cblm format
TRANSCRIPT
COMPETENCY-BASED LEARNING MATERIAL
SECTOR: INFORMATION and COMMUNICATIONS TECHNOLOGY
QUALIFICATION:COMPUTER HARDWARE SERVICING - NC II
UNIT OF COMPETENCY:CONFIGURE COMPUTER SYSTEMS AND NETWORKS
MODULE TITLE:CONFIGURING COMPUTER SYSTEMS AND NETWORKS
POWER SKILLS TECHNICAL CENTER
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 1 of
20Developed by:
LFMJR Revision # 00
PLEASE PICTURE/GRAPHICS HERE RELATED TO MODULE TITLE
HOW TO USE THIS COMPETENCY- BASED LEARNING MATERIAL
Welcome!
The unit of competency, “Configure Computer System and Networks”, is one of the competencies of Computer Hardware Servicing NC II course. a course which comprises the knowledge, skills and attitudes required for a TVET trainer to possess.
The module, “Configure Computer System and Networks”,, contains training materials and activities related to identifying learner’s requirements, preparing session plan, preparing basic instructional materials and organizing learning and teaching activities for you to complete.
In this module, you are required to go through a series of learning activities in order to complete each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not hesitate to ask for assistance from your facilitator.
Remember to: • Work through all the information and complete the activities in each section.
• Read information sheets and complete the self-check. Suggested references are included to supplement the materials provided in this module.
• Most probably, your trainer will also be your supervisor or manager. He is there to support you and show you the correct way to do things.
• You will be given plenty of opportunities to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way, you will improve your speed, memory and your confidence.
• Use the Self-Checks, Operation Sheets or Task or Job Sheets at the end of each section to test your own progress. Use the Performance Criteria Checklist or Procedural Checklist located after the sheet to check your own performance.
• When you feel confident that you have had sufficient practice, ask your Trainer to evaluate you. The results of your assessment will be recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next module,
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 2 of
20Developed by:
LFMJR Revision # 00
QUALIFICATION : COMPUTER HARDWARE SERVICING- NC II
UNIT OF COMPETENCY: CONFIGURECOMPUTER SYSTEMS AND NETWORKS
UNIT CODE : ELC724320
MODULE TITLE : CONFIGURING COMPUTER SYSTEMS AND NETWORKS
INTRODUCTION : This module covers the knowledge, skills and attitude needed to Configure computer systems and networks. And to obtain the proper procedures required in Configuring Computer Systems and Networks. And that they will apply the proper OH&S procedures in configuring.
NOMINAL DURATION : 100 HOURS
LEARNING OUTCOMES :
At the end of this module, you will be able to:1. Plan and prepare for configuration2. Configure computer systems and networks3. Inspect and test configured computer systems and networks
ASSESSMENT CRITERIA:
1. Configured computer systems and networks identified from the Job/Service Order or instructions.
2. Planned and prepared job requirements.3. Followed OHS policies and procedures of job requirements.4. Checked computer systems and networks configuration with
specified requirements.5. Checked necessary tools, equipment materials 6. Interpreted work instructions according to job requirements.7. Diagnosed faults or problems on the systems and networks8. Configured the identified systems and networks
9. Checked configured systems and networks to ensure safety
10. Documented the tasks undertaken
PRE-REQUISITE : BASIC AND COMMON COMPETENCIES
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 3 of
20Developed by:
LFMJR Revision # 00
LEARNING OUTCOME #1: PLAN AND PREPARE FOR CONFIGURATION
CONTENTS: 1. Basic Computer System Configuration2. Basic Network Configuration3. Occupational Health and Safety Policies and Procedures4. Tools, equipments and Materials needed for Configuring and
Their Uses5. Terms , Commands and Symbols in Configuring
ASSESSMENT CRITERIA: 1. Configured computer systems and networks identified from the
Job/Service Order or instructions.2. Planned and prepared job requirements.3. Followed OHS policies and procedures of job requirements.4. Checked computer systems and networks configuration with
specified requirements.5. Tools, equipment, and testing devices that conform to OHS
standards are used to accomplish the task.
RESOURCES:
Information Sheet Slides Computer Self-Check Answer Key Performance Criteria Checklist Tool Room Tools Equipment Operation Sheet
ASSESSMENT METHOD:
Written examination Practical examination
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 4 of
20Developed by:
LFMJR Revision # 00
LEARNING EXPERIENCES
LEARNING OUTCOME #1: PLAN AND PREPARE FOR CONFIGURATION
Learning Activities Special Instruction
1. Read Information Sheet 2.1-1 on basic computer system configuration. 2. Answer Self-Check for 2.1-1. Compare to answer key 2.1-1.3. Read Information Sheet 2.1-2
on basic network configuration.4. Answer Self-Check for 2.1-2 Compare to answer key 2.1-2.5. Read Information Sheet 2.1-3
on occupational health and safety policies and procedures.
