midi & Mini) Mini towers have three drive bays, though the number
may be different, depending on the company or store that
you buy your case from.
Desktop casing - This type of case in which the monitor
sits on top of the case has the fewest alternative available
on the market. But even with proliferation of Tower Cases,
some computers are still based on this type.

iii. Types of computer casing/cover installation:


 Plug and play casing

Page 25 of 45
 Customised casing such as
o Cooling system:
- System Fan: 2 fans, 6 fans.
- Air-condition
o Hard disk bays
- 2 bays
- 6 bays
- 8 bays
iv. Types of computer warning alarm, such as:
 Long beep
 Short beep

Before and During the Video Test: The Beep Codes


The computer tests the most basic parts of the computer first, up to and including the
video card. In early PCs, you’d hear a series of beeps—called beep codes—if
anything went wrong. By using beep codes before and during the video test, the
computer could communicate with you. (If a POST error occurs before the video is
available, obviously the error must manifest itself as beeps, because nothing can
display on the screen.) The meaning of the beep code you’d hear varied among
different BIOS manufacturers. You could find the beep codes for a specific
motherboard in its motherboard manual. Most modern PCs have only two beep
codes: one for bad or missing video (one long beep followed by two or three short
beeps), and one for bad or missing RAM (a single beep that repeats indefinitely).
You’ll hear three other beep sequences on most PCs (although they’re not officially
beep codes). At the end of a successful POST, the PC produces one or two short
beeps, simply to inform you that all is well. Most systems make a rather strange
noise when the RAM is missing or very seriously damaged. Unlike traditional beep
codes, this code repeats until you shut off the system. Finally, your speaker might
make beeps for reasons that aren’t POST or boot related. One of the more common
is a series of short beeps after the system’s been running for a while. That’s a CPU
alarm telling you the CPU is approaching its high heat limit.
Page 26 of 45
Text Errors
After the video has tested okay, any POST errors display on the screen as text
errors. If you get a text error, the problem is usually, but not always, self-explanatory
Text errors are far more useful than beep codes, because you can simply read the
screen to determine the bad device.

POST Cards
Beep codes, numeric codes, and text error codes, although helpful, can sometimes
be misleading. Worse than that, an inoperative device can sometimes disrupt the
POST, forcing the machine into an endless loop. This causes the PC to act dead no
beeps and nothing on the screen. In this case, you need adevice, called a POST
card, to monitor the POST and identify which piece of hardware is causing the
trouble. POST cards are simple cards that snap into expansion slots on your system.
A small, two-character lightemitting diode (LED) readout on the card indicates which
mdevice the POST is currently testing as below figure.

Page 27 of 45
v. Types of power on self test (POST) messages, such as:
The computer power-on self-test (POST) tests the computer to make sure it
meets the necessary system requirements and that all hardware is working
properly before starting the remainder of the boot process. If the computer
passes the POST the computer will have a single beep (with some computer
BIOS manufacturers it may beep twice) as the computer starts and the computer
will continue to start normally. However, if the computer fails the POST, the
computer will either not beep at all or will generate a beep code, which tells the
user the source of the problem. Examples of messages are:
 Keyboard not connected
 BIOS date
 Processor bus speed error
 Memory module incorrect configuration
vi. Manufacturer instruction manual.
Manufacturer instruction manual is an instructional book or booklet that is
supplied with almost all technologically advanced consumer products such as
vehicles, home appliances and computer peripherals. Example of manufacturer
instruction manual is shown in figure 13 below.

