Grade 11 CSS Q3
Grade 11 CSS Q3
Grade 11 CSS Q3
WEB PROGRAMMING
Module 2 - Grade 11/ICT Quarter 2
Greetings!
This module contains training materials and activities for you to finish. You are required to go through a
series of learning activities. If you have questions, don’t hesitate to ask your teacher for assistance.
This will give you the opportunity to develop your knowledge, hone your skills, behavior and
motivations required in Installing and Configuring Computer Systems that is in line with the industry
standards. You need to complete this module before you can perform the next module.
The unit of competency, “Install and Configure Computer Systems“, is one of the competencies
of Computer Systems Servicing NCII, a course which comprises knowledge, skills and attitudes required
for a trainee to possess.
In this module, you are required to go through a series of learning activities in order to complete
each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets
and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from your teacher.
Remember to:
1. Work through all the information and complete the activities in each section.
2. Read information sheets and complete the self-check. Suggested references are included to
supplement the materials provided in this module.
1
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
3. Most probably, your trainer will also be your supervisor or manager. He is there to support you
and show you the correct way to do things.
4. You will be given plenty of opportunities to ask questions and practice on the job. Make sure
you practice your new skills during regular work shifts. This way, you will improve your speed,
memory and your confidence.
Introduction
This module is designed to equip you the TVL Open High School Learners with essential Knowledge,
Skills, and Attitude in performing the tasks on Computer System Servicing which will lead you to
acquire National Certificate Level II.
This module includes information and activities to develop desirable values, skills and understanding
through step-by-step procedures and helpful techniques that will guide you on how to install and
configure computer systems. Furthermore, applications to real life situations are also included for
lifelong learning.
Pre-Test
What I Know?
2
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
a. mother
b. system
c. brain
d. process
a. UTP cable
b. straight thru cable
c. cross over cable
d. copper cable
4. Is the hardware in a computing device where the operating system (OS), application programs and
data in current use are kept so they can be quickly reached by the device's processor.
a. RAM
b. Operating system
c. CPU
d. HDD
3
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
8. ROM is
a. random access memory - temporary
b. random access memory - permanent
c. read only memory - temporary
d. read only memory – permanent
9. An example of a software :
a. USB
b. Printer
c. Excel
d. Keyboard
4
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
a. Malware
b. Software
c. Hardware
d. People
5
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
a. Onsite Software
b. Operating System
c. Only Read Software
d. On-demand System
Definition of Terms
CPU-Central processing unit; the brain of the computer; controls the other elements of the computer
Disk Drive-A peripheral device that reads and/or writes information on a disk
Hard Drive-A device (usually within the computer case) that reads and writes information, including the
operating system, program files, and data files
Modem-A peripheral device used to connect one computer to another over a phone
line
6
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Printer-A peripheral device that converts output from a computer into a printed image
Browser-A program used to view World Wide Web pages, such as Netscape Navigator or Internet
Explorer
Internet-A network of computer networks encompassing the World Wide Web, FTP, telnet, and many
other protocols
URL-Uniform resource locator; the address of a site on the World Wide Web; a standard way of locating
objects on the Internet
Virus-A deliberately harmful computer program designed to create annoying glitches or destroy data
Window-A screen in a software program that permits the user to view several programs at one time
7
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Read Information Sheet No 1.1-1 and find out how much you can remember.
1. Identify the basic precautions and procedures in planning, preparing, installing and testing of
computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the environment.
During installation and initial test, careful planning and preparation are to be done. To avoid
personal injury and damages to wiring due to sharp pins on connectors and printed circuit assemblies,
rough chassis edges and corners, and hot components.
Adhere to warnings and limitations regarding accessibility into areas designated only for
authorized technical personnel.
8
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
o Before starting the installation, read carefully the documentation and procedures on any
hardware and software settings that may be required.
o Failure to do the proper jumper setting may cause damage to your CPU.
o Without an effective cooling fan, the CPU can overheat and cause damage to both CPU and the
motherboard.
o Each bank must have the same size and type of memory installed in pairs.
o Before adding and removing any other system components, make sure that you unplug your
power supply. Failure to do so may cause damage to your motherboard and in the system
component.
o Test the computer, ensuring that it meets the necessary system requirements before booting
up.
o If the computer does not pass any of the power on self-test (POST), the computer will receive an
irregular power on self-test. An irregular POST is a beep code which is different from the
standard beep which can either be no beeps at all or a combination of different beeps.
EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact on the labor force,
health risks, and the impact on the environment.
1. Violation of Privacy
9
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Nearly every life event is stored in a computer somewhere--in medical records, credit reports,
tax records, etc. It is crucial that personal and confidential records be protected properly. In many
instances, where these records were not properly protected, individuals have found their privacy
violated and identities stolen.
Although computers have improved productivity in many ways and created an entire industry
with hundreds of thousands of new jobs, the skills of millions of workers and managers have been
replaced by computers. Thus, it is crucial that workers keep their education up-to-date. A separate
impact on the labor force is that some companies are outsourcing jobs to foreign countries instead of
keeping their homeland labor force employed.