6. Answer Self-Check for 2.1-3. Compare to answer key 2.1-3.7. Guided by Information Sheet
2.1-4, proceed to the tool room and familiarize yourself with the different tools, equipments and materials needed for configuring and their uses
Observe safety in the workplace.
8. Answer Self-Check for 2.1-4 Compare to answer key 2.1-49. Perform Operation Sheet on
2.1-4 on identifying tools and equipment for configuration according to job requirement.
Observe safety in the workplace.
10. Read Information Sheet 2.1-5 on different terms and symbols used in configuring.
11. Answer Self-Check 2.1.-5 Compare to answer key 2.1-5.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 5 of
20Developed by:
LFMJR Revision # 00
INFORMATION SHEET 2.1-1BASIC COMPUTER SYSTEM CONFIGURATION
Learning Objectives:
After reading this Information Sheet, the trainee must be able to:1. Familiarize the basic configurations in a computer system2. Identify the major system files in a computer system3. distinguish the functions of each configuration
Major System Files (Part 1)
You are required to identify the names, locations, purposes and contents of major system files. The following tables show these files for Windows 9x, NT, 200x and XP.
Windows 9x Specific Files
File Location Description
IO.SYS Root A binary executable file that is loaded when the computer is booted. It contains the information required to start your computer. It replaces config.sys and autoexec.bat in later versions of Windows.
MSDOS.SYS Root A text file that contains the start-up and configuration variables and settings. It is loaded by io.sys.
AUTOEXEC.BAT Root This is a batch file containing several commands that will automatically run when the computer starts.
COMMAND.COM Rootand
Windows
This is the command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt. It contains several internal DOS commands to assist in the management of the system which are loaded into memory.
CONFIG.SYS Root This contains commands to tell the operating system how to set up the computer system. It specifies how the main memory will be managed, i.e. it programs the way hardware devices will be controlled and can set limits on system
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 6 of
20Developed by:
LFMJR Revision # 00
resources.
HIMEM.SYS Root A system file which enables the real-mode memory drivers. It must be present in config.sys for Windows to load. It enables extended memory (using device=himem.sys).
EMM386.EXE Root This is used to emulate expanded memory using extended memory.
WIN.COM Windows An executable file that starts Windows. Type win at the DOS prompt to start Windows.
SYSTEM.INI Windows This stores the information about the PC's system environment, including device drivers, DOS application execution and internal Windows settings.
WIN.INI Windows This contains entries that tell Windows which programs to load and run, and defines the screen, keyboard, mouse, display and fonts.
SYSTEM.DAT Windows One of the two files that make up the registry.
USER.DAT Windows One of the two files that make up the registry.
File Description
BOOT.INI This contains information that Ntldr (the NT loader) uses to display the start-up menu. It also contains information on where the boot partition is and the text to display while the system is loading. Other system parameters can be included.
NTLDR This is loaded from the boot sector and starts the loading of the operating system.
NTDETECT.COM
This detects the hardware on a system and matches it against the registry database.
NTBOOTDD.SYS
This stores information about disk drives including drivers for SCSI devices.
NTUSER.DAT This stores the settings for each user. If the user logs onto a computer that is part of a domain, this information is retrieved from the server. For added security and to stop the user from changing settings this file extension can be changed to (.man (mandatory) and if absent the user will not be able to log on.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 7 of
20Developed by:
LFMJR Revision # 00
All the above files are located in the root directory of the boot drive apart from NTUSER.DAT which is located in the user's documents and settings folder
\
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 8 of
20Developed by:
LFMJR Revision # 00
SELF-CHECK 2.1-1
This is a test on how far have you learned from the Information Sheet. Perform what is/are asked in the test. Do not look at the Answer Key before taking the test. Be HONEST.
I. MULTIPLE CHOICESDIRECTION: Select the letter of the best answer. Write your
answer on the Answer Sheet provided for.
1. A binary executable file that is loaded when the computer is booted.A. CONFYG.SYS C. NTDETECT.COM B. IO.SYS D. COMMAND.COM
2. This is a batch file containing several commands that will automatically run when the computer starts.A. IO.SYS C. AUTOEXEC.EXEB. MSDOS.SYSD. AUTOEXEC.BAT
3. EMM386.EXE is used to emulate expanded file using . A. flash drive C. operating systemB. extended memory D. memory card
4. This is a command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt.A. AUTOEXEC.BAT C. CONFYG.SYSB. COMMAND.COM D. CMD.EXE
5. Where can I find BOOT.INI file.A. Local Disk A: C. Local Disk C:B. Local Disk B: D. Local Disk D:
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 9 of
20Developed by:
LFMJR Revision # 00
Compare your answers with the Answer Key on the next page. If you get 80% and above, then you may proceed to the next activity but if not, master the lesson and take the Self-Check again.
ANSWER KEY 2.1-1
I. MULTIPLE CHOICES1. __B__ 2. __D__ 3. __B__ 4. __B__ 5. __C__
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 10 of
20Developed by:
LFMJR Revision # 00
INFORMATION SHEET 2.1-2“BASIC NETWORK CONFIGURATION”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:1. Identify the basic concepts in networking 1. Analyze the different networking topologies2. Compare the different networking configurations
What is a Network?In general, the term network can refer to any interconnected
group or system. More specifically, a network is any method of sharing information between two systems (human or mechanical).
A computer network is an interconnected group of computers.
A network is a communication of two computers or nodes that shares information vice versa and links each other’s resources.
BENEFITS OF SHARING INFORMATION VIA NETWORK
In addition to reducing hardware costs by sharing expensive printers and other peripherals among multiple users, networks provide additional benefits to the users.
Software and data files can be shared for access by multiple users Electronic mail e-mail can be sent and received Collaboration features allow contributions by multiple users to a
single document Remote-control programs can be used to troubleshoot problems or
show new users how to perform a task
SHARED HARDWARE COMPONENTS Virtually, any storage or output device can be shared over a network, but the most common devices to be used over a network include:
Printers Disk drives CD-ROM and optical drives Modems Fax Tape backup units
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 11 of
20Developed by:
LFMJR Revision # 00
Network TOPOLOGY
Network Topology signifies the way in which intelligent devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.
Advantages: o Easy to use and to understand. o Requires least amount of cable to connect the computers
together. It is therefore less expensive than other cabling arrangements.
o It is easy to extend a bus; two cables can be joined into 1 longer cable with a BNC, Barrel connector making a longer cable and allowing more computers to join the network.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 12 of
20Developed by:
LFMJR Revision # 00
Bus Topology It is often used when network
installation is small, simple or temporary. On a typical bus network the cable is just 1 or more wires with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bus a passive topology. When 1 computer sends a signal up the wire all the computers receive the information but only one with the address that matches accepts the information, the rest disregard the message.
Disadvantages: o Heavy network traffic can slow a bus considerably as only 1
computer can send a message at a time. o It is difficult to troubleshoot the bus. A cable break or loose
connector causes reflection and stops all the activity.
Advantages: o It is easy to modify and add new computers without disturbing
the rest of the network. o The center of the star network is a good place to diagnose the
faults. o Single computer failure does not necessarily bring down the
whole star network.
Disadvantages: o If the central device fails, the whole network fails to operate. o Star networking is expensive because all network cables must
be pulled to one central point, requires more cable than other network topologies.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 13 of
20Developed by:
LFMJR Revision # 00
STAR TOPOLOGY In this kind of topology all the
cables run from the computers to the central location where they are all connected by a device called hub or switch. Each computer on a star network communicates with a central device that resends the message either to each computer or only to the destination computer, example if it is a hub then it will send to all and if it is a switch then it will send to only destination computer. When network expansion is expected and when the greater reliability is needed, star topology is the best.
RING TOPOLOGY In this type each computer is connected to the next computer with the last one connected to the first. Each retransmits what it receives from the previous computer. The message flows around the ring in one direction. The ring network does not subject to signal loss problem as a bus network experiences. There is no termination because there is no end to the ring.
Advantages: Each node has equal
access. Capable of high speed data
transfer.
Disadvantages: Failure of one computer on the ring can affect the whole
network. Difficult to troubleshoot the network.
Types of networks Below is a list of the most common types of computer networks in
order of scale.
Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 14 of
20Developed by:
LFMJR Revision # 00
printers, fax machines, telephones, PDA’s or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 meters).
Local Area Network (LAN) A network covering a small
geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 GB/s.
The staff computers (bright green) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.
Client/Server Vs Peer-to-Peer Networks
Although every computer on a LAN is connected to every other, they do not necessarily mean all communicate with each other. There are two basic types of LAN, based on communication patterns between the machines, called client/server networks and peer-to-peer networks.
Client/Server NetworksEvery computer has a distinct role, that of either a client or a server.
A server is designed to share its resources among client computers on the network. The Client/Server is composed of:
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 15 of
20Developed by:
LFMJR Revision # 00
Servers
These are located in secured areas, such as locked closets and data centers, because they hold the organization's most valuable data and do not have the accessed by operators on a continuous basis.
The server runs a special network operating system such as: Windows NT Server, Windows 2000 or Novell Netware. \
Clients
The rest of the computers on the network functions as client. A client standard PC that is running an operating system such as DOS or Windows.
Peer-to-Peer NetworkIn a peer-to-peer network,
every computer is equal and can communicate with other computer on a network to which it has been granted access rights. Essentially, every computer in this network functions as both server and client. Peer-to-peer network can be as small as two computers as many as hundreds of units.