Page 28 of 45
Figure 13 : Manufacturer Instruction Manual
3. Carry out computer software installation
i. Computer Operating System(OS) installation:
 Types of OS and its version
o Licensed – Please refer to previous notes in page 3.
o Open source - Please refer to previous notes in page 3.
 OS Licensing
o Licensed – Please refer to previous notes in page 3.
o Open source - Please refer to previous notes in page 3.

ii. Types of computer devices driver, such as:


 Graphic driver - The graphics driver is a program that controls how your
graphic components work with the rest of your computer: your software, such
as SketchUp, your monitor, and etc.
 Sound card driver – Listening to audio from a computer system requires a
sound card. With the right type of sound card, you can turn a standard
Page 29 of 45
computer into a multimedia entertainment system. In order to make the sound
card actually work, we also need a sound card driver. Various sound card
manufacturers provide you with drivers that are made to make their devices
perform.
 Chipset driver – At one time, most of the functions of the chipset were
performed by multiple, smaller controller chips. There was a separate chip
(often more than one) for each function: controlling the cache, performing
direct memory access (DMA), handling interrupts, transferring data over the
I/O bus, etc. Over time these chips were integrated to form a single set of
chips, or chipset that implements the various control features on the
motherboard. This mirrors the evolution of the microprocessor itself: at one
time many of the features on a Pentium for example were on separate chips.
The function of the chipset driver is to control various types of chips on the
mother board so that they can perform efficiently.
 Network driver – A network device driver is a device driver that enables a
network device to communicate between the computer and operating system
as well as with other network computers and network devices.
 Monitor driver – Monitor drivers are specific to the monitor. They are usually
text files that tell the operating system what the monitor is and what it is
capable of. They are not required for the monitor to function.

Figure 14: Update Graphic card driver

Page 30 of 45
iii.Software application installation:
 Minimum installation requirement
For software installation, usually minimum requirement are needed for the PC
to support the execution of the software. Therefore in each software
installation usually the basic requirements will be based on the following
requirements:
o Hard disk space
o Memory
o Processor
o Optical drive
 Installation licence key – For licensed software usually it will come together
with installation licence key. An installation licence key, also known as a
software key, is a specific software-based key for a computer program. It
certifies that the copy of the program is original. Activation is sometimes done
offline by entering the key, or with software like Windows 7, online activation is
required to prevent multiple people using the same key. Not all software has a
product key, as some publishers may choose to use a different method to
protect their copyright, or in some cases, such as open source software,
copyright protection is not used.

Computer games use product keys to verify that the game has not been
illegally copied. Likewise, one is not allowed to play online with two identical
product keys at the same time.

Page 31 of 45
Figure 15: Product Key

iv.Software update
Software Update is a free software client designed to inform you of available
software updates for your computer, so as to keep your software up-to-date.
Software Update scans your computer and notifies you if there is a program has
not been updated to the latest version. It offers you a link to update software and
other related information.

Figure 16: System Update


v. Computer security verification:
 Anti-virus – Antivirus programs are designed to protect your computer from
malware, a term used to describe malicious software. Malicious software,
including viruses, trojans and keyloggers, may delete your files, slow your
Page 32 of 45
computer and steal your personal data. Consequently, choosing a good
antivirus program is imperative. With so many antivirus programs available in
the marketplace, it may help to understand some of the functions that an
antivirus performs so that you can compare them. E.g. of anti-virus available in
the market are Avira Antivirus, Kaspersky, Norton Antivirus, Symantec Anti-
virus, Spyware and etc.

Figure 17: Avira – Anti virus

 Firewall policy - Many organizations have a network perimeter firewall that is


designed to prevent the entry of malicious traffic in to the organization's
network, but do not have a host-based firewall enabled on each computer in
the organization.

The Basic Firewall Policy Design helps you to protect the computers in your
organization from unwanted network traffic that gets through the perimeter
defenses, or that originates from inside your network. In this design, you
deploy firewall rules to each computer in your organization to allow traffic that
is required by the programs that are used. Traffic that does not match the rules
is dropped.

Traffic can be blocked or permitted based on the characteristics of each


network packet: its source or destination IP address, its source or destination
port numbers, the program on the computer that receives the inbound packet,

Page 33 of 45
and so on. This design can also be deployed together with one or more of the
other designs that add IPsec protection to the network traffic permitted.

