INSTALLING AND CONFIGURING COMPUTER SYSTEMS (ICCS)
DEFINITION OF TERMS
GENERAL
1) Certification - Is the process of verifying and validating the competencies of a person through assessment.
2) Certificate of Competency (COC) – Is a certification issued to individuