3. configure computer

Upload: sundae-cruz

Post on 14-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 3. Configure Computer

    1/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    COMPETENCY BASED LEARNING MATERIAL

    Sector: Information and Communication Technology

    Qualification Title: Computer Hardware Servicing NC II

    Unit of Competency Configure Computer Systems & Networks

    Module Title: Configuring Computer Systems & Networks

    Technical Education & Skills Development Authority

    BISHOP HADEN INSTITUTET. Curato St., Cabadbaran City

    POWERED BY: NETWORK SYSTEM

  • 7/30/2019 3. Configure Computer

    2/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    COMPETENCY-BASED LEARNING

    MATERIAL

    Configuring Computer

    Systems

    &Networks

  • 7/30/2019 3. Configure Computer

    3/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    ACKNOWLEDGEMENT

    This Competency-Based Learning Materials on Configuring ComputerSystems &Networkswould not have been possible without the guidance and the

    help of several individuals who in one way or another contributed and extendedtheir valuable assistance in the preparation and completion of this CBLM.

    First and foremost, my utmost gratitude to RT. REV. Denny D. Dapitan,School President of Bishop Haden Institute whose sincerity and encouragement Iwill never forget.

    Mrs. Lilian G. Bertumen, for her unselfish and unfailing support as mytrainer and the insights she has shared;

    Mrs. Marife A. Pea, for her patience and steadfast encouragement to

    complete this CBLM;

    Last but not the least, my family and the one above all of us, the AlmightyGod, for answering my prayers for giving me the strength to plod on despite myconstitution wanting to give up and throw in the towel, thank you so much DearLord.

    Hans B. de la Cruz

  • 7/30/2019 3. Configure Computer

    4/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    TABLE OF CONTENTS

  • 7/30/2019 3. Configure Computer

    5/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    HOW TO USE THIS COMPETENCY- BASED LEARNINGMATERIALS

    Welcome!

    This module contains training materials and activities for you to complete.

    The unit of competency Configure Computer Systems and Networks containsthe knowledge, skills and attitudes required for Computer Hardware Servicing

    course required to obtain the National Certificate (NC level II). You are required to

    go through a series of learning activity. If you have questions, do not hesitate to

    ask your trainer for assistance.

    Recognition of Prior Learning (RPL)

    You have already some basic knowledge and skills covered in this module.

    If you can demonstrate competence to your trainer in a particular skill talk to

    him/her so you did not have to undergo the same training again. If you have a

    qualification or Certificate of Competence from previous trainings show it to

    him/her. If the skills you required are consistent with and relevant to this

    module, they become part of the evidence. You can present these RPL. If you are

    not sure about your competence skills, discuss this with your teacher.

    After completing this module ask your trainer to assess your competent.

    Result of your assessment will be recorded in your competency profile. All the

    learning activities are designed for you to complete at your own pace.

    In this module, you will find activities for you to accomplish and relevant

    information sheets for each learning outcome. Each learning outcome may have

    more than one learning activity.

    This module is prepared to help you achieve the required competency in

    receiving and relaying information. This will be the source of information that will

    enable you to acquire the knowledge and skills in Computer Hardware Servicing

    NCII independently at your own pace with minimum supervision from your

    trainer.

  • 7/30/2019 3. Configure Computer

    6/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    COMPUTER HARDWARE SERVICING NC II

    COMPETENCY-BASED LEARNING MATERIALS

    List of Competencies

    No. Unit of Competency Module Title Code

    1 Install computer systems andnetworks

    Installing computer

    systems andnetworks

    ELC724318

    2 Diagnose and troubleshoot

    computer systems

    Diagnosing andtroubleshoot

    computer systems

    ELC724319

    3 Configure computer systemsand networks

    Configuringcomputer systemsand networks

    ELC724320

    4 Maintain computer systemsand networks

    Maintainingcomputer systems

    and networks

    ELC724321

  • 7/30/2019 3. Configure Computer

    7/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    MODULE CONTENT

    UNIT OF COMPETENCY Configure Computer Systems & Networks

    MODULE TITLE Configuring Computer Systems & Networks

    MODULE DESCRIPTOR:

    This unit covers the knowledge, skills and attitudes needed to configurecomputer systems and networks.

    NOMINAL DURATION: 100HRS.

    LEARNING OUTCOMES:

    Upon completion of this module the students/trainees must be able to:

    1. Plan and prepare for configuration

    2. Configure computer systems and networks

    3. Inspect and test configured computer systems and networks

    ASSESSMENT CRITERIA:

    1. Configured computer systems and networks identified from the

    Job/Service Order or instructions.

    2. Planned and prepared job requirements.

    3. Followed OHS policies and procedures of job requirements.

    4. Checked computer systems and networks configuration with specified

    requirements.

    5. Checked necessary tools, equipment materials

  • 7/30/2019 3. Configure Computer

    8/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    6. Appropriate personal protective equipment are used and OHS policies &

    procedures followed

    7. Normal function of systems & network checked in accordance with

    manufacturers instruction

    8. Fault or problem in the systems and networks diagnosed in line with the

    standard operating procedures

    9. Computer systems and networks configured in line with the standard

    operating procedures

    10.Final inspections are undertaken to ensure that the configuration done on

    the systems and networks conforms with the manufactures

    instruction/manual

    11.Computer systems and networks are checked to ensure safe operation.

    12.Report is prepared and completed according to company requirements.

  • 7/30/2019 3. Configure Computer

    9/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    LEARNING OUTCOME # 1 PLAN AND PREPARE FOR CONFIGURATION

    CONTENTS:

    1. Inspecting work instructions according to job requirements.

    2. Planning and preparing of standard operating procedures

    3. Occupational health and safety

    4. Configuring system and networks

    5. Procedures in using the tools and equipments

    ASSESSMENT CRITERIA:

    1. Configured computer systems and networks identified from the

    Job/Service Order or instructions.

    2. Planned and prepared job requirements.

    3. Followed OHS policies and procedures of job requirements.

    4. Checked computer systems and networks configuration with specified

    requirements.