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, necks, and back. Computer users can protect themselves from these health risks through
proper workplace design, good posture while at the computer, and appropriately spaced work breaks.
Another health risk, called computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.
4. Public Safety
10
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Adults, teen, and children around the world are using computers to share publicly
their photos, videos, journals, music, and other personal information. Some of these unsuspecting,
innocent computer users have fallen victim to crimes committed by dangerous strangers. Protect
yourself and your dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.
5. Impact on Environment
Computer manufacturing processes and computer waste are depleting natural resources and
polluting the environment. The amount of resources required to manufacture a personal computer
equals that of a mid-sized car. When computers are discarded in landfills, they release toxic materials
and potentially dangerous levels of lead, mercury, and flame retardants. Strategies that can help protect
the environment include recycling, regulating manufacturing processes, extending the life of computers,
and immediately donating replaced computers.
11
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the statement is correct and
FALSE if the statement is wrong.
1. Failure to do the proper jumper setting may cause damage to your CPU.
2. After adding and removing any other system components, make sure that
you unplug your power supply.
3. Test the computer, ensuring that it meets the necessary system
requirements before booting up.
4. With an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
5. After starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.
B. MATCHING TYPE
Direction: Select your answer on the choices below that will correspond on the statement.
Write the letter of your answer on the space provided.
A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force
12
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
5. Prolonged or improper computer use can lead to injuries or disorders of the hands,
wrists, elbows, eyes, necks, and back.
2. Identify the qualifications to be a certified hardware professional so that you could be allowed
and authorized to do a well-planned installation
REQUIRED DOCUMENTS/FORMS
A. Job Order- (sometimes job ticket or work ticket, as it often has some type of ticket attached) is an
order received by an organization from a customer or client, or an order created internally within
the organization. A work order may be for products or services.
13
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
the quantity of the product to be manufactured, built or fabricated o the amount of raw material to be
used, its price and amount the types of labor required, rate (per hour or per unit) and amount the
machine utilization for each machine during the routing process, its rate and amount
14
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
o To develop maintenance system to reduce life cycle cost of machinery and equipment
through the involvement of everybody in the organization o To develop the operator’s
capability to be competent in maintenance activities through education, training and
motivation.
o To enhance capability for advanced and sophisticated technology that would reinforce
competitive power.
Sample Request Form
Observation/s:
15
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Reported by:
Alexis V. Larosa
Activity: Reformat Laptop
Signed: ______________________
16
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Education
Employers prefer applicants who have completed and pass the National Certification Exam II (NC
II) from any DepEd School, vocational training institute or similar setting. Some employers require at
least a high school diploma.
Certifications
Trainees can take the TESDA NC II Computer System Servicing assessment to demonstrate their
competency for entry-level jobs to employers. The Technical Education and Skills Development
Authority or TESDA offers a variety of certification programs. In addition, technicians can achieve
certifications even for trainer ship.
PC technicians must be able to squat, bend and reach to access the computer equipment
requiring repair. They should be physically able to lift computer components. Employers want
technicians who think analytically, are organized and pay attention to detail. They should feel
comfortable working under tight deadlines, and companies may expect them to work overtime or on
weekends.
Applicants should know how to use a variety of standard office software, and some jobs also require
knowledge of networking. Companies prefer candidates with previous PC repair experience
(Immersion), and they may look for candidates with experience repairing specific brands of computers.
Technicians need strong oral communication skills and should be able to explain their findings to
customers using common terms.
A. TRUE OR FALSE
Direction: Precautions and Procedures. Write TRUE if the statement is correct and FALSE if the
statement is wrong.
__________3. Computer Technicians are given the TESDA NC II Computer Systems Servicing by TESDA
after successfully taking the Assessment.
_________ 4. Computer Technicians need not to have strong oral communication skills for they only
repair computers.
__________5. Companies prefer candidates with previous PC repair experience and they may look for
candidates with experience repairing specific brands of computers.
18
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Read Information Sheet No 1.1-3 and find out how much you can remember. Do Self-
Check 1.1-3 to know how much you have learned.
LEARNING OBJECTIVES:
An Operating System (OS) is a set of programs that manage computer hardware resources and
provide common services for application software. The operating system is a vital component of the
system software in a computer system. Application programs require an operating system which are
usually separate programs but can be combined in simple systems. Operating systems are found on
almost any device that contains a computer from cellular phones and video game consoles to
supercomputers and web servers.
19
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Real-time
A real-time operating system is a multitasking operating system that aims at executing real-time
applications. The main objective of real-time operating systems is their quick and predictable response
to events. They have an event-driven or time-sharing design and often aspects of both.
Multi-user
A multi-user operating system allows multiple users to access a computer system concurrently.
Single-user operating systems, as opposed to a multi-user operating system, are usable by a single user
at a time. Being able to use multiple accounts on a Windows operating system does not make it a multi-
user system. Rather, only the network administrator is the real user.
Distributed
20
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
A distributed operating system manages a group of independent computers and makes them
appear to be a single computer. The development of networked computers that could be linked and
communicate with each other gave rise to distributed computing. Distributed computations are carried
out on more than one machine. When computers in a group work in cooperation, they make a
distributed system.
Embedded
Embedded operating systems are designed to be used in embedded computer systems. They are
designed to operate on small machines like PDAs with less autonomy. They are able to operate with a
limited number of resources. They are very compact and extremely efficient by design.
EXAMPLES OF OPERATING
SYSTEMS
DOS
UNIX
UNIX operating systems are used in widely-sold workstation products from Sun Microsystems,
Silicon Graphics, IBM, and a number of other companies. The UNIX environment and the
client/server program model were important elements in the development of the Internet and the
reshaping of
21
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Mac OS X
LINUX
A. IDENTIFICATION
Direction: Write TRUE if the statement is correct and FALSE if the statement is wrong.
________1) An operating system is a set of programs that manage computer hardware resources and
provide common services for application software.
________2) Operating system is not a vital component of the system software in a computer system.
Application programs require an operating system which are usually separate programs,
but can be combined in simple systems.
________3) Time-sharing operating systems schedule time for efficient use of the system and may also
include accounting for cost allocation of processor time, mass storage, printing, and
other resources.
________4) For software functions such as input and output and memory allocation, the operating
system acts as an intermediary between application programs and the computer
hardware.
________5) Operating systems are found on almost any device that contains a computer—from cellular
phones and video game consoles to supercomputers and web servers
Read Information Sheet No 1.1-4 and find out how much you can remember. Do Task Sheet
1.1-4 to know how much you have learned.
22
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
LEARNING OBJECTIVES:
1. Classify of the hardware and software components of a computer with its corresponding
functions.
2. Determine the various computer components and peripherals
Basic Hardware Components of Computer System
A computer is an electronic machine, operating under the control of instructions stored in its
own memory, that can be programmed to accept data (input), process it into useful information
(output), and store it away in a secondary storage device (store) for safekeeping or later reuse. The
processing of input into output is directed by the software but performed by the hardware. Figure below
shows some common computer hardware components
23
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Commons.wikimedia.org
Computer system hardware components include devices that perform the functions of input,
processing, data storage; output and communication. The devices responsible for these five areas are as
follows:
Input devices. Input devices allow you to enter data or commands in a form that the computer can use;
they send the data or commands to the processing unit. Commonly used input devices include
keyboard, mouse, microphone, scanner, digital camera, and PC camera.
Output devices. Output devices show people the processed data--information --in understandable and
useful form. Four commonly used output devices are a printer, a monitor, speakers, and a portable
24
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
media player. Input/output devices are playing an increasingly significant role in our lives. The number
and variety of input/output devices are expanding.
Processing devices. Processing devices are the computer electronic circuitry housed in the system unit.
The processor, formally known as the central processing unit (CPU), has electronic circuitry that
manipulates input data into the information people want. Computer instructions are actually are
executed in the central processing unit. Memory is a series of electronic elements that temporarily holds
data and program instructions while they are being processed by the CPU. Both the processor and
memory consist of chips. A chip is an electronic device that contains many microscopic pathways
designed to carry electrical current.
Storage devices. Storage usually means secondary storage that can store data and programs outside the
computer itself. Storage devices hold data, information, and programs permanently. Common storage
devices include a hard disk, USB flash drives, CDs, DVDs, and memory cards.
Communications devices. Communications devices provide connections between the computer and
communications networks, and enable computer users to communicate and to exchange data,
information, and programs with other computers. Communications devices transmit these items over
transmission media such as cables, telephone lines, satellites, and cellular radio. A widely used
communications device is a modem.
25
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
The central processing unit (CPU), also called processor, interprets and carries out the basic instructions
that operate a computer. The CPU significantly impacts overall computing power and manages most of a
computer's operations. The processor is the device that executes program instructions.
The memory device is a package that holds temporarily data and program instructions during
processing.
An expansion card is a circuit board that adds devices or capabilities to the computer. Finally, devices
outside the system unit, such as a keyboard, mouse, monitor, printer, or microphone, are attached by a
cable to a port or connector on the system unit.
26
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
The motherboard, a single circuit board, provides the path through which the processor communicates
with memory components, other components, and peripheral devices.
27
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
The system unit contains two types of memory: volatile and nonvolatile. The contents of
volatile memory are lost when the computer power is turned off. In nonvolatile memory, the
combination of circuit states is fixed, and therefore the contents of nonvolatile memory are not lost
when power is removed from the computer.
28
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
Serial port is a type of interface that connects a device to the system unit by transmitting data one bit at
a time.
29
PREPARED BY: JELLIE ANN A. DAYAWON
CVE Colleges, Inc.
T.R. Alvarez Subd. Brgy, Del Carmen, Pagbilao, Quezon
Tel No.: (042)797 1692 Email: [email protected]
30
PREPARED BY: JELLIE ANN A. DAYAWON