There is no theoretical limit to the size of a peer-to-peer network, performance drops significantly and security becomes a major headache on peer -based network with more than 10 computers. Also, Microsoft imposes a 10-station limit on computers running Windows 2000 Professional who are sharing resources with other system. For this reason, it is better you switch to a client/server network when your network climbs to 10 stations.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 16 of
20Developed by:
LFMJR Revision # 00
Example of Peer-to-Peer Network
CAMPUS AREA NETWORK (CAN) A network that connects
two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network.
Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN.
Wide Area Network (WAN)A WAN is a data
communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 17 of
20Developed by:
LFMJR Revision # 00
often uses transmission facilities provided by common carriers, such as telephone companies.
Global Area Network (GAN)Global area networks
(GAN) specifications are in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless local area networks (WLAN).
Internetwork Two or more networks or network segments connected using
devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork. In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:
• Intranet • Extranet • Internet
Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.
Intranet
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 18 of
20Developed by:
LFMJR Revision # 00
An intranet is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as web browsers and ftp tools, that is under the control of a single administrative entity. That administrative entity closes the intranet to the rest of the world, and allows only specific users. Most commonly, an intranet is the internal network of a company or other enterprise.Extranet
An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g. a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
InternetA specific internetwork,
consisting of a worldwide interconnection of governmental, academic, public, and private networks based upon the Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the U.S. Department of Defense – also home to the World Wide Web (WWW) and referred to as the 'Internet' with a capital 'I' to distinguish it from other generic internetworks. Participants in the Internet, or their
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 19 of
20Developed by:
LFMJR Revision # 00
service providers, use IP Addresses obtained from address registries that control assignments.
SELF-CHECK 2.1-2
I. Identify the following. Choose your answer from the grid below. Use a separate sheet of paper in answering.
1. The WORLD WIDE WEB.
2. The internal network of a company or other enterprise.
3. A model for supporting mobile communications across an arbitrary number of wireless LANs.
4. A data communications network that covers a relatively broad geographic area.
5. A network that connects two or more Local Area Networks or Campus Area Networks together.
6. It signifies the way in which intelligent devices in the network see their logical relations to one another.
7. It is the interconnected group of computers.
8. A network covering a small geographic area, like a home.
9. All the cables run from the computers to the central location where they are all connected by hub.
10. Each computer is connected to the next computer with the last one connected to the first.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 20 of
20Developed by:
LFMJR Revision # 00
ANSWER KEY 2.1-2
1. Internet2. Intranet 3. GAN 4. WAN 5. MAN6. Topology 7. Network 8. LAN 9. Star topology
10. Ring topology
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 21 of
20Developed by:
LFMJR Revision # 00
INFORMATION SHEET 2.1-3OCCUPATIONAL HEALTH & SAFETY
POLICIES AND PROCEDURES
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:1. learn the proper OH&S Policies and Procedures before
configuring 2. Identify safety precautions before and during configuration.
Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that aim to protect the health, safety and welfare of all people at the workplace.
Every worker has a right to healthy and safe work and to a work environment that enables them to live a socially and economically productive life. Safety practices should be learned early and always adhered to when working with any electrical device including personal computers and peripherals.
Personal safety while working with PC’s
Here are some safety precautions to take before working with any computer devices:
Before doing anything, listen to your teacher’s instruction to prevent accidents or any unwanted events that may occur on your workplace.
• Do not work on computer when you are wet because you might get electrocuted.
• Do not remove internal devices of the computer when it is turned on.
• Be sure not to mix electronic components and water.
• Avoid playing or running while inside the room.
• Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, .
• Ask for assistance from your teacher when it comes on dealing with computer devices.
• Applying safety measure when handling tools and equipment are necessary to avoid certain damages.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 22 of
20Developed by:
LFMJR Revision # 00
SELF-CHECK 2.1-3
Give the best answer for every question:
I. Enumeration, Identify what is/are required in the following items.
A. OH & S Policies and Procedures in configuringB. Personal Protective Equipment during configuration
II. True or FalseWrite true if the statement is true and false if not.
1. Be sure to mix electronic components and water.
2. Applying safety measure when handling tools and equipment are necessary to avoid certain damages.
3. Do not remove internal devices of the computer when it is turned on.
4. Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that does not aim to protect the health, safety and welfare of all people at the workplace.
5. Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, etc.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 23 of
20Developed by:
LFMJR Revision # 00
ANSWER KEY 2.1-3
I. Enumeration 1.
• Do not work on computer when you are wet because you might get electrocuted.
• Do not remove internal devices of the computer when it is turned on.
• Be sure not to mix electronic components and water.
• Avoid playing or running while inside the room.
• Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, .
• Ask for assistance from your teacher when it comes on dealing with computer devices.
• Applying safety measure when handling tools and equipment are necessary to avoid certain damages.