    5. Checked necessary tools, equipment materials

    CONDITION:

    Trainees must be provided with the following:

    OH & S policies and procedures

    - OH & S policies

    - manuals

    Computer systems and networks

    - 1 Server

    - Peripherals

    - 1 Desktop Computers

    Materials

    - Wires and Cables

    - Appropriate Software- Computer Storage Media

  • 7/30/2019 3. Configure Computer

    10/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Tools

    - Pliers- Philips screw driver

    Equipment/testing devices- Computer

    Personal protective equipment- Anti-static wrist wrap

    ASSESSMENT METHOD:

    Hands-on application

    Direct observation

    Practical demonstration

  • 7/30/2019 3. Configure Computer

    11/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    LEARNING EXPERIENCES

    Learning Outcome 1

    PLAN AND PREPARE FOR CONFIGURATION

    Learning Activities Special Instructions

    1. Read Information Sheet 3.1-1 onsafety measures, policies &procedures in Computerconfiguration

    2. Answer Self-Check 3.1-1

    Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    3. Check answers by comparingwith the answer key

    4. Read Information Sheet 3.1-2 onplanning & preparing of standardoperating procedures

    5. Answer Self-Check 3.1-2 Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    6. Check answers by comparingwith the answer key

    7. Read Information Sheet 3.1-3 onconfiguring system and networks

    8. Answer Self-Check 3.1-3 Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    9. Check answers by comparingwith the answer key

    10. Perform Task Sheet 3.1-3

  • 7/30/2019 3. Configure Computer

    12/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    11. Use the performance criteriachecklist to evaluate your

    performance

    12. Read Information Sheet3.1-4 on procedures in usingtools & equipments

    13. Answer Self-Check 3.1-4 Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    14. Check answers bycomparing with the answer key

    15. Perform Task Sheet 3.1-4

    16. Use the performance criteria

    checklist to evaluate yourperformance

  • 7/30/2019 3. Configure Computer

    13/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.1-1Safety Measures Policies & Procedures in Computer

    Configuration

    Learning objectives

    After reading this information sheet, you must be able to:

    1. Define Computer Health & Safety

    2. Explain the correct procedures in computer configuration

    Occupational health and safety (OHS) refers to the legislation, policies,procedures and activities that aim to protect the health, safety and welfare of all

    people at the workplace.

    Occupational health and safety (OHS)is a cross disciplinary area concerned

    with protecting the safety, health and welfare of people engaged in work oremployment. The goal of all occupational health and safety programs is to foster

    a safe work environment. As a secondary effect, it may also protect co-workers,family members, employers, customers, suppliers nearby communities and othermembers of the public who are impacted by the workplace environment.

    Safetyis the state of being safe (from French sauf), the condition of being

    protected against physical, social, spiritual, financial, political, emotional,

    occupational, psychological, educational or other types or consequences offailure, damage, error, accident, harm or any other event which could beconsidered non-desirable.

    Health is the level of functional and/or metabolic efficiency of a livingbeing. In humans it is the general condition of a person in mind, body and spirit

    usually meaning to Being free from illness, injury or pain (as in good health or healthy).

    Quality of Lifeis used to evaluate the general well-being of individuals andsocieties. The term is used in a wide range of contexts.

  • 7/30/2019 3. Configure Computer

    14/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Every worker has a right to healthy and safe work and to a workenvironment that enables them to live a socially and economically productive life.Safety practices should be learned early and always adhered to when workingwith any electrical device including personal computers and peripherals.

    Personal safety while working with PCs

    Here are some safety precautions to take before working with any computerdevices:

    Before doing anything, listen to your teachers instruction to preventaccidents or any unwanted events that may occur on your workplace.

    Do not work on computer when you are wet because you might getelectrocuted.

    Do not remove internal devices of the computer when it is turned on.

    Be sure not to mix electronic components and water.

    Avoid playing or running while inside the room.

    Always wear personal protective equipments (PPE) like coverall, shoes with

    rubber sole, anti-static wrist strap, etc. Ask for assistance from your teacher when it comes on dealing with

    computer devices.

    Applying safety measure when handling tools and equipment are necessary

    to avoid certain damages.

    The student is further expected to maintain good health, to be neat inpersonal appearance and to practice safe working procedures at all time withappropriate equipment.

    SOP for Computers

    Standard Operating Procedure for Computers

    When you get a computer, there is no list of exactly what to do or how touse it. Your manual will describe some basics about the computer but for day-today use you are left on your own to figure out the procedures for use to keepthings going smoothly.

  • 7/30/2019 3. Configure Computer

    15/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Shutdown

    1. Close all your programs before shutting down the computer.

    2. Click on the shutdown option in the Start menu and wait for it to shutdown.

    3. Shutting down with just the power button can cause problems in theMicrosoft Windows operating system.

    Software

    1. Close all other programs when installing a new program. This preventsproblems with the new program.

    2. Restart after each install. This ensures everything is installed correctly.

    Safety

    1. Keep your computer clean to keep it running well.

    2. Dont eat over the keyboard and avoid spilling drinks near the computer.

    3. Keep the computer in a place where it does not get too hot (above 95o or so)

    4. Plug your computer into a surge protector.

    Security

    1. Install antivirus, antispyware and firewall software to protect your data andkeep others from intruding your computer files.

    2. Shut your computer down when not in use.

    3. Dont share your passwords or write them down where they can be found.

  • 7/30/2019 3. Configure Computer

    16/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Self-Check 3.1-1

    Direction: Read the question carefully and choose the best answer.

    Write only the letter on the space provided.

    _____ 1. OH & S stands for?

    a. Occupation Houses and Street

    b. Occupation Health and Safety

    c. Office Health and Safety

    ______2. It is used to evaluate the general well-being of individuals and societies.The term is used in a wide range of contexts?

    a.Safety

    b.Health

    c.Quality of Life

    _____3. It is the level of functional and/or metabolic efficiency of a living being. Inhumans it is the general condition of a person in mind, body and spirit usuallymeaning to Being free from illness, injury or pain?

    a. Safety

    b.Health

    c.Quality of Life

    _____ 4. It is the condition of being protected against physical, social, spiritual,financial, political, emotional, occupational, psychological, educational or othertypes or consequences or failure, damage error, accidents harm or any otherevent which could be considered non-desirable?

    a.Safety

  • 7/30/2019 3. Configure Computer

    17/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    b.Health

    c.Quality of Life

    _____5. The area concerned with protecting the safety health and welfare ofpeople engaged in work or employment?

    a.Cross-disciplinaryb.X-disciplinary

    c.OH&S disciplinary

    Write the Correct Procedure of the following:

    6. Shutdown

    7. Software

    8. Safety

    9. Security

  • 7/30/2019 3. Configure Computer

    18/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Answer Key 3.1-1

    1. B

    2. C

    3. B

    4. A

    5. A

    6. a. Close all your programs before shutting down the computer.

    b. Click on the shutdown option in the Start menu and wait for it to

    shut down.

    c. Shutting down with just the power button can cause problems in theMicrosoft Windows operating system.

    7. a. Close all other programs when installing a new program. This preventsproblems with the new program.

    b. Restart after each install. This ensures everything is installed correctly.