 Internet browser security setting – we can also protect our host by configuring
at the Internet browser setting.

Figure 18: Browser setting

 User credential
o User account information
o Network configuration
o E-mail account
vi.Software back-up
 Types of software back-up
o System setting back-up

Page 34 of 45
Figure 19: System Back

Figure 20: Files to choose during system back up

Page 35 of 45
o OS restore back-up

Figure 21: OS restore back up


4. Set-up Computer Peripherals

i. Types of peripherals such as:


 Printer

Page 36 of 45
Figure 22: Printer Setup

 Scanner

Figure 23: Scanner Setup

 Multi function.
 Uninterrupted Power Supply (UPS)
We need to tell your system what to do during various cases of battery failure.
Our system will constantly monitor the condition of the battery, just as a laptop
does. So, if the AC power fails, presumably the UPS switches on, and our PC
keeps running. Then under the power profile fine-tune the profile:

1. Click Start, Control Panel, Hardware and Sound, Power Options.

Page 37 of 45
2. Under Select a Power Plan, choose the power plan you want. Under that
plan, click Change Plan Settings.
3. In the next dialog box, click Change Advanced Power Settings. You'll see
the dialog box shown in Figure below.

Figure 23: UPS Setup

Here you can set the UPS and system behaviour for cases of power outage.
Set the Low Battery Level and the Critical Battery Level after considering your
computer's power needs and the capacity of your power supply. To make it
safe, set Critical to 10% and have the computer hibernate at that point.

ii. Types of computer peripherals cables such as:

Types of cable Figure


Page 38 of 45
 USB cable: 1.1, 2.0, 3.0.

 Parallel cable

 Serial cable

 SCSI cable

 Firewire (IEEE 1394)

Page 39 of 45
 Thunder bolt

iii.Peripheral driver compatibility:


 OS version
A device driver is a file stored on the PC’s hard drive that contains all of the
commands necessary to talk to whatever device it was written to support. All
operating systems employ a method of loading these device drivers into RAM every
time the system boots. They know which device drivers to install by reading a file (or
files) that lists which device drivers the system needs to load at boot time. All
operating systems are designed to look at this list early on in the boot process and
copy the listed files into RAM, thereby giving the CPU the capability to communicate
with the hardware supported by the device driver. Device drivers come with the
device when you buy it. When you buy a sound card, for example, it comes with a
disc that holds all of the necessary device drivers (and usually a bunch of extra
goodies). The generic name for this type of CD-ROM is installation disc. In most
cases, you install a new device, start the computer, and wait for Windows to prompt
you for the installation disc.

Page 40 of 45
Page 41 of 45
SOALAN/QUESTION:

1. What does BIOS provide for the computer? (Choose the best answer.)
A. BIOS provides the physical interface for various devices such as USB and
FireWire ports.
B. BIOS provides the programming that enables the CPU to communicate
with other hardware.
C. BIOS provides memory space for applications to load into from the hard
drive.
D. BIOS provides memory space for applications to load into from the main
system RAM.

2. What is the correct boot sequence for a PC?


A. CPU, POST, power good, boot loader, operating system
B. POST, power good, CPU, boot loader, operating system
C. Power good, boot loader, CPU, POST, operating system
D. Power good, CPU, POST, boot loader, operating system

3. Jill decided to go retro and added a second floppy disk drive to her computer. She
thinks she has it physically installed correctly, but it doesn’t show up in Windows.
Which of the following options will most likely lead Jill where she needs to go to
resolve the issue?
A. Reboot the computer and press the F key on the keyboard twice. This
signals that the computer has two floppy disk drives.
B. Reboot the computer and watch for instructions to enter the CMOS setup
utility (for example, a message may say to press the DELETE key). Do what it
says to go into CMOS setup.
C. In Windows, press the DELETE key twice to enter the CMOS setup utility.
D. In Windows, go to Start | Run and type floppy. Click OK to open the
Floppy Disk Drive Setup Wizard.