2. Cover all, Shoes with rubber sole Anti-static wrist strap
II. True or False1. F2. T3. T4. F5. T
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 24 of
20Developed by:
LFMJR Revision # 00
INFORMATION SHEET 2.1-4“TOOLS, EQUIPMENT ANDMATERIAL IN CONFIGURING”
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:3. Identify proper tools, equipments and materials in
configuring computer systems and networks 4. Discuss the used of tools , equipments and materials in
configuring computer systems and networks
These are the following materials needed in the Configuration task:
1. Connectors - It is used to connect external devices to the computer system.
2. Adapter- A piece of hardware that plugs into an expansion slot in your computer.
3. Wires and Cables - It is used to connect computers for network.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 25 of
20Developed by:
LFMJR Revision # 00
4. Appropriate software - This software packages are used to install new drivers needed in setting up your computer.
5. Computer storage media - These help you in saving data and providing backup for your files such as diskette, compact disc, flash drives and memory cards.
6. Reference book- These are books that will provide topics about networking or related books on computer.
7. Manuals -These provide instructions for certain operation or task.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 26 of
20Developed by:
LFMJR Revision # 00
8. Cable tie - It is used to organized wires and cables used in connecting computers to avoid tangling.
These are the following tools/ testing devices needed in the configuration task:
1. Screw drivers
-Flat screw driver is used to fasten negative slotted screws.
-Philips Screw driver is used to fasten positive slotted screws.
2. Pliers
-Side Cutter pliers is used for cutting and trimming of connecting wires or terminal leads in the circuit board.
- Long nose pliers is used for holding, bending and stretching the lead of electronics component and connecting wire.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 27 of
20Developed by:
LFMJR Revision # 00
3. Soldering iron/gun- It is used to join two or more metal
conductors with the support of soldering lead melted around it.
4. Multi-tester- It is used by technician for measuring
current, voltage and resistance.
5. Magnifying glass-It is a device made of glass with handle.
It exaggerates or increase the apparent size of an object.
6. Safety apparel suit (coverall)- It is used by the person for body protection.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 28 of
20Developed by:
LFMJR Revision # 00
7. Anti-static wrist strap-It absorbs the static electricity of thematerial when being hold by the hands.
9. Tweezers-It is used to hold the small
sensitive part of the computer.
10. Mini-vacuum cleaner- It is used for cleaning sensitive parts of the computer.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 29 of
20Developed by:
LFMJR Revision # 00
SELF-CHECK 2.1-4
I. Identify what is asked in the following questions.
1. It is a tool used to hold the small sensitive parts of
computer.
2. A device made glass with handle, to exaggerate or to
increase the apparent size of an object.
3. It is an instrument used by technician for measuring
current, voltage and resistance.
4. It is a tool used for cutting and trimming of connecting wires
or terminal leads in the circuit board.
5. It is a tool used to join two or more metal conductors with
the support of soldering lead melted around it.
6. It is a material used to organize wires and cables used in
connecting computers to avoid tangling.
7. These are the materials that are used in saving data and
providing backup for your files such as diskette, compact
disc, flash drives and memory cards.
8. It is a piece of hardware that plugs into an expansion slot in
your computer.
9. It is a reference material that provides you instructions for
certain operation or task.
10. It is a tool used for holding, bending and stretching the
lead of electronics component and connecting wire.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 30 of
20Developed by:
LFMJR Revision # 00
ANSWER KEY 2.1-4
I. Identification
1. tweezers
2. magnifying glass
3. multi-tester
4. side-cutter pliers
5. soldering iron
6. cable tie
7. Computer Storage device
8. adapter
9. manuals
10. long nose pliers
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 31 of
20Developed by:
LFMJR Revision # 00
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 32 of
20Developed by:
LFMJR Revision # 00
OPERATION SHEET 2.1-4
Title: IDENTIFYING TOOLS, EQUIPMENTS AND MATERIALS ACCORDING TOJOB REQUIREMENTS
Performance Objective: After the task, you must know the appropriate tools, materials and testing devices according to job requirements.
Supplies/Materials : tool room, tools, equipments, materials,
Steps/Procedure:
1. Get TASK/JOB REQUIREMENT from your trainer.
2. Go to the Tool room and identify, select appropriate tools, materials and testing devices according to job requirements.
3. Present output to trainer and discuss their uses.
Assessment Method: Performance Test with Oral Questioning
Performance Criteria Checklist
CRITERIA Yes NO Job requirements are analyzed correctly.
Tools, materials and testing devices are identified and selected correctly according to job requirement.
OHS practices are followed.
