cblm format

65
COMPETENCY-BASED LEARNING MATERIAL SECTOR: INFORMATION and COMMUNICATIONS TECHNOLOGY QUALIFICATION: COMPUTER HARDWARE SERVICING - NC II POWERSKILLS Q & A SYSTEM CONFIGURE COMPUTER SYSTEMS AND NETWORKS Date Developed: Document No. Issued by: Page 1 of 20 Developed by: LFMJR Revisio n # 00 PLEASE PICTURE/GRAPHICS HERE RELATED TO MODULE TITLE

Upload: gheenzo-moreno

Post on 21-Oct-2015

305 views

Category:

Documents


9 download

TRANSCRIPT

Page 1: CBLM Format

COMPETENCY-BASED LEARNING MATERIAL

SECTOR: INFORMATION and COMMUNICATIONS TECHNOLOGY

QUALIFICATION:COMPUTER HARDWARE SERVICING - NC II

UNIT OF COMPETENCY:CONFIGURE COMPUTER SYSTEMS AND NETWORKS

MODULE TITLE:CONFIGURING COMPUTER SYSTEMS AND NETWORKS

POWER SKILLS TECHNICAL CENTER

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 1 of

20Developed by:

LFMJR Revision # 00

PLEASE PICTURE/GRAPHICS HERE RELATED TO MODULE TITLE

Page 2: CBLM Format

HOW TO USE THIS COMPETENCY- BASED LEARNING MATERIAL

Welcome!

The unit of competency, “Configure Computer System and Networks”, is one of the competencies of Computer Hardware Servicing NC II course. a course which comprises the knowledge, skills and attitudes required for a TVET trainer to possess.

The module, “Configure Computer System and Networks”,, contains training materials and activities related to identifying learner’s requirements, preparing session plan, preparing basic instructional materials and organizing learning and teaching activities for you to complete.

In this module, you are required to go through a series of learning activities in order to complete each learning outcome. In each learning outcome are Information Sheets, Self-Checks, Operation Sheets and Task/Job Sheets. Follow and perform the activities on your own. If you have questions, do not hesitate to ask for assistance from your facilitator.

Remember to: • Work through all the information and complete the activities in each section.

• Read information sheets and complete the self-check. Suggested references are included to supplement the materials provided in this module.

• Most probably, your trainer will also be your supervisor or manager. He is there to support you and show you the correct way to do things.

• You will be given plenty of opportunities to ask questions and practice on the job. Make sure you practice your new skills during regular work shifts. This way, you will improve your speed, memory and your confidence.

• Use the Self-Checks, Operation Sheets or Task or Job Sheets at the end of each section to test your own progress. Use the Performance Criteria Checklist or Procedural Checklist located after the sheet to check your own performance.

• When you feel confident that you have had sufficient practice, ask your Trainer to evaluate you. The results of your assessment will be recorded in your Progress Chart and Accomplishment Chart.

You need to complete this module before you can perform the next module,

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 2 of

20Developed by:

LFMJR Revision # 00

Page 3: CBLM Format

QUALIFICATION : COMPUTER HARDWARE SERVICING- NC II

UNIT OF COMPETENCY: CONFIGURECOMPUTER SYSTEMS AND NETWORKS

UNIT CODE : ELC724320

MODULE TITLE : CONFIGURING COMPUTER SYSTEMS AND NETWORKS

INTRODUCTION : This module covers the knowledge, skills and attitude needed to Configure computer systems and networks. And to obtain the proper procedures required in Configuring Computer Systems and Networks. And that they will apply the proper OH&S procedures in configuring.

NOMINAL DURATION : 100 HOURS

LEARNING OUTCOMES :

At the end of this module, you will be able to:1. Plan and prepare for configuration2. Configure computer systems and networks3. Inspect and test configured computer systems and networks

ASSESSMENT CRITERIA:

1. Configured computer systems and networks identified from the Job/Service Order or instructions.

2. Planned and prepared job requirements.3. Followed OHS policies and procedures of job requirements.4. Checked computer systems and networks configuration with

specified requirements.5. Checked necessary tools, equipment materials 6. Interpreted work instructions according to job requirements.7. Diagnosed faults or problems on the systems and networks8. Configured the identified systems and networks

9. Checked configured systems and networks to ensure safety

10. Documented the tasks undertaken

PRE-REQUISITE : BASIC AND COMMON COMPETENCIES

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 3 of

20Developed by:

LFMJR Revision # 00

Page 4: CBLM Format

LEARNING OUTCOME #1: PLAN AND PREPARE FOR CONFIGURATION

CONTENTS: 1. Basic Computer System Configuration2. Basic Network Configuration3. Occupational Health and Safety Policies and Procedures4. Tools, equipments and Materials needed for Configuring and

Their Uses5. Terms , Commands and Symbols in Configuring

ASSESSMENT CRITERIA: 1. Configured computer systems and networks identified from the

Job/Service Order or instructions.2. Planned and prepared job requirements.3. Followed OHS policies and procedures of job requirements.4. Checked computer systems and networks configuration with

specified requirements.5. Tools, equipment, and testing devices that conform to OHS

standards are used to accomplish the task.

RESOURCES:

Information Sheet Slides Computer Self-Check Answer Key Performance Criteria Checklist Tool Room Tools Equipment Operation Sheet

ASSESSMENT METHOD:

Written examination Practical examination

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 4 of

20Developed by:

LFMJR Revision # 00

Page 5: CBLM Format

LEARNING EXPERIENCES

LEARNING OUTCOME #1: PLAN AND PREPARE FOR CONFIGURATION

Learning Activities Special Instruction

1. Read Information Sheet 2.1-1 on basic computer system configuration. 2. Answer Self-Check for 2.1-1. Compare to answer key 2.1-1.3. Read Information Sheet 2.1-2

on basic network configuration.4. Answer Self-Check for 2.1-2 Compare to answer key 2.1-2.5. Read Information Sheet 2.1-3

on occupational health and safety policies and procedures.

6. Answer Self-Check for 2.1-3. Compare to answer key 2.1-3.7. Guided by Information Sheet

2.1-4, proceed to the tool room and familiarize yourself with the different tools, equipments and materials needed for configuring and their uses

Observe safety in the workplace.

8. Answer Self-Check for 2.1-4 Compare to answer key 2.1-49. Perform Operation Sheet on

2.1-4 on identifying tools and equipment for configuration according to job requirement.

Observe safety in the workplace.

10. Read Information Sheet 2.1-5 on different terms and symbols used in configuring.

11. Answer Self-Check 2.1.-5 Compare to answer key 2.1-5.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 5 of

20Developed by:

LFMJR Revision # 00

Page 6: CBLM Format

INFORMATION SHEET 2.1-1BASIC COMPUTER SYSTEM CONFIGURATION

Learning Objectives:

After reading this Information Sheet, the trainee must be able to:1. Familiarize the basic configurations in a computer system2. Identify the major system files in a computer system3. distinguish the functions of each configuration

Major System Files (Part 1)

You are required to identify the names, locations, purposes and contents of major system files. The following tables show these files for Windows 9x, NT, 200x and XP.

Windows 9x Specific Files

File Location Description

IO.SYS Root A binary executable file that is loaded when the computer is booted. It contains the information required to start your computer. It replaces config.sys and autoexec.bat in later versions of Windows.

MSDOS.SYS Root A text file that contains the start-up and configuration variables and settings. It is loaded by io.sys.

AUTOEXEC.BAT Root This is a batch file containing several commands that will automatically run when the computer starts.

COMMAND.COM Rootand

Windows

This is the command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt. It contains several internal DOS commands to assist in the management of the system which are loaded into memory.

CONFIG.SYS Root This contains commands to tell the operating system how to set up the computer system. It specifies how the main memory will be managed, i.e. it programs the way hardware devices will be controlled and can set limits on system

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 6 of

20Developed by:

LFMJR Revision # 00

Page 7: CBLM Format

resources.

HIMEM.SYS Root A system file which enables the real-mode memory drivers. It must be present in config.sys for Windows to load. It enables extended memory (using device=himem.sys).

EMM386.EXE Root This is used to emulate expanded memory using extended memory.

WIN.COM Windows An executable file that starts Windows. Type win at the DOS prompt to start Windows.

SYSTEM.INI Windows This stores the information about the PC's system environment, including device drivers, DOS application execution and internal Windows settings.

WIN.INI Windows This contains entries that tell Windows which programs to load and run, and defines the screen, keyboard, mouse, display and fonts.

SYSTEM.DAT Windows One of the two files that make up the registry.

USER.DAT Windows One of the two files that make up the registry.

File Description

BOOT.INI This contains information that Ntldr (the NT loader) uses to display the start-up menu. It also contains information on where the boot partition is and the text to display while the system is loading. Other system parameters can be included.

NTLDR This is loaded from the boot sector and starts the loading of the operating system.

NTDETECT.COM

This detects the hardware on a system and matches it against the registry database.

NTBOOTDD.SYS

This stores information about disk drives including drivers for SCSI devices.

NTUSER.DAT This stores the settings for each user. If the user logs onto a computer that is part of a domain, this information is retrieved from the server. For added security and to stop the user from changing settings this file extension can be changed to (.man (mandatory) and if absent the user will not be able to log on.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 7 of

20Developed by:

LFMJR Revision # 00

Page 8: CBLM Format

All the above files are located in the root directory of the boot drive apart from NTUSER.DAT which is located in the user's documents and settings folder

\

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 8 of

20Developed by:

LFMJR Revision # 00

Page 9: CBLM Format

SELF-CHECK 2.1-1

This is a test on how far have you learned from the Information Sheet. Perform what is/are asked in the test. Do not look at the Answer Key before taking the test. Be HONEST.

I. MULTIPLE CHOICESDIRECTION: Select the letter of the best answer. Write your

answer on the Answer Sheet provided for.

1. A binary executable file that is loaded when the computer is booted.A. CONFYG.SYS C. NTDETECT.COM B. IO.SYS D. COMMAND.COM

2. This is a batch file containing several commands that will automatically run when the computer starts.A. IO.SYS C. AUTOEXEC.EXEB. MSDOS.SYSD. AUTOEXEC.BAT

3. EMM386.EXE is used to emulate expanded file using . A. flash drive C. operating systemB. extended memory D. memory card

4. This is a command processor for MS-DOS and Windows 9x. It processes the commands that you type at the command prompt.A. AUTOEXEC.BAT C. CONFYG.SYSB. COMMAND.COM D. CMD.EXE

5. Where can I find BOOT.INI file.A. Local Disk A: C. Local Disk C:B. Local Disk B: D. Local Disk D:

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 9 of

20Developed by:

LFMJR Revision # 00

Compare your answers with the Answer Key on the next page. If you get 80% and above, then you may proceed to the next activity but if not, master the lesson and take the Self-Check again.

Page 10: CBLM Format

ANSWER KEY 2.1-1

I. MULTIPLE CHOICES1. __B__ 2. __D__ 3. __B__ 4. __B__ 5. __C__

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 10 of

20Developed by:

LFMJR Revision # 00

Page 11: CBLM Format

INFORMATION SHEET 2.1-2“BASIC NETWORK CONFIGURATION”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:1. Identify the basic concepts in networking 1. Analyze the different networking topologies2. Compare the different networking configurations

What is a Network?In general, the term network can refer to any interconnected

group or system. More specifically, a network is any method of sharing information between two systems (human or mechanical).

A computer network is an interconnected group of computers.

A network is a communication of two computers or nodes that shares information vice versa and links each other’s resources.

BENEFITS OF SHARING INFORMATION VIA NETWORK

In addition to reducing hardware costs by sharing expensive printers and other peripherals among multiple users, networks provide additional benefits to the users.

Software and data files can be shared for access by multiple users Electronic mail e-mail can be sent and received Collaboration features allow contributions by multiple users to a

single document Remote-control programs can be used to troubleshoot problems or

show new users how to perform a task

SHARED HARDWARE COMPONENTS Virtually, any storage or output device can be shared over a network, but the most common devices to be used over a network include:

Printers Disk drives CD-ROM and optical drives Modems Fax Tape backup units

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 11 of

20Developed by:

LFMJR Revision # 00

Page 12: CBLM Format

Network TOPOLOGY

Network Topology signifies the way in which intelligent devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout.

Advantages: o Easy to use and to understand. o Requires least amount of cable to connect the computers

together. It is therefore less expensive than other cabling arrangements.

o It is easy to extend a bus; two cables can be joined into 1 longer cable with a BNC, Barrel connector making a longer cable and allowing more computers to join the network.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 12 of

20Developed by:

LFMJR Revision # 00

Bus Topology It is often used when network

installation is small, simple or temporary. On a typical bus network the cable is just 1 or more wires with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bus a passive topology. When 1 computer sends a signal up the wire all the computers receive the information but only one with the address that matches accepts the information, the rest disregard the message.

Page 13: CBLM Format

Disadvantages: o Heavy network traffic can slow a bus considerably as only 1

computer can send a message at a time. o It is difficult to troubleshoot the bus. A cable break or loose

connector causes reflection and stops all the activity.

Advantages: o It is easy to modify and add new computers without disturbing

the rest of the network. o The center of the star network is a good place to diagnose the

faults. o Single computer failure does not necessarily bring down the

whole star network.

Disadvantages: o If the central device fails, the whole network fails to operate. o Star networking is expensive because all network cables must

be pulled to one central point, requires more cable than other network topologies.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 13 of

20Developed by:

LFMJR Revision # 00

STAR TOPOLOGY In this kind of topology all the

cables run from the computers to the central location where they are all connected by a device called hub or switch. Each computer on a star network communicates with a central device that resends the message either to each computer or only to the destination computer, example if it is a hub then it will send to all and if it is a switch then it will send to only destination computer. When network expansion is expected and when the greater reliability is needed, star topology is the best.

Page 14: CBLM Format

RING TOPOLOGY In this type each computer is connected to the next computer with the last one connected to the first. Each retransmits what it receives from the previous computer. The message flows around the ring in one direction. The ring network does not subject to signal loss problem as a bus network experiences. There is no termination because there is no end to the ring.

Advantages: Each node has equal

access. Capable of high speed data

transfer.

Disadvantages: Failure of one computer on the ring can affect the whole

network. Difficult to troubleshoot the network.

Types of networks Below is a list of the most common types of computer networks in

order of scale.

Personal Area Network (PAN)

A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 14 of

20Developed by:

LFMJR Revision # 00

Page 15: CBLM Format

printers, fax machines, telephones, PDA’s or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 meters).

Local Area Network (LAN) A network covering a small

geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) and to connect to the internet. All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 GB/s.

The staff computers (bright green) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.

Client/Server Vs Peer-to-Peer Networks

Although every computer on a LAN is connected to every other, they do not necessarily mean all communicate with each other. There are two basic types of LAN, based on communication patterns between the machines, called client/server networks and peer-to-peer networks.

Client/Server NetworksEvery computer has a distinct role, that of either a client or a server.

A server is designed to share its resources among client computers on the network. The Client/Server is composed of:

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 15 of

20Developed by:

LFMJR Revision # 00

Page 16: CBLM Format

Servers

These are located in secured areas, such as locked closets and data centers, because they hold the organization's most valuable data and do not have the accessed by operators on a continuous basis.

The server runs a special network operating system such as: Windows NT Server, Windows 2000 or Novell Netware. \

Clients

The rest of the computers on the network functions as client. A client standard PC that is running an operating system such as DOS or Windows.

Peer-to-Peer NetworkIn a peer-to-peer network,

every computer is equal and can communicate with other computer on a network to which it has been granted access rights. Essentially, every computer in this network functions as both server and client. Peer-to-peer network can be as small as two computers as many as hundreds of units.

There is no theoretical limit to the size of a peer-to-peer network, performance drops significantly and security becomes a major headache on peer -based network with more than 10 computers. Also, Microsoft imposes a 10-station limit on computers running Windows 2000 Professional who are sharing resources with other system. For this reason, it is better you switch to a client/server network when your network climbs to 10 stations.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 16 of

20Developed by:

LFMJR Revision # 00

Page 17: CBLM Format

Example of Peer-to-Peer Network

CAMPUS AREA NETWORK (CAN) A network that connects

two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network.

Metropolitan Area Network (MAN)

A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN.

Wide Area Network (WAN)A WAN is a data

communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 17 of

20Developed by:

LFMJR Revision # 00

Page 18: CBLM Format

often uses transmission facilities provided by common carriers, such as telephone companies.

Global Area Network (GAN)Global area networks

(GAN) specifications are in development by several groups, and there is no common definition. In general, however, a GAN is a model for supporting mobile communications across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile communications is "handing off" the user communications from one local coverage area to the next. In IEEE Project 802, this involves a succession of terrestrial Wireless local area networks (WLAN).

Internetwork Two or more networks or network segments connected using

devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork. In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:

• Intranet • Extranet • Internet

Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.

Intranet

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 18 of

20Developed by:

LFMJR Revision # 00

Page 19: CBLM Format

An intranet is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as web browsers and ftp tools, that is under the control of a single administrative entity. That administrative entity closes the intranet to the rest of the world, and allows only specific users. Most commonly, an intranet is the internal network of a company or other enterprise.Extranet

An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g. a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.

InternetA specific internetwork,

consisting of a worldwide interconnection of governmental, academic, public, and private networks based upon the Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the U.S. Department of Defense – also home to the World Wide Web (WWW) and referred to as the 'Internet' with a capital 'I' to distinguish it from other generic internetworks. Participants in the Internet, or their

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 19 of

20Developed by:

LFMJR Revision # 00

Page 20: CBLM Format

service providers, use IP Addresses obtained from address registries that control assignments.

SELF-CHECK 2.1-2

I. Identify the following. Choose your answer from the grid below. Use a separate sheet of paper in answering.

1. The WORLD WIDE WEB.

2. The internal network of a company or other enterprise.

3. A model for supporting mobile communications across an arbitrary number of wireless LANs.

4. A data communications network that covers a relatively broad geographic area.

5. A network that connects two or more Local Area Networks or Campus Area Networks together.

6. It signifies the way in which intelligent devices in the network see their logical relations to one another.

7. It is the interconnected group of computers.

8. A network covering a small geographic area, like a home.

9. All the cables run from the computers to the central location where they are all connected by hub.

10. Each computer is connected to the next computer with the last one connected to the first.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 20 of

20Developed by:

LFMJR Revision # 00

Page 21: CBLM Format

ANSWER KEY 2.1-2

1. Internet2. Intranet 3. GAN 4. WAN 5. MAN6. Topology 7. Network 8. LAN 9. Star topology

10. Ring topology

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 21 of

20Developed by:

LFMJR Revision # 00

Page 22: CBLM Format

INFORMATION SHEET 2.1-3OCCUPATIONAL HEALTH & SAFETY

POLICIES AND PROCEDURES

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:1. learn the proper OH&S Policies and Procedures before

configuring 2. Identify safety precautions before and during configuration.

Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that aim to protect the health, safety and welfare of all people at the workplace.

Every worker has a right to healthy and safe work and to a work environment that enables them to live a socially and economically productive life. Safety practices should be learned early and always adhered to when working with any electrical device including personal computers and peripherals.

Personal safety while working with PC’s

Here are some safety precautions to take before working with any computer devices:

Before doing anything, listen to your teacher’s instruction to prevent accidents or any unwanted events that may occur on your workplace.

• Do not work on computer when you are wet because you might get electrocuted.

• Do not remove internal devices of the computer when it is turned on.

• Be sure not to mix electronic components and water.

• Avoid playing or running while inside the room.

• Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, .

• Ask for assistance from your teacher when it comes on dealing with computer devices.

• Applying safety measure when handling tools and equipment are necessary to avoid certain damages.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 22 of

20Developed by:

LFMJR Revision # 00

Page 23: CBLM Format

SELF-CHECK 2.1-3

Give the best answer for every question:

I. Enumeration, Identify what is/are required in the following items.

A. OH & S Policies and Procedures in configuringB. Personal Protective Equipment during configuration

II. True or FalseWrite true if the statement is true and false if not.

1. Be sure to mix electronic components and water.

2. Applying safety measure when handling tools and equipment are necessary to avoid certain damages.

3. Do not remove internal devices of the computer when it is turned on.

4. Occupational Health and Safety (OHS) refers to the legislation, policies, procedures and activities that does not aim to protect the health, safety and welfare of all people at the workplace.

5. Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, etc.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 23 of

20Developed by:

LFMJR Revision # 00

Page 24: CBLM Format

ANSWER KEY 2.1-3

I. Enumeration 1.

• Do not work on computer when you are wet because you might get electrocuted.

• Do not remove internal devices of the computer when it is turned on.

• Be sure not to mix electronic components and water.

• Avoid playing or running while inside the room.

• Always wear personal protective equipments (PPE) like coverall, shoes with rubber sole, anti-static wrist strap, .

• Ask for assistance from your teacher when it comes on dealing with computer devices.

• Applying safety measure when handling tools and equipment are necessary to avoid certain damages.

2. Cover all, Shoes with rubber sole Anti-static wrist strap

II. True or False1. F2. T3. T4. F5. T

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 24 of

20Developed by:

LFMJR Revision # 00

Page 25: CBLM Format

INFORMATION SHEET 2.1-4“TOOLS, EQUIPMENT ANDMATERIAL IN CONFIGURING”

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:3. Identify proper tools, equipments and materials in

configuring computer systems and networks 4. Discuss the used of tools , equipments and materials in

configuring computer systems and networks

These are the following materials needed in the Configuration task:

1. Connectors - It is used to connect external devices to the computer system.

2. Adapter- A piece of hardware that plugs into an expansion slot in your computer.

3. Wires and Cables - It is used to connect computers for network.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 25 of

20Developed by:

LFMJR Revision # 00

Page 26: CBLM Format

4. Appropriate software - This software packages are used to install new drivers needed in setting up your computer.

5. Computer storage media - These help you in saving data and providing backup for your files such as diskette, compact disc, flash drives and memory cards.

6. Reference book- These are books that will provide topics about networking or related books on computer.

7. Manuals -These provide instructions for certain operation or task.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 26 of

20Developed by:

LFMJR Revision # 00

Page 27: CBLM Format

8. Cable tie - It is used to organized wires and cables used in connecting computers to avoid tangling.

These are the following tools/ testing devices needed in the configuration task:

1. Screw drivers

-Flat screw driver is used to fasten negative slotted screws.

-Philips Screw driver is used to fasten positive slotted screws.

2. Pliers

-Side Cutter pliers is used for cutting and trimming of connecting wires or terminal leads in the circuit board.

- Long nose pliers is used for holding, bending and stretching the lead of electronics component and connecting wire.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 27 of

20Developed by:

LFMJR Revision # 00

Page 28: CBLM Format

3. Soldering iron/gun- It is used to join two or more metal

conductors with the support of soldering lead melted around it.

4. Multi-tester- It is used by technician for measuring

current, voltage and resistance.

5. Magnifying glass-It is a device made of glass with handle.

It exaggerates or increase the apparent size of an object.

6. Safety apparel suit (coverall)- It is used by the person for body protection.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 28 of

20Developed by:

LFMJR Revision # 00

Page 29: CBLM Format

7. Anti-static wrist strap-It absorbs the static electricity of thematerial when being hold by the hands.

9. Tweezers-It is used to hold the small

sensitive part of the computer.

10. Mini-vacuum cleaner- It is used for cleaning sensitive parts of the computer.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 29 of

20Developed by:

LFMJR Revision # 00

Page 30: CBLM Format

SELF-CHECK 2.1-4

I. Identify what is asked in the following questions.

1. It is a tool used to hold the small sensitive parts of

computer.

2. A device made glass with handle, to exaggerate or to

increase the apparent size of an object.

3. It is an instrument used by technician for measuring

current, voltage and resistance.

4. It is a tool used for cutting and trimming of connecting wires

or terminal leads in the circuit board.

5. It is a tool used to join two or more metal conductors with

the support of soldering lead melted around it.

6. It is a material used to organize wires and cables used in

connecting computers to avoid tangling.

7. These are the materials that are used in saving data and

providing backup for your files such as diskette, compact

disc, flash drives and memory cards.

8. It is a piece of hardware that plugs into an expansion slot in

your computer.

9. It is a reference material that provides you instructions for

certain operation or task.

10. It is a tool used for holding, bending and stretching the

lead of electronics component and connecting wire.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 30 of

20Developed by:

LFMJR Revision # 00

Page 31: CBLM Format

ANSWER KEY 2.1-4

I. Identification

1. tweezers

2. magnifying glass

3. multi-tester

4. side-cutter pliers

5. soldering iron

6. cable tie

7. Computer Storage device

8. adapter

9. manuals

10. long nose pliers

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 31 of

20Developed by:

LFMJR Revision # 00

Page 32: CBLM Format

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 32 of

20Developed by:

LFMJR Revision # 00

OPERATION SHEET 2.1-4

Title: IDENTIFYING TOOLS, EQUIPMENTS AND MATERIALS ACCORDING TOJOB REQUIREMENTS

Performance Objective: After the task, you must know the appropriate tools, materials and testing devices according to job requirements.

Supplies/Materials : tool room, tools, equipments, materials,

Steps/Procedure:

1. Get TASK/JOB REQUIREMENT from your trainer.

2. Go to the Tool room and identify, select appropriate tools, materials and testing devices according to job requirements.

3. Present output to trainer and discuss their uses.

Assessment Method: Performance Test with Oral Questioning

Page 33: CBLM Format

Performance Criteria Checklist

CRITERIA Yes NO Job requirements are analyzed correctly.

Tools, materials and testing devices are identified and selected correctly according to job requirement.

OHS practices are followed.

Uses of tools and testing devices are explained

REMARKS:

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

____________________________Trainer

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 33 of

20Developed by:

LFMJR Revision # 00

Page 34: CBLM Format

INFORMATION SHEET 2.1-5TERMS AND SYMBOLS IN CONFIGURING

Learning Objectives:

After reading this INFORMATION SHEET, YOU MUST be able to:1. Learn the different terms and symbols in configuring 2. interpret electrical symbols and codes3. use appropriate in configuring

ACRONYMS:

ATX – Advance Technology Attachment RAM – Random Access Memory DRAM – Dynamic Random Access Memory EDO RAM – Extended Data Output Random Access Memory SDRAM – Synchronous Dynamic Random Access Memory BIOS – Basic Input Output System ISA – Industry Standard Architecture PCI – Peripheral Component Interconnect EISA – Extended Industry Standard Architecture VESA – Video Electronics Standard Association IDE – Integrated Drive Electronics SCSI – Small Computer System Interface CMOS – Complementary Metal-Oxide Semiconductor ROM – Read Only Memory DDR – Double Data Rate CPU – Central Processing Unit UDMA – Ultra Direct Memory Access

ELECTRONIC SYMBOLS:NAME SYMBOL

Resistor

Variable resistor

Capacitor

NAME SYMBOL

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 34 of

20Developed by:

LFMJR Revision # 00

Page 35: CBLM Format

Variable Capacitor

Coil or Inductor

Diode

Zener Diode

Loud Speaker

Transistor

Transformer

Fuse

Relay

Battery

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 35 of

20Developed by:

LFMJR Revision # 00

Page 36: CBLM Format

NAME SYMBOLMicrophone

GroundSwitch (SPST)

Single Pole Single Throw

Switch (SPDT)Single Pole

Double Throw

Switch ( DPST)Double Pole Single Throw

Switch ( DPDT)Double Pole

Double Throw

Computer Terms:

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 36 of

20Developed by:

LFMJR Revision # 00

Page 37: CBLM Format

access time - The performance of a hard drive or other storage device - how

long it takes to locate a file.

active program or window - The application or window at the front

(foreground) on the monitor.

alert (alert box) - a message that appears on screen, usually to tell you

something went wrong.

alias - an icon that points to a file, folder or application (System 7).

apple menu - on the left side of the screen header. System 6 = desk

accessories System 7 = up to 50 items.

application - a program in which you do your work.

application menu - on the right side of the screen header. Lists running

applications.

ASCII (pronounced ask-key ) - American Standard Code for Information

Interchange. a commonly used data format for exchanging information

between computers or programs.

background - part of the multitasking capability. A program can run and

perform tasks in the background while another program is being used in the

foreground.

bit - the smallest piece of information used by the computer. Derived from

"binary digit". In computer language, either a one (1) or a zero (0).

backup - a copy of a file or disk you make for archiving purposes.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 37 of

20Developed by:

LFMJR Revision # 00

Page 38: CBLM Format

boot - to start up a computer.

bug - a programming error that causes a program to behave in an

unexpected way.

bus - an electronic pathway through which data is transmitted between

components in a computer.

byte - a piece of computer information made up of eight bits.

card - a printed circuit board that adds some feature to a computer.

cartridge drive - a storage device, like a hard drive, in which the medium is

a cartridge that can be removed.

CD-ROM - an acronym for Compact Disc Read-Only Memory.

Chooser - A desk accessory used to select a printer, or other external device,

or to log onto a network.

Clipboard - A portion of memory where the Mac temporarily stores

information. Called a Copy Buffer in many PC applications because it is

used to hold information which is to be moved, as in word processing where

text is "cut" and then "pasted".

Clock Rate (MHz) - The instruction processing speed of a computer

measured in millions of cycles per second (i.e., 200 MHz).

command - the act of giving an instruction to your Mac either by menu

choice or keystroke.

command (apple) key - a modifier key, the Command key used in

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 38 of

20Developed by:

LFMJR Revision # 00

Page 39: CBLM Format

conjunction with another keystroke to active some function on the Mac.

compiler - a program the converts programming code into a form that can

be used by a computer.

compression - a technique that reduces the size of a saved file by

elimination or encoding redundancies (i.e., JPEG, MPEG, LZW, etc.)

control key - seldom used modifier key on the Mac.

control panel - a program that allows you to change settings in a program

or change the way a Mac looks and/or behaves.

CPU - the Central Processing Unit. The processing chip that is the "brains"

of a computer.

crash - a system malfunction in which the computer stops working and has

to be restarted.

cursor - The pointer, usually arrow or cross shaped, which is controlled by

the mouse.

daisy chaining - the act of stringing devices together in a series (such as

SCSI).

database - an electronic list of information that can be sorted and/or

searched.

data - (the plural of datum) information processed by a computer.

defragment - (also - optimize) to concatenate fragments of data into

contiguous blocks in memory or on a hard drive.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 39 of

20Developed by:

LFMJR Revision # 00

Page 40: CBLM Format

desktop - 1. the finder. 2. the shaded or colored backdrop of the screen.

desktop file - an invisible file in which the Finder stores a database of

information about files and icons.

dialog box - an on-screen message box that appears when the Mac requires

additional information before completing a command.

digitize - to convert linear, or analog, data into digital data which can be

used by the computer.

disk - a spinning platter made of magnetic or optically etched material on

which data can be stored.

disk drive - the machinery that writes the data from a disk and/or writes

data to a disk.

disk window - the window that displays the contents or directory of a disk.

document - a file you create, as opposed to the application which created it.

DOS - acronym for Disk Operating System - used in IBM PCs.

DPI - acronym for Dots Per Inch - a gauge of visual clarity on the printed

page or on the computer screen.

download - to transfer data from one computer to another. (If you are on the

receiving end, you are downloading. If you are on the sending end, you are

uploading ).

drag - to move the mouse while its button is being depressed.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 40 of

20Developed by:

LFMJR Revision # 00

Page 41: CBLM Format

drag and drop - a feature on the Mac which allows one to drag the icon for a

document on top of the icon for an application, thereby launching the

application and opening the document.

driver - a file on a computer which tells it how to communicate with an add-

on piece of equipment (like a printer).

Ethernet - a protocol for fast communication and file transfer across a

network.

expansion slot - a connector inside the computer which allows one to plug

in a printed circuit board that provides new or enhanced features.

extension - a startup program that runs when you start the Mac and then

enhances its function.

fibre channel - as applied to data storage and network topology - file - the

generic word for an application, document, control panel or other computer

data.

finder - The cornerstone or home-base application in the Mac environment.

The finder regulates the file management functions of the Mac (copying,

renaming, deleting...)

floppy - a 3.5 inch square rigid disk which holds data. (so named for the

earlier 5.25 and 8 inch disks that were flexible).

folder - an electronic subdirectory which contains files.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 41 of

20Developed by:

LFMJR Revision # 00

Page 42: CBLM Format

font - a typeface that contains the characters of an alphabet or some other

letterforms.

footprint - The surface area of a desk or table which is occupied by a piece

of equipment.

fragmentation - The breaking up of a file into many separate locations in

memory or on a disk.

freeze - a system error which causes the cursor to lock in place.

gig - a gigabyte = 1024 megabytes.

hard drive - a large capacity storage device made of multiple disks housed

in a rigid case.

high density disk - a 1.4 MB floppy disk.

highlight - to select by clicking once on an icon or by highlighting text in a

document.

icon - a graphic symbol for an application, file or folder.

initialize - to format a disk for use in the computer; creates a new directory

and arranges the tracks for the recording of data.

insertion point - in word processing, the short flashing marker which

indicates where your next typing will begin.

installer - software used to install a program on your hard drive.

interrupt button - a tool used by programmers to enter the debugging

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 42 of

20Developed by:

LFMJR Revision # 00

Page 43: CBLM Format

mode. The button is usually next to the reset button.

K - short for kilobyte.

keyboard shortcut - a combination of keystrokes that performs some

function otherwise found in a pull down menu.

kilobyte - 1024 bytes.

landscape - in printing from a computer, to print sideways on the page.

launch - start an application.

Measurements (summary) - *a bit = one binary digit (1 or 0) *"bit" is derived from the contraction bit (binary digit) -> 8 bits = one byte*1024 bytes = one kilobyte*K = kilobyte*Kb = kilobit*MB = megabyte*Mb = megabit*MB/s = megabytes per second*Mb/s = megabits per second*bps = bits per secondi.e., 155 Mb/s = 19.38 MB/s

MB - short for megabyte.

megabyte - 1024 kilobytes.

memory - the temporary holding area where data is stored while it is being

used or changed; the amount of RAM a computer has installed.

menu - a list of program commands listed by topic.

menu bar - the horizontal bar across the top of the Mac¹s screen that lists

the menus.

multi finder - a component of System 6 that allows the Mac to multi task.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 43 of

20Developed by:

LFMJR Revision # 00

Page 44: CBLM Format

multi tasking - running more than one application in memory at the same

time.

nanosecond - one billionth of a second. ( or, the time between the theatrical

release of a Dudley Moore film and the moment it begins to play on

airplanes).

native mode - using the computers original operating system; most

commonly used when talking about the PowerPC can run software written

for either the 80x0 systems, or the PowerPC¹s RISC code.

Nu-Bus - expansion slots on the Mac which accept intelligent, self-

configuring boards. Nu-Bus is different bus architecture than the newer PCI

bus and the boards are not interchangeable.

operating system - the system software that controls the computer.

optical disk - a high-capacity storage medium that is read by a laser light.

palette - a small floating window that contains tools used in a given

application.

partition - a subdivision of a hard drives surface that is defined and used

as a separate drive.

paste - to insert text, or other material, from the clipboard or copy buffer.

PC - acronym for personal computer commonly used to refer to an IBM or

IBM clone computer which uses DOS.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 44 of

20Developed by:

LFMJR Revision # 00

Page 45: CBLM Format

PCI - acronym for Peripheral Component Interchange - the newer, faster bus

architecture.

peripheral - an add-on component to your computer.

point - (1/72") 12 points = one pica in printing.

pop-up menu - any menu that does not appear at the top of the screen in

the menu bar. (may pop up or down)

port - a connection socket, or jack on the Mac.

Power PC - a processing chip designed by Apple, IBM and Motorola (RISC

based).

print spooler - a program that stores documents to be printed on the hard

drive, thereby freeing the memory up and allowing other functions to be

performed while printing goes on in the background.

RAM - acronym for Random-Access Memory.

Resize box - the small square at the lower right corner of a window which,

when dragged, resizes the window.

RISC - acronym for Reduced Instruction Set Computing; the smaller set of

commands used by the PowerPC and Power Mac.

ROM - acronym for Read Only Memory; memory that can only be read from

and not written to.

Root directory - the main hard drive window.

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 45 of

20Developed by:

LFMJR Revision # 00

Page 46: CBLM Format

Save - to write a file onto a disk.

Save as - (a File menu item) to save a previously saved file in a new location

and/or with a new name.

Scroll - to shift the contents of a window to bring hidden items into view.

Scroll bar - a bar at the bottom or right side of a window that contains the

scroll box and allows scrolling.

Scroll box - the box in a scroll bar that is used to navigate through a

window.

SCSI - acronym for Small Computer System Interface.

SCSI address - a number between zero and seven that must be unique to

each device in a SCSI chain. Fast and Wide SCSI devices will allow up to 15

SCSI Ids (hexadecimal); however, the length restriction (3 meters) is such

that it is virtually impossible to link 15 devices together.

SCSI port - a 25 pin connector on the back of a Mac (native SCSI port);

used to connect SCSI devices to the CPU. Some SCSI cards (like the ATTO)

have a 68 pin connector.

SCSI terminator - a device placed at the end of a SCSI chain to complete

the circuit. (Some SCSI devices are self-terminating, or have active

termination and do not require this plug).

Serial port - a port that allows data to be transmitted in a series (one after

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 46 of

20Developed by:

LFMJR Revision # 00

Page 47: CBLM Format

the other), such as the printer and modem ports on a Mac.

Server - a central computer dedicated to sending and receiving data from

other computers (on a network).

Shut down - the command from the Special menu that shuts down the Mac

safely.

software - files on disk that contain instructions for a computer.

start up disk - the disk containing system software and is designated to be

used to start the computer.

System file - a file in the System folder that allows your Mac to start and

run.

System folder - an all-important folder that contains at least the System file

and the Finder.

32 bit addressing - a feature that allows the Mac to recognize and use more

than 8MB of memory.

title bar - the horizontal bar at the top of a window which has the name of

the file or folder it represents.

upload - to send a file from one computer to another through a network.

Uninterruptible Power Source (UPS)- a constantly charging battery pack

which powers the computer. A UPS should have enough charge to power

your computer for several minutes in the event of a total power failure,

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 47 of

20Developed by:

LFMJR Revision # 00

Page 48: CBLM Format

giving you time to save your work and safely shut down.

UPS - acronym for Uninterruptible Power Source.

virtual memory - using part of your hard drive as though it were "RAM".

SELF-CHECK 2.1-5

I. Matching TypeDirections: match the symbols from the names listed below. Write the letter of your choice.

Symbols Names

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 48 of

20Developed by:

LFMJR Revision # 00

8.

7.

6.

5.

4.

3.

2.

1. NAMES

a. RESISTOR

b. TRANSISTOR

c. LOUD SPEAKER

d. ZENER DIODE

e. TRANSFORMER

f. CAPACITOR

g. COIL/INDUCTOR

h. VARIABLE CAPACITOR

i. DIODE

j. FUSE

k. BATTERY

l. MICROPHONE

Page 49: CBLM Format

POWERSKILLS

Q & ASYSTEM

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:

Document No.Issued by: Page 49 of

20Developed by:

LFMJR Revision # 00

9.

10.

Page 50: CBLM Format

II. IDENTIFICATIONDirections: Identify what is being asked in the following.

1. A central computer dedicated to sending and receiving data

from other computers (on a network).

2. To start up a computer.

3. The disk containing system software and is designated to be

used to start the computer.

4. It is an add-on component to your computer.

5. It a subdivision of a hard drives surface that is defined and used

as a separate drive.

III. ACRONYMSDirections: Give the meaning of the following acronyms.

1. ATX 2. SDRAM3. DRAM 4. PCI 5. IDE 6. SCSI 7. CMOS8. ROM 9. DDR

10. CPU

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:11/23/2013

Document No.Issued by:

Page 1 of 52Developed by:

LFMJR Revision # __

Page 51: CBLM Format

ANSWER KEY 2.1-5

I. MATCHING TYPE1. E2. J3. I4. D5. F6. A7. H8. C9. B

10. G

II. IDENTIFICATION1. SERVER2. BOOT3. START-UP DISK4. PERIPHERAL5. PARTITION

III.ACRONYMS1. ATX – Advance Technology Attachment2. SDRAM – Synchronous Dynamic Random Access Memory3. DRAM – Dynamic Random Access Memory4. PCI – Peripheral Component Interconnect5. IDE – Integrated Drive Electronics6. SCSI – Small Computer System Interface7. CMOS – Complementary Metal-Oxide Semiconductor8. ROM – Read Only Memory9. DDR – Double Data Rate

10. CPU – Central Processing Unit

CONFIGURE COMPUTER SYSTEMS

AND NETWORKS

Date Developed:11/23/2013

Document No.Issued by:

Page 2 of 52Developed by:

LFMJR Revision # __