Page 42 of 45
4. Henry bought a new card for capturing television on his computer. When he
finished going through the packaging, though, he found no driver disc, only an
application disc for setting up the TV capture software. After installing the card and
software, it all works flawlessly. What’s the most likely explanation?
A. The device doesn’t need BIOS, so there’s no need for a driver disc.
B. The device has an option ROM that loads BIOS, so there’s no need for a
driver disc.
C. Windows supports TV capture cards out of the box, so there’s no need for
a driver disc.
D. The manufacturer made a mistake and didn’t include everything needed to
set up the device.

5. Which of the following most accurately describes the relationship between BIOS
and hardware?
A. All hardware needs BIOS.
B. All hardware that attaches to the motherboard via ribbon cables needs
BIOS.
C. All hardware built into the motherboard needs BIOS.
D. Some hardware devices need BIOS.

6. After a sudden power outage, Samson’s PC rebooted, but nothing appeared on


the screen. The PC just beeps at him, over and over and over. What’s most likely the
problem?
A. The power outage toasted his RAM.
B. The power outage toasted his video card.
C. The power outage toasted his hard drive.
D. The power outage toasted his CPU.

Page 43 of 45
7. Davos finds that a disgruntled former employee decided to sabotage her computer
when she left by putting a password in CMOS that stops the computer from booting.
What can Davos do to solve this problem?
A. Davos should boot the computer while holding the left SHIFT key. This will
clear the CMOS information.
B. Davos should try various combinations of the former employee’s name.
The vast majority of people use their name or initials for CMOS passwords.
C. Davos should find the CMOS clear jumper on the motherboard. Then he
can boot the computer with a shunt on the jumper to clear the CMOS
information.
D. Davos should find a replacement motherboard. Unless he knows the
CMOS password, there’s nothing he can do.

8. Richard over in the sales department went wild in CMOS and made a bunch of
changes that he thought would optimize his PC. Now most of his PC doesn’t work.
The computer powers up, but he can only get to CMOS, not into Windows. Which of
the following tech call answers would most likely get him up and running again?
A. Reboot the computer about three times. That’ll clear the CMOS and get
you up and running.
B. Open up the computer and find the CMOS clear jumper. Remove a shunt
from somewhere on the motherboard and put it on the CMOS clear jumper.
Reboot and then put the shunt back where you got it. Reboot, and you should
be up and running in no time.
C. Boot into the CMOS setup program and then find the option to load a plug-
and play operating system. Make sure it’s set to On. Save and exit CMOS;
boot normally into Windows. You should be up and running in no time.
D. Boot into the CMOS setup program and then find the option to load
Optimized Default settings. Save and exit CMOS; boot normally into
Windows. You should be up and running in no time.

Page 44 of 45
9. Jill boots an older Pentium III system that has been the cause of several user
complaints at the office. The system powers up and starts to run through POST, but
then stops. The screen displays a “CMOS configuration mismatch” error. Of the
following list, what is the most likely cause of this error?
A. Dying CMOS battery
B. Bad CPU
C. Bad RAM
D. Corrupt system BIOS

10. Where does Windows store device drivers?


A. Computer
B. Hardware
C. Registry
D. Drivers and Settings

Rujukan/ References :

1. CompTIA A+ Certification
2. CCNA NetworkPlus
3. Jyoti Snehi. (2006). Computer Peripherals and Interfacing. Firewall Media.
ISBN-13:978-81-7008-929-2
4. Ultrabook : http://www.webopedia.com/TERM/U/ultrabook.html
5. Thin client: http://aspboss.blogspot.com/2011/02/thin-vs-thick-clients.html
6. Plu 3 pin : http://www.quadtronics.co.uk/13-amp-3-pin-plug-94-p.asp
7. Manufacturer instructional manual:
http://www.aerocool.us/images/peripheral/powerpanel/user-guide

Page 45 of 45

You might also like