Uses of tools and testing devices are explained
REMARKS:
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
____________________________Trainer
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 33 of
20Developed by:
LFMJR Revision # 00
INFORMATION SHEET 2.1-5TERMS AND SYMBOLS IN CONFIGURING
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:1. Learn the different terms and symbols in configuring 2. interpret electrical symbols and codes3. use appropriate in configuring
ACRONYMS:
ATX – Advance Technology Attachment RAM – Random Access Memory DRAM – Dynamic Random Access Memory EDO RAM – Extended Data Output Random Access Memory SDRAM – Synchronous Dynamic Random Access Memory BIOS – Basic Input Output System ISA – Industry Standard Architecture PCI – Peripheral Component Interconnect EISA – Extended Industry Standard Architecture VESA – Video Electronics Standard Association IDE – Integrated Drive Electronics SCSI – Small Computer System Interface CMOS – Complementary Metal-Oxide Semiconductor ROM – Read Only Memory DDR – Double Data Rate CPU – Central Processing Unit UDMA – Ultra Direct Memory Access
ELECTRONIC SYMBOLS:NAME SYMBOL
Resistor
Variable resistor
Capacitor
NAME SYMBOL
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 34 of
20Developed by:
LFMJR Revision # 00
Variable Capacitor
Coil or Inductor
Diode
Zener Diode
Loud Speaker
Transistor
Transformer
Fuse
Relay
Battery
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 35 of
20Developed by:
LFMJR Revision # 00
NAME SYMBOLMicrophone
GroundSwitch (SPST)
Single Pole Single Throw
Switch (SPDT)Single Pole
Double Throw
Switch ( DPST)Double Pole Single Throw
Switch ( DPDT)Double Pole
Double Throw
Computer Terms:
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 36 of
20Developed by:
LFMJR Revision # 00
access time - The performance of a hard drive or other storage device - how
long it takes to locate a file.
active program or window - The application or window at the front
(foreground) on the monitor.
alert (alert box) - a message that appears on screen, usually to tell you
something went wrong.
alias - an icon that points to a file, folder or application (System 7).
apple menu - on the left side of the screen header. System 6 = desk
accessories System 7 = up to 50 items.
application - a program in which you do your work.
application menu - on the right side of the screen header. Lists running
applications.
ASCII (pronounced ask-key ) - American Standard Code for Information
Interchange. a commonly used data format for exchanging information
between computers or programs.
background - part of the multitasking capability. A program can run and
perform tasks in the background while another program is being used in the
foreground.
bit - the smallest piece of information used by the computer. Derived from
"binary digit". In computer language, either a one (1) or a zero (0).
backup - a copy of a file or disk you make for archiving purposes.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 37 of
20Developed by:
LFMJR Revision # 00
boot - to start up a computer.
bug - a programming error that causes a program to behave in an
unexpected way.
bus - an electronic pathway through which data is transmitted between
components in a computer.
byte - a piece of computer information made up of eight bits.
card - a printed circuit board that adds some feature to a computer.
cartridge drive - a storage device, like a hard drive, in which the medium is
a cartridge that can be removed.
CD-ROM - an acronym for Compact Disc Read-Only Memory.
Chooser - A desk accessory used to select a printer, or other external device,
or to log onto a network.
Clipboard - A portion of memory where the Mac temporarily stores
information. Called a Copy Buffer in many PC applications because it is
used to hold information which is to be moved, as in word processing where
text is "cut" and then "pasted".
Clock Rate (MHz) - The instruction processing speed of a computer
measured in millions of cycles per second (i.e., 200 MHz).
command - the act of giving an instruction to your Mac either by menu
choice or keystroke.
command (apple) key - a modifier key, the Command key used in
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 38 of
20Developed by:
LFMJR Revision # 00
conjunction with another keystroke to active some function on the Mac.
compiler - a program the converts programming code into a form that can
be used by a computer.
compression - a technique that reduces the size of a saved file by
elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)
control key - seldom used modifier key on the Mac.
control panel - a program that allows you to change settings in a program
or change the way a Mac looks and/or behaves.
CPU - the Central Processing Unit. The processing chip that is the "brains"
of a computer.
crash - a system malfunction in which the computer stops working and has
to be restarted.
cursor - The pointer, usually arrow or cross shaped, which is controlled by
the mouse.
daisy chaining - the act of stringing devices together in a series (such as
SCSI).
database - an electronic list of information that can be sorted and/or
searched.
data - (the plural of datum) information processed by a computer.
defragment - (also - optimize) to concatenate fragments of data into
contiguous blocks in memory or on a hard drive.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 39 of
20Developed by:
LFMJR Revision # 00
desktop - 1. the finder. 2. the shaded or colored backdrop of the screen.
desktop file - an invisible file in which the Finder stores a database of
information about files and icons.
dialog box - an on-screen message box that appears when the Mac requires
additional information before completing a command.
digitize - to convert linear, or analog, data into digital data which can be
used by the computer.
disk - a spinning platter made of magnetic or optically etched material on
which data can be stored.
disk drive - the machinery that writes the data from a disk and/or writes
data to a disk.
disk window - the window that displays the contents or directory of a disk.
document - a file you create, as opposed to the application which created it.
DOS - acronym for Disk Operating System - used in IBM PCs.
DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed
page or on the computer screen.
download - to transfer data from one computer to another. (If you are on the
receiving end, you are downloading. If you are on the sending end, you are
uploading ).
drag - to move the mouse while its button is being depressed.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 40 of
20Developed by:
LFMJR Revision # 00
drag and drop - a feature on the Mac which allows one to drag the icon for a
document on top of the icon for an application, thereby launching the
application and opening the document.
driver - a file on a computer which tells it how to communicate with an add-
on piece of equipment (like a printer).
Ethernet - a protocol for fast communication and file transfer across a
network.
expansion slot - a connector inside the computer which allows one to plug
in a printed circuit board that provides new or enhanced features.
extension - a startup program that runs when you start the Mac and then
enhances its function.
fibre channel - as applied to data storage and network topology - file - the
generic word for an application, document, control panel or other computer
data.
finder - The cornerstone or home-base application in the Mac environment.
The finder regulates the file management functions of the Mac (copying,
renaming, deleting...)
floppy - a 3.5 inch square rigid disk which holds data. (so named for the
earlier 5.25 and 8 inch disks that were flexible).
folder - an electronic subdirectory which contains files.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 41 of
20Developed by:
LFMJR Revision # 00
font - a typeface that contains the characters of an alphabet or some other
letterforms.
footprint - The surface area of a desk or table which is occupied by a piece
of equipment.
fragmentation - The breaking up of a file into many separate locations in
memory or on a disk.
freeze - a system error which causes the cursor to lock in place.
gig - a gigabyte = 1024 megabytes.
hard drive - a large capacity storage device made of multiple disks housed
in a rigid case.
high density disk - a 1.4 MB floppy disk.
highlight - to select by clicking once on an icon or by highlighting text in a
document.
icon - a graphic symbol for an application, file or folder.
initialize - to format a disk for use in the computer; creates a new directory
and arranges the tracks for the recording of data.
insertion point - in word processing, the short flashing marker which
indicates where your next typing will begin.
installer - software used to install a program on your hard drive.
interrupt button - a tool used by programmers to enter the debugging
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 42 of
20Developed by:
LFMJR Revision # 00
mode. The button is usually next to the reset button.
K - short for kilobyte.
keyboard shortcut - a combination of keystrokes that performs some
function otherwise found in a pull down menu.
kilobyte - 1024 bytes.
landscape - in printing from a computer, to print sideways on the page.
launch - start an application.
Measurements (summary) - *a bit = one binary digit (1 or 0) *"bit" is derived from the contraction bit (binary digit) -> 8 bits = one byte*1024 bytes = one kilobyte*K = kilobyte*Kb = kilobit*MB = megabyte*Mb = megabit*MB/s = megabytes per second*Mb/s = megabits per second*bps = bits per secondi.e., 155 Mb/s = 19.38 MB/s
MB - short for megabyte.
megabyte - 1024 kilobytes.
memory - the temporary holding area where data is stored while it is being
used or changed; the amount of RAM a computer has installed.
menu - a list of program commands listed by topic.
menu bar - the horizontal bar across the top of the Mac¹s screen that lists
the menus.
multi finder - a component of System 6 that allows the Mac to multi task.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 43 of
20Developed by:
LFMJR Revision # 00
multi tasking - running more than one application in memory at the same
time.
nanosecond - one billionth of a second. ( or, the time between the theatrical
release of a Dudley Moore film and the moment it begins to play on
airplanes).
native mode - using the computers original operating system; most
commonly used when talking about the PowerPC can run software written
for either the 80x0 systems, or the PowerPC¹s RISC code.
Nu-Bus - expansion slots on the Mac which accept intelligent, self-
configuring boards. Nu-Bus is different bus architecture than the newer PCI
bus and the boards are not interchangeable.
operating system - the system software that controls the computer.
optical disk - a high-capacity storage medium that is read by a laser light.
palette - a small floating window that contains tools used in a given
application.
partition - a subdivision of a hard drives surface that is defined and used
as a separate drive.
paste - to insert text, or other material, from the clipboard or copy buffer.
PC - acronym for personal computer commonly used to refer to an IBM or
IBM clone computer which uses DOS.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 44 of
20Developed by:
LFMJR Revision # 00
PCI - acronym for Peripheral Component Interchange - the newer, faster bus
architecture.
peripheral - an add-on component to your computer.
point - (1/72") 12 points = one pica in printing.
pop-up menu - any menu that does not appear at the top of the screen in
the menu bar. (may pop up or down)
port - a connection socket, or jack on the Mac.
Power PC - a processing chip designed by Apple, IBM and Motorola (RISC
based).
print spooler - a program that stores documents to be printed on the hard
drive, thereby freeing the memory up and allowing other functions to be
performed while printing goes on in the background.
RAM - acronym for Random-Access Memory.
Resize box - the small square at the lower right corner of a window which,
when dragged, resizes the window.
RISC - acronym for Reduced Instruction Set Computing; the smaller set of
commands used by the PowerPC and Power Mac.
ROM - acronym for Read Only Memory; memory that can only be read from
and not written to.
Root directory - the main hard drive window.
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 45 of
20Developed by:
LFMJR Revision # 00
Save - to write a file onto a disk.
Save as - (a File menu item) to save a previously saved file in a new location
and/or with a new name.
Scroll - to shift the contents of a window to bring hidden items into view.
Scroll bar - a bar at the bottom or right side of a window that contains the
scroll box and allows scrolling.
Scroll box - the box in a scroll bar that is used to navigate through a
window.
SCSI - acronym for Small Computer System Interface.
SCSI address - a number between zero and seven that must be unique to
each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15
SCSI Ids (hexadecimal); however, the length restriction (3 meters) is such
that it is virtually impossible to link 15 devices together.
SCSI port - a 25 pin connector on the back of a Mac (native SCSI port);
used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO)
have a 68 pin connector.
SCSI terminator - a device placed at the end of a SCSI chain to complete
the circuit. (Some SCSI devices are self-terminating, or have active
termination and do not require this plug).
Serial port - a port that allows data to be transmitted in a series (one after
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 46 of
20Developed by:
LFMJR Revision # 00
the other), such as the printer and modem ports on a Mac.
Server - a central computer dedicated to sending and receiving data from
other computers (on a network).
Shut down - the command from the Special menu that shuts down the Mac
safely.
software - files on disk that contain instructions for a computer.
start up disk - the disk containing system software and is designated to be
used to start the computer.
System file - a file in the System folder that allows your Mac to start and
run.
System folder - an all-important folder that contains at least the System file
and the Finder.
32 bit addressing - a feature that allows the Mac to recognize and use more
than 8MB of memory.
title bar - the horizontal bar at the top of a window which has the name of
the file or folder it represents.
upload - to send a file from one computer to another through a network.
Uninterruptible Power Source (UPS)- a constantly charging battery pack
which powers the computer. A UPS should have enough charge to power
your computer for several minutes in the event of a total power failure,
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 47 of
20Developed by:
LFMJR Revision # 00
giving you time to save your work and safely shut down.
UPS - acronym for Uninterruptible Power Source.
virtual memory - using part of your hard drive as though it were "RAM".
SELF-CHECK 2.1-5
I. Matching TypeDirections: match the symbols from the names listed below. Write the letter of your choice.
Symbols Names
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 48 of
20Developed by:
LFMJR Revision # 00
8.
7.
6.
5.
4.
3.
2.
1. NAMES
a. RESISTOR
b. TRANSISTOR
c. LOUD SPEAKER
d. ZENER DIODE
e. TRANSFORMER
f. CAPACITOR
g. COIL/INDUCTOR
h. VARIABLE CAPACITOR
i. DIODE
j. FUSE
k. BATTERY
l. MICROPHONE
POWERSKILLS
Q & ASYSTEM
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:
Document No.Issued by: Page 49 of
20Developed by:
LFMJR Revision # 00
9.
10.
II. IDENTIFICATIONDirections: Identify what is being asked in the following.
1. A central computer dedicated to sending and receiving data
from other computers (on a network).
2. To start up a computer.
3. The disk containing system software and is designated to be
used to start the computer.
4. It is an add-on component to your computer.
5. It a subdivision of a hard drives surface that is defined and used
as a separate drive.
III. ACRONYMSDirections: Give the meaning of the following acronyms.
1. ATX 2. SDRAM3. DRAM 4. PCI 5. IDE 6. SCSI 7. CMOS8. ROM 9. DDR
10. CPU
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:11/23/2013
Document No.Issued by:
Page 1 of 52Developed by:
LFMJR Revision # __
ANSWER KEY 2.1-5
I. MATCHING TYPE1. E2. J3. I4. D5. F6. A7. H8. C9. B
10. G
II. IDENTIFICATION1. SERVER2. BOOT3. START-UP DISK4. PERIPHERAL5. PARTITION
III.ACRONYMS1. ATX – Advance Technology Attachment2. SDRAM – Synchronous Dynamic Random Access Memory3. DRAM – Dynamic Random Access Memory4. PCI – Peripheral Component Interconnect5. IDE – Integrated Drive Electronics6. SCSI – Small Computer System Interface7. CMOS – Complementary Metal-Oxide Semiconductor8. ROM – Read Only Memory9. DDR – Double Data Rate
10. CPU – Central Processing Unit
CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
Date Developed:11/23/2013
Document No.Issued by:
Page 2 of 52Developed by:
LFMJR Revision # __