    8. a. Keep your computer clean to keep it running well.

    b. Dont eat over the keyboard and avoid spilling drinks near thecomputer.

    c. Keep the computer in a place where it does not get too hot (above 95o orso)

    d. Plug your computer into a surge protector.

    9. a. Install antivirus, antispyware and firewall software to protect your dataand keep others from intruding your computer files.

    b. Shut your computer down when not in use.

    c. Dont share your passwords or write them down where they can befound.

  • 7/30/2019 3. Configure Computer

    19/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.1-2Planning & Preparing for Configuration in Systems & Networks

    Learning objectivesAfter reading this information sheet, you must be able to:

    1. Plan & Prepare standard operating procedures

    2. Explain computer networks

    What is a Computer Network?

    A computer network is an interconnected group ofcomputers.

    Computer Network

    In general, the term network can refer to any interconnected group orsystem. More specifically, a network is any method of sharing informationbetween two systems (human or mechanical).

    BENEFITS OF SHARING INFORMATION VIA NETWORK

    http://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computershttp://en.wikipedia.org/wiki/Computers
  • 7/30/2019 3. Configure Computer

    20/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    In addition to reducing hardware costs by sharing expensive printers andother peripherals among multiple users, networks provide additional benefits tothe users.

    Software and data files can be shared for access by multiple users

    Electronic mail (email) can be sent and received Collaboration features allow contributions by multiple users to a single

    document Remote-control programs can be used to troubleshoot problems or shownew users how to perform a task

    SHARED HARDWARE COMPONENTS

    Virtually any storage or output device can be shared over a network, butthe most common devices to be used over a network include:

    Printers

    Disk drives CD-ROM and optical drives

    Modems

    Fax

    Tape backup units

    Network topology

    Network Topology signifies the way in which intelligent devices in thenetwork see their logical relations to one another. The use of the term "logical"

    here is significant. That is, network topology is independent of the "physical"layout of the network. Even if networked computers are physically placed in alinear arrangement, if they are connected via a hub, the network has a Star

    topology, rather than a Bus Topology. In this regard the visual and operationalcharacteristics of a network are distinct; the logical network topology is notnecessarily the same as the physical layout.

    Bus Topology

    It is often used when network installation is small, simple or temporary. On

    a typical bus network the cable is just 1 or more wires with no active electronicsto amplify the signal or pass it along from computer to computer. This makes thebus a passive topology. When 1 computer send a signal up the wire all the

  • 7/30/2019 3. Configure Computer

    21/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    computers receive the information but only one with the address that matchesaccepts the information, the rest disregard the message.

    Bus Topology

    Advantages:1) Easy to use and to understand.2) Requires least amount of cable to connect the computers together. It is

    therefore less expensive than other cabling arrangements.3) It is easy to extend a bus; two cables can be joined into 1 longer cable with aBNC, Barrel connector making a longer cable and allowing more computers tojoin the network.

    Disadvantages:1) Heavy network traffic can slow a bus considerably as only 1 computer cansend a message at a time.2) It is difficult to troubleshoot the bus. A cable break or loose connector causesreflection and stops all the activity.

    STAR TOPOLOGY

    In this kind of topology all the cables run from the computers to the central

    location where they are all connected by a device called hub or switch. Eachcomputer on a star network communicates with a central device that resends themessage either to each computer or only to the destination computer, example ifit is a hub then it will send to all and if it is a switch then it will send to onlydestination computer. When network expansion is expected and when the greater

    reliability is needed, star topology is the best.

  • 7/30/2019 3. Configure Computer

    22/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Star Topology

    Advantages:1) It is easy to modify and add new computers without disturbing the rest of thenetwork.2) The center of the star network is a good place to diagnose the faults.3) Single computer failure does not necessarily bring down the whole starnetwork.

    Disadvantages:1) If the central device fails the whole network fails to operate.2) Star networking is expensive because all network cables must be pulled to onecentral point, requires more cable than other network topologies.

    RING TOPOLOGY

    In this type each computer is connected to the next computer with the lastone connected to the first. Each retransmits what it receives from the previouscomputer. The message flows around the ring in one direction. The ring networkdoes not subject to signal loss problem as a bus network experiences. There is no

    termination because there is no end to the ring.

    Ring Topology

  • 7/30/2019 3. Configure Computer

    23/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Advantages:1) Each node has equal access.2) Capable of high speed data transfer.

    Disadvantages:

    1) Failure of one computer on the ring can affect the whole network.

    2) Difficult to troubleshoot the network.

    Types of networks

    Below is a list of the most common types of computer networks in order of scale.

    Personal Area Network (PAN)

    A personal area network (PAN) is a computer network used forcommunication among computer devices close to one person. Some examples ofdevices that may be used in a PAN are printers, fax machines, telephones, PDAsor scanners. The reach of a PAN is typically within about 20-30 feet(approximately 6-9 meters).

    Personal area networks may be wired with computer buses such as USB]and FireWire. A wireless personal area network (WPAN) can also be madepossible with network technologies such asBluetooth.

    Personal Area Network

    Local Area Network (LAN)

    A network covering a small geographic area, like a home, office, or building.Current LANs are most likely to be based on Ethernet technology. For example, alibrary will have a wired or wireless LAN for users to interconnect local devices

    (e.g., printers and servers) and to connect to the internet. All of the PCs in thelibrary are connected bycategory 5 (Cat5) cable, running the IEEE 802.3 protocolthrough a system of interconnection devices and eventually connect to the

    http://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Category_5_cablehttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/FireWirehttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Universal_Serial_Bus
  • 7/30/2019 3. Configure Computer

    24/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    internet. The cables to the servers are on Cat 5e enhanced cable, which willsupport IEEE 802.3 at 1 GB/s.

    The staff computers (bright green) can get to the color printer, checkoutrecords, and the academic network and the Internet. All user computers can getto the Internet and the card catalog. Each workgroup can get to its local printer.Note that the printers are not accessible from outside their workgroup.

    Local Area Network

    Client/Server Vs Peer-to-Peer Networks

    Although every computer on a LAN is connected to every other, they do notnecessarily mean all communicate with each other. There are two basic types ofLAN, based on communication patterns between the machines, calledclient/server networks and peer-to-peer networks.

    Client/Server Networks

    Every computer has a distinct role, that of either a client or a server. A

    serveris designed to share its resources among client computers on the network.The Client/Server is composed of:

    Hub

    Server

    Workgroup ofComputers

  • 7/30/2019 3. Configure Computer

    25/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Servers

    These are located in secured areas, such as locked closets and datacenters, because they hold the organization's most valuable data and do nothave the accessed by operators on a continuous basis.

    The server runs a special network operating system such as: Windows NTServer, Windows 2000 or Novell Netware.

    Clients

    -The rest of the computers on the network function as client. A clientstandard PC that is running an operating system such as DOS or Windows.

    Example of Client/Server

    Peer-to-Peer Network

    In a peer-to-peer network, every computer is equal and can communicatewith other computer on a network to which it has been granted access rights.Essentially, every computer in this network functions as both server and client.Peer-to-peer network can be as small as two computers as many as hundreds ofunits.

    There is no theoretical limit to the size of a peer-to-peer network,performance drops significantly and security becomes a major headache on peer -based network with more than 10 computers. Also, Microsoft imposes a 10-

    Hub

    Server

    ClientWorkstations

  • 7/30/2019 3. Configure Computer

    26/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    station limit on computers running Windows 2000 Professional who are sharingresources with other system. For this reason, it is better you switch to aclient/server network when your network climbs to 10 stations.

    Example of Peer-to-Peer Network

    CAMPUS AREA NETWORK (CAN)

    A network that connects two or more LANs but that is limited to a specificand contiguous geographical area such as a college campus, industrial complex,or a military base. A CAN may be considered a type of MAN (metropolitan areanetwork), but is generally limited to an area that is smaller than a typical MAN.This term is most often used to discuss the implementation of networks for a

    contiguous area. This should not be confused with aController Area Network.

    Campus Area Network

    Metropolitan Area Network (MAN)

    A Metropolitan Area Network is a network that connects two or more LocalArea Networks or Campus Area Networks together but does not extend beyond

    http://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Networkhttp://en.wikipedia.org/wiki/Controller_Area_Network
  • 7/30/2019 3. Configure Computer

    27/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    the boundaries of the immediate town, city, or metropolitan area. Multiplerouters, switches & hubs are connected to create a MAN.

    Metropolitan Network

    Wide Area Network (WAN)

    A WAN is a data communications network that covers a relatively broad

    geographic area (i.e. one city to another and one country to another country) andthat often uses transmission facilities provided by common carriers, such as

    telephone companies. WAN technologies generally function at the lower threelayers of the OSI reference model: thephysical layer, thedata link layer, and thenetwork layer.

    Wide Area Network

    Global Area Network (GAN)

    Global area networks (GAN) specifications are in development by severalgroups, and there is no common definition. In general, however, a GAN is a modelfor supporting mobile communications across an arbitrary number of wireless

    http://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Physical_layerhttp://en.wikipedia.org/wiki/OSI_model
  • 7/30/2019 3. Configure Computer

    28/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    LANs, satellite coverage areas, etc. The key challenge in mobile communicationsis "handing off" the user communications from one local coverage area to thenext. In IEEE Project 802, this involves a succession of terrestrialWireless localarea networks (WLAN).

    Global Area Network

    Internetwork

    Two or more networks or network segments connected using devices thatoperate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such asa router. Any interconnection among or between public, private, commercial,industrial, or governmental networks may also be defined as an internetwork.

    In modern practice, the interconnected networks use the Internet Protocol.There are at least three variants of internetwork, depending on who administers

    and who participates in them:

    Intranet

    Extranet

    Internet

    Intranets and extranets may or may not have connections to the Internet. Ifconnected to the Internet, the intranet or extranet is normally protected frombeing accessed from the Internet without proper authorization. The Internet is

    not considered to be a part of the intranet or extranet, although it may serve as aportal for access to portions of an extranet.

    Intranet

    An intranet is a set of interconnected networks,using the Internet Protocol and uses IP-based toolssuch as web browsers and ftp tools, that is under the

    http://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LAN
  • 7/30/2019 3. Configure Computer

    29/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    control of a single administrative entity. That administrative entity closes theintranet to the rest of the world, and allows only specific users. Most commonly,an intranet is the internal network of a company or other enterprise.

    Extranet

    An extranet is a network or internetwork that is

    limited in scope to a single organization or entity butwhich also has limited connections to the networks of one ormore other usually, but not necessarily, trustedorganizations or entities (e.g. a company's customersmay be given access to some part of its intranet creating inthis way an extranet, while at the same time the customersmay not be considered 'trusted' from a security

    standpoint). Technically, an extranet may also becategorized as a CAN, MAN, WAN, or other type of network,although, by definition, an extranet cannot consist of a singleLAN; it must have at least one connection with anexternal network.

    Internet

    A specific internetwork, consisting of a worldwide interconnection ofgovernmental, academic, public, and private networks based upon theAdvancedResearch Projects Agency Network (ARPANET) developed by ARPA of the U.S.Department of Defensealso home to the World Wide Web(WWW) and referredto as the 'Internet' with a capital 'I' to distinguish it from other genericinternetworks.

    Participants in the Internet, or their service providers, use IP Addresses

    obtained from address registries that control assignments. Service providers andlarge enterprises also exchange information on the reach ability of their addressranges through theBorder Gateway Protocol(BGP).

    http://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/Border_Gateway_Protocolhttp://en.wikipedia.org/wiki/IP_Addresshttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/United_States_Department_of_Defensehttp://en.wikipedia.org/wiki/Defense_Advanced_Research_Projects_Agencyhttp://en.wikipedia.org/wiki/ARPANEThttp://en.wikipedia.org/wiki/ARPANET
  • 7/30/2019 3. Configure Computer

    30/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    SELF-CHECK 3.1-2

    I. Identify the following. Choose your answer from the grid below. Use a separate sheetof paper in answering.

    ______________ 1. The World Wide Web.

    ______________ 2. The internal network of a company or other enterprise.

    ______________ 3. A model for supporting mobile communications across anarbitrary number of wireless LANs.

    ______________ 4. A data communications network that covers a relativelybroad geographic area.

    ______________ 5. A network that connects two or more Local Area Networksor Campus Area Networks together.

    ______________ 6. It signifies the way in which intelligent devices in thenetwork see their logical relations to one another

    ______________ 7. It is the interconnected group of computers.

    ______________ 8. A network covering a small geographic area, like a home.

    ______________ 9. All the cables run from the computers to the centrallocation where they are all connected by hub.

    ______________10. Each computer is connected to the next computer with thelast one connected to the first.

    http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/World_Wide_Web
  • 7/30/2019 3. Configure Computer

    31/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Answer Key 3.1-2

    1. Internet

    2. Intranet

    3. GAN

    4. WAN

    5. MAN

    6.Topology

    7. Network

    8. LAN

    9. Star topology

    10. Ring topology

  • 7/30/2019 3. Configure Computer

    32/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.1-3

    Procedures in Using the Tools & Equipments

    Learning objectives

    After reading this information sheet, you must be able to:

    1. Demonstrates the materials needed in configuration

    2. Explain the use of the tools and equipments

    These are the following materials needed in the Configuration task:

    1. Connectors- It is used to connect external devices to the computer system.

    2. Adapter- A piece of hardware that plugs into an expansion slot in your computer.

    3. Wires and Cables- It is used to connect computers for network.

  • 7/30/2019 3. Configure Computer

    33/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    4. Appropriate software- This software packages are used to install new drivers needed in setting

    up your computer.

    5. Computer storage media- These help you in saving data and providing backup for your files such as

    diskette, compact disc, flash drives and memory cards.

    6. Reference book- These are books that will provide you topics about networking or related

    books on computer.

  • 7/30/2019 3. Configure Computer

    34/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    7. Manuals- These provide you instructions for certain operation or task.

    8. Cable tie-It is used to organized wires and cables used in connecting computers to

    avoid tangling.

    These are the following tools/ testing devices needed in the configuration task:

    1. Screw drivers

    Flat screw driveris use to fasten negative slotted screws.

  • 7/30/2019 3. Configure Computer

    35/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Philips Screw driveris used to fasten positive slotted screws.

    2. Pliers Side Cutter pliers is used for cutting and trimming of

    connecting wires or terminal leads in the circuit board. Long nose pliers is used for holding, bending andstretching the lead of electronics component andconnecting wire.

    3. Soldering iron/gun

    It is used to join two or more metal conductors with the support ofsoldering lead melted around it.

    4. Multi-tester It is used by technician for measuring current, voltage and resistance.

    5. Magnifying glass

    It is a device made in glass with handle, to exaggerate or to increase theapparent size of an object.

  • 7/30/2019 3. Configure Computer

    36/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    6. Safety apparel suit (coverall)- It is used by the person for protect to his body.

    7. Anti-static wrist strap- It absorbs the static electricity of the material when being hold by the

    hands.

    8. Tweezers- It is used to hold the small sensitive part of the computer.

  • 7/30/2019 3. Configure Computer

    37/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    9. Mini-vacuum cleaner- It is used for cleaning sensitive parts of the computer.

    Note: Apply safety precautions when handling the materials, tools andtesting devices for safe keeping purposes and long lasting use.

  • 7/30/2019 3. Configure Computer

    38/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Self-Check 3.1-3

    I. Identify the following. Use a separate sheet of paper in answering.

    ______________ 1. It is a tool used to hold the small sensitive parts of computer.

    ______________ 2. A device made in glass with handle, to exaggerate or to increasethe apparent size of an object.

    ______________ 3. It is an instrument used by technician for measuring current,voltage and resistance.

    ______________ 4. It is a tool used for cutting and trimming of connecting wires orterminal leads in the circuit board.

    ______________ 5. It is a tool used to join two or more metal conductors with thesupport of soldering lead melted around it.

    ______________ 6. It is a material used to organize wires and cables used inconnecting computers to avoid tangling.

    ______________ 7. These are the materials that are used in saving data andproviding backup for your files such as diskette, compact disc,

    flash drives and memory cards.

    ______________ 8. It is a piece of hardware that plugs into an expansion slot inyour computer.

    ______________ 9. It is a reference material that provides you instructions for

    certain operation or task.

    ______________ 10. It is a tool used for holding, bending and stretching the lead ofelectronics component and connecting wire.

  • 7/30/2019 3. Configure Computer

    39/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Answer Key 3.1-3

    1.Tweezers

    2. Magnifying Glass

    3. Multi-tester

    4. Side Cutter Pliers

    5. Soldering iron/gun

    6. Cable tie

    7. Computer storage media

    8. Adapter

    9. Manuals

    10.Long nose pliers

  • 7/30/2019 3. Configure Computer

    40/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    `

    Task Sheet 3.1-3

    Title: Demonstrate uses of tools and materials

    Performance Objectives:

    Choose five materials, tools and testing devices discussed in the lesson.Demonstrate the use of the following tools and materials.

    Supplies : Materials

    Equipment : LCD Projector

    Steps/Procedure:

    1. Pick out five materials, tools and testing devices

    2. Demonstrate the use of the following tools and materials

    Assessment Method:

    Demonstration using the Performance Criteria Checklist

  • 7/30/2019 3. Configure Computer

    41/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Performance Criteria Checklist 3.1-3

    CRITERIADoes your output have the following?

    YES NO

    Has demonstrated and discussed five materials

    Has demonstrated and discussed five tools

    Proper handling of tools and materials

    Safety Precautions are observed.

  • 7/30/2019 3. Configure Computer

    42/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    LEARNING OUTCOME # 2 CONFIGURE COMPUTER SYSTEMS & NETWORKS

    CONTENTS:

    1. Occupational Health & safety

    2. Testing normal function of system & network

    3. Procedures in checking the faults or problems

    4. Procedures in configure systems & networks

    ASSESSMENT CRITERIA:

    1.Appropriate personal protective equipment are used and OHS policies &

    procedures followed

    2.Normal function of systems & network checked in accordance with

    manufacturers instruction

    3.Fault or problem in the systems and networks diagnosed in line with the

    standard operating procedures4.Computer systems and networks configured in line with the standard

    operating procedures

    CONDITION:

    Trainees must be provided with the following:

    OH & S policies and procedures

    - OH & S policies

    - manuals

    Computer systems and networks

    - 1 Server- Peripherals

  • 7/30/2019 3. Configure Computer

    43/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    - 1 Desktop Computers

    Materials

    - Wires and Cables- Appropriate Software

    - Computer Storage Media

    Tools- Pliers

    - Philips screw driver

    Equipment/testing devices

    - Computer

    Personal protective equipment

    - Anti-static wrist wrap

    ASSESSMENT METHOD:

    Hands-on application Direct observation

    Practical demonstration

  • 7/30/2019 3. Configure Computer

    44/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    LEARNING EXPERIENCES

    Learning Outcome 2

    CONFIGURE COMPUTER SYSTEMS AND NETWORKS

    Learning Activities Special Instructions

    1.Read Information Sheet 3.2-1 ontesting normal function ofsystems & networks

    2.Answer Self-Check 3.2-1

    Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    3.Check Answers by comparing

    with the answer key4.Read Information Sheet 3.2-2 on

    testing normal function of

    systems & networks

    5.Answer Self-Check 3.2-2

    Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    6.Check Answers by comparingwith the answer key

  • 7/30/2019 3. Configure Computer

    45/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    7.Perform job sheet 3.2-2

    8.Evaluate your own work usingthe performance criteria checklist

    9.Read Information Sheet 3.2-3 ontesting normal function of

    systems & networks

    10. Answer Self-Check 3.2-3

    Do not write anything on the module

    Prepare a separate sheet of paper onthe Self-Check and Activity.

    11. Check Answers bycomparing with the answer key

    12. Perform job sheet 3.2-13

    13. Evaluate your own workusing the performance criteriachecklist

  • 7/30/2019 3. Configure Computer

    46/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.2-1Testing Normal Function of Systems & Networks

    Learning objectives

    After reading this information sheet, you must be able to:1. Identify protective equipment

    2. Describe normal functions of systems & networks

    Personal Protective Equipment

    You must wear/use something in order to protect yourself againstunexpected harm that may arise while performing certain tasks. Different jobsused different gadgets or suits to prevent unexpected harmful events that mayhurt us. The equipments below may be used as PPE:

    Gogglesis used to prevent tiny particles from entering our eyes.

    Coverall/apron- is worn by a person to prevent his body or clothesfrom any types of dirt.

    Glovesare used in handling object without hurting your hands.

    Dust maskis used to cover the mouth and nose from tiny particleswhen cleaning computer peripherals.

    Shoes with rubber sole and rubber matare used to avoid us formslippery.

    Anti-static wrist strap -It absorbs the static electricity of the material

    when being hold by the hands.

    gloves coverall with rubber matdust mask

  • 7/30/2019 3. Configure Computer

    47/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Manufacturers Instruction Guide

    Manufacturers Instruction Guide or simply manual may be a big help foryou especially when you bought new materials or appliances at home. You donthave to be professional to operate the material but by just following theprocedure/steps listed on the manual, it may lightens your work. Manual usuallycovers all the functions and steps in configuring the material and/or on how tooperate it. Manuals also provide steps in troubleshooting.

    This is an example of what you may see on a Manufacturers InstructionGuide.

    How to install a wired network adapter

    To connect to a network, your computer needs a network adapter.Fortunately, most computer manufacturers know that connecting to the Internetor other computers is important to computer users, and they include a networkadapter with your computer.

    If you need to add a network adapter, first choose which method you wantto use to install it. Most people prefer to use a USB (Universal Serial Bus)network adapter, because it's easy to install. If you have a portable computer,you might find a CardBus (also known as PCMCIA or PC Card) or CF networkadapter better meets your needs. If you have a desktop computer with the properamount of available space, you may also have the option of adding an internalnetwork adapter.

    The instructions you follow to install a network adapter depend on how youconnect it.

    goggles apron shoes with anti-staticrubber soles wrist strap

  • 7/30/2019 3. Configure Computer

    48/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    How to determine if you have a network adapter

    Many newer computers have a network adapter built in thatyou can use to connect to a wired network. If you want to install awired network adapter and aren't sure whether your computer

    already has one, look for a network port on the back of the computer. Networkports resemble phone jacks, but they are slightly larger and have eight pinsinside.

    To see what kind of network adapters may already be installed in yourcomputer.

    1. Click the Start, and then click Control Panel

    2. Under or pick a Control Panel icon, click Network Connections

    3. Microsoft Windows XP displays your network adapters. If an adapterhas a red X over it, it is disconnected. If the Network Connectionswindow is blank, your computer doesn't have a network adapter.

    4. If you already have a network adapter, you are ready to configure yournetwork.

    How to install a wired USB network adapter

    Once you have the adapter

    If your USB network adapter came with software, insert the CD or

    floppy disk into your computer, and follow the manufacturer'sinstructions to install the software.

    Find an available USB port on your computer.

    Note: If you need to move your computer to reach the USBports, you should shut down Windows to avoid damaging your

    computer. If you can easily reach a USB port, you need notshut down your computer.

    http://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspxhttp://www.microsoft.com/windowsxp/using/networking/setup/wired.mspx
  • 7/30/2019 3. Configure Computer

    49/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    If you do not have an unused USB port, connect a USB hub to addadditional ports. Then connect your USB network adapter to the unused

    USB port.

    Connect the network cable to the network adapter.

    5. Connect the other end of the network cable to your networkingequipment.

    6.If you had to shut down your computer to get to the USB port, you cannow turn on your computer. Windows detects and installs the newhardware, and then displays a notification informing you that the

    hardware has been successfully installed.

    5.

    http://www.windowsmarketplace.com/results.aspx?text=usb+hubhttp://www.windowsmarketplace.com/results.aspx?text=usb+hubhttp://www.windowsmarketplace.com/results.aspx?text=usb+hub
  • 7/30/2019 3. Configure Computer

    50/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    SELF-CHECK 3.2-1

    I. Give the functions of the following PPE Use a separate sheet of paper inanswering.

    Goggles

    __________________________________________________________________________________________________________

    __________________________________________________________________________________________________________

    Coverall

    ____________________________________________________________________________________________________________________________________________________________________________________________________________________

    Apron____________________________________________________________________________________________________________________________________________________________________________________________________________________

    Gloves

    _____________________________________________________

    __________________________________________________________________________________________________________

    _____________________________________________________

  • 7/30/2019 3. Configure Computer

    51/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Answer Key 3.2-1

    1. Goggles-used to prevent tiny particles from entering our eyes.

    2. Coverall-worn to prevent the body or clothes from any types of dirt3. Apron-also worn to protect the body from dirt

    4. Gloves-used in handling objects without hurting the hands

  • 7/30/2019 3. Configure Computer

    52/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.2-2Procedure in Checking the Faults or Problems

    Learning objectives

    After reading this information sheet, you must be able to demonstrate theprocedures in checking the faults or problems of computer.

    Today's computers have faster microprocessors, more memory and biggerhard drives. When you think about the differences between a Pentium 4 and 386,

    you have to conclude the improvement is astounding! But when error attacks ourcomputer we have to do something for the computers to survive. Here are some ofthe common faults and problems that we may encounter:

    1. Why computer becomes slow?

    You need more memory.

    Don't overlook the obvious. Up until recently not having enough memorywasn't a problem. With the price of RAM becoming very affordable, most peoplewere filling their computers with more than enough memory to do the job. If yourcomputer is slow and it has lower capacity of RAM, you need to add morememory to speed it up.

  • 7/30/2019 3. Configure Computer

    53/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Spyware and viruses

    Spyware. It is a software program that intentionallyinstalled on the computer by the user to monitor or spy onwhat the other users of the same computer is doing.

    you do realize for them to be effective, you have to keep up todate. By up to date, it means up to the minute.

    Virus. A software program, macro or script that has beendesigned to infect, destroy, modify or cause other problemswith computer or software program.

    Background programs

    When you install new software on your computer, often times you install it torun in the background every time you start up. Most times you do this withoutknowing it. Look at the bottom right hand side of your screen.

    If you see several icons there, you have extra programs running and stealingresources. Right click on these and see if you have the option of closing them.Many times, you can open the program and choose an option to keep theseprograms from starting automatically.

    Corrupted registry

    Any changes you make to your computer effects and actually, it corrupts yourregistry even when you do something positive like remove spyware and you endup with a corrupted registry.

    After months of corrupting your registry, it will becomegood. This will, in its early stages, cause your computer to slow

    down. In its advanced stages, it will freeze and crash and domore mysterious and troublesome things.

    5. After I pressed the Power button...

  • 7/30/2019 3. Configure Computer

    54/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Nothing happened

    Check mains plug switched on at wall

    PSU may have its own power switch - check this is on

    Check PSU-to-Motherboard cable(s) are correctly connected

    Check front panel power switch is correctly connected

    Check Reset button is not stuck 'in'

    Check mains cable fuse

    There was a loud bang (possibly with smoke) at the back of the PC Case

    PSU was faulty or set to incorrect voltage for mains supply system. ReplacePSU

    PC is on but monitor shows no display and a sequence of beeps emits fromthe PC

    Check fitting of CPU, RAM, Video card, sound card etc. If necessary,

    remove and refit these components Check the motherboard manual and perform a BIOS reset procedure

    This may indicate a faulty motherboard

    PC is on but monitor shows no display and one beep emits from the PC

    Check monitor is switched on at the wall socket

    Check monitor power cable is connected correctly

    Check that the monitor's signal cable is connected correctly to both the PCand Monitor

    Check that the monitor is switched on at its front panel

    This may indicate a faulty video card

    PC is on but there are no power and/or HDD lights on the PC case frontpanel

    Check correct connection of front panel connectors to the motherboard (seemotherboard manual)

    This 'may' indicate a faulty Motherboard

    PC is on but HDD does not spin up

    Check power connector to HDD is properly connected

  • 7/30/2019 3. Configure Computer

    55/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Check IDE ribbon cable is correctly connected to both Motherboard andHDD

    This may indicate a faulty Hard Drive

    PC is on but CD-ROM shows no lights/will not eject tray

    Check power connector to CD-ROM is properly connected

    Check IDE ribbon cable is correctly connected to both Motherboard andCD-ROM

    This may indicate a faulty CD-ROM Drive

    PC is on but the CPU fan/fans do not spin

    Disconnect the power immediately to prevent damage to the CPU fromoverheating

    Check fan power cables are correctly connected to the relevant powerconnector (in most cases, a motherboard FAN connector or one of the PSUpower connectors)

    Disconnect the power and carefully spin the fan blades with a finger. Ifthere is any resistance to this movement, this may indicate a faulty fanunit

    On boot up, the monitor shows corrupted display

    Check seating of CPU, RAM, Video card, soundcard etc. If necessary, remove and refit thesecomponents

    Check the motherboard manual and perform aBIOS reset procedure

    This may indicate a faulty Motherboard or Videocard

    On boot up, display shows incorrect CPU type/speed

    Check the motherboard manual for the appropriate CPU jumper settings(where applicable)

    Check BIOS settings for CPU type (see Motherboard Manual)

    Perform a BIOS reset procedure

    Perform a BIOS update (with an updated BIOS, the Motherboard may

    support your CPU) This may indicate a faulty/old motherboard

  • 7/30/2019 3. Configure Computer

    56/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    On boot up, display shows incorrect RAM total

    Check correct seating of Memory Modules in slots

    In cases of two or more modules, this may indicate a faulty module

    This may indicate a faulty/old motherboard

    On boot up, display shows - FDD/Keyboard/Mouse not found (or similar)

    Check correct connection of device described, In the case of the FDD, checkits ribbon and power connections

    Check that the BIOS is configured correctly for the device described

    This may indicate a fault with the described device or Motherboard

    The monitor shows no picture

    Is the power light on?

    Are the cables plugged in?

    Check brightness and contrast settings.

    Swap the monitor with another one, reboot the machine and see if it works.If the computer works the monitor has probably gone bad. If it still fails towork, something in the CPU perhaps a video card has gone bad.

    Computer displays limited colors.

    Check display options for the monitor usually under control panel underthe display icon. Select at least 256 colors for standard display. If you had16 color selected, this may be why your screen displays limited colors.Some programs such as FastCat require you to set display settings to 256colors.

    Signs ofVideo Display Troubles

    If your screen is completely white or gray and you hear buzzing noises, thiscould indicate video card troubles. Before you panic, make sure all cables aresecured from monitor to CPU. Try using another power cord for the monitor to

    see if this may be the problem.

    http://webopedia.internet.com/TERM/v/video_adapter.htmlhttp://webopedia.internet.com/TERM/v/video_adapter.html
  • 7/30/2019 3. Configure Computer

    57/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    If screen appears distorted around the edges and the color does not lookright, you may have incorrect display adapters. Select Start, Settings, andControl Panel. Double click on System Icon and select Device Manager. You willsee a listing of devices. Double click on Display adapters to view the type. Ifthere is a yellow exclamation point next to device, there is a conflict. To view

    conflicts for a certain device, click on the device, select properties, and select thegeneral tab. There should be a description of the device and why it is not

    working properly.

    Printer Does Not Print.

    Are all cables connected and is the printer turned on?

    Is the printer online? Is there paper in the tray?

    Is the printer an Inkjet/Deskjet or a Laserjet?

    If it's an inkjet, is the ink cartridge out of ink. Remove cartridge, hold up tolight or gently shake it to see if it is empty.

    Things to Try

    Do you have correct print drivers installed? Find print drivers under DeviceManager.

    Check to be sure you have correct print drivers installed. Double click onSystem Icon and select Device Manager. You will see a listing of devices.Double click on the Ports button to view the type. If there is a yellowexclamation point next to device, there is a conflict.

    http://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Managerhttp://d/Assemblywoman/Desktop/cherlyn-%20research/standard.htm%23Device%2520Manager
  • 7/30/2019 3. Configure Computer

    58/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Task Sheet 3.2-1

    Title: Identifying Common Faults and Errors of Computer

    Performance Objectives:

    Given the necessary tools, materials and equipment identify the common

    faults and errors of computer when you detached the following materials:

    Devices Port

    - Keyboard - PS/2

    - Mouse - PS/2

    - Hard disk - IDE cable

    - Floppy disk drive - IDE cable

    - CD-Rom drive - IDE cable

    - RAM chip - Memory slot

    Supplies : Materials

    Equipment : System Unit, Monitor, Keyboard, Mouse, PrinterSteps/Procedure:

    1. Check correct connection of device described, In the case of the FDD, check

    its ribbon and power connections2. Check that the BIOS is configured correctly for the device described3. Check seating of CPU, RAM, Video card, sound card etc. If necessary,

    remove and refit these components4. Check the motherboard manual and perform a BIOS reset procedure

    Assessment Method:

    Demonstration Assessment using the Performance Criteria Checklist

  • 7/30/2019 3. Configure Computer

    59/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Performance Criteria Checklist 3.2-1

    CRITERIA

    Does your output have the following?

    YES NO

    Safety Precautions are observed.

    All the peripherals are properly inspected.

    Standard checking of different peripherals is strictly note.

    Proper boot-up and shutdown of the computer is observed.

  • 7/30/2019 3. Configure Computer

    60/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    INFORMATION SHEET 3.2-3Procedure in Configure Systems & Networks

    Learning objectives

    After reading this information sheet, you must be able to configurecomputer systems and networks.

    How to Configure a Peer Network in Windows 98

    To create a peer network, you must have the following components:

    A network interface or Local Area Network (LAN) adapter for each computer. The

    same manufacturer and model of network card is preferred. Cabling that is supported by the network cards.

    Windows 98 drivers for the network cards.

    A common network protocol.

    A unique computer name for each computer.

    To create a peer network, follow these steps for each computer connected to thenetwork:

    1. Shut down the computer and install the network card and appropriatecabling for each computer.

    NOTE: For information about how to configure your network adaptersand physically connect your computers, consult the documentation includedwith your network adapters or contact the manufacturer(s) of your networkadapters.

    2. Start Windows and install the network drivers. Windows may detect yournetwork card and install the drivers when you start the computer. If the

  • 7/30/2019 3. Configure Computer

    61/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    network card drivers are not included with Windows, follow the manufacturer'sinstructions about how to install the network drivers.

    .

    3. Choose a client and a common protocol for each computer. To do this, followthese steps:

    a. Click Start, point to Settings, click Control Panel, and then double-clickNetwork.

    b. Click Add, click Client, and then click Add.

    c.In the Manufacturers box, click the appropriate manufacturer, click theappropriate client in the Network Clients box, and then click OK.

    d. Click Add, click Protocol, and then click Add.

    e.In the Manufacturers box, click the appropriate manufacturer, click theappropriate protocol in the Network Protocol box, and then click OK.

    Follow the instructions to finish installing the network client and protocol.

    .

    4. Configure a peer server. Each computer that is configured for File andPrinter Sharing can act as a server. To configure a computer for File andPrinter Sharing, use the following steps:

    a.Click Start, point to Settings, click Control Panel, and then double-click Network.

    b.Click File and Print Sharing, click one or both options to share filesand printers, click OK, and then click OK again.

    c.Click Yes when you are prompted to restart your computer.

    .

    5. Give each computer a unique computer name. To do this, use thefollowing steps:

    a.Click Start, point to Settings, click Control Panel, and then double-click Network.

    b.On the Identification tab, type a unique name in the Computer namebox.

    c.

    Click OK, and then click Yes when you are prompted to restart yourcomputer.

  • 7/30/2019 3. Configure Computer

    62/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    NOTE: The computer name must be unique for eachcomputer on the network and should be no more than 15 characters inlength. In small networks, the workgroup name should be the same foreach computer so that all computers are visible in the same workgroupwhen browsing. You should not use spaces or the following charactersin computer and workgroup names:/ \ * , . " @

    Windows XP Networking

    As in previous versions of Windows, Windows XP provides a wizard fornetwork connection setup. Wizards break down a task into individual stepsand guide the user through the steps one at a time.

    The Windows XP New Connection Wizard supports two basic types ofInternet connections,dialupandbroadband.

    To access the network connection setup wizard in Windows XP,navigate through the Start menu to the Connect To and Show allconnections options as shown below.

    The same feature is also accessible via the Network Connections iconin Control Panel.

    http://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-broadband.htmhttp://compnetworking.about.com/library/glossary/bldef-dialup.htm
  • 7/30/2019 3. Configure Computer

    63/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Choosing either of the above options causes a new window to appearon the desktop as shown below. On the right, this window displays icons forany pre-existing connections. The Create a new connection option on theleft allows new connections to be set up.

    Types of Windows XPNetwork Connection Setup

    Clicking the Create a new connection option from theNetworkConnections dialogactivates the wizard as shown below.

    http://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htmhttp://compnetworking.about.com/library/weekly/aa091902a.htm
  • 7/30/2019 3. Configure Computer

    64/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    Clicking Next presents the user with three main choices for Internetand private network setup as shown below.

    The Connect to the Internet option supports several types of Internet

    connection setup. This option allows the user to choose from a list of ISPs,use a setup CD-ROM provided by their ISP, or set up a connection manually.

    Connect to the network at my workplace supports client-side set upof both dialup remote access and VPN services.

    The Set up an advanced connection option supports serial, paralleland infrared port networking setups. This option also allows the user toenable certain types of incoming network connections.

    Setting up an Internet Connection

    The Getting Ready page presents three choices as shown below:

    The Choose from a list of Internet Service Providers option givesinstructions for setting up an account with anISP, then making the Internetconnection through that new account.

    The Set up my connection manually option sets up connections foraccounts that have already been opened with an ISP (username andpassword are ready for use).

    The Use the CD I got from an ISP option should be used whenpossessing an installation CD-ROM from one of the service providers.

    http://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htmhttp://compnetworking.about.com/library/glossary/bldef-isp.htm
  • 7/30/2019 3. Configure Computer

    65/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans B. de la Cruz

    Revision # : 00

    By default the first option Get online with MSN (Microsoft Network) isselected. To set up a new connection to MSN, click Finish. To set up a newconnection to various other ISPs, change the radio button selection to thesecond option and then click Finish.

    MSN Internet Connection Setup

    After choosing MSN and clicking Finish, the Windows XP networkconnection wizard closes and a new window opens as shown below.

  • 7/30/2019 3. Configure Computer

    66/95

    B H ICBLMs on Computer

    Hardware Servicing NC II

    Configuring Computer

    Systems & Networks

    Date Developed:

    April 2, 2013

    Date Revised:

    Document No.

    Issued by:

    Bishop Haden InstitutePage

    Developed by:

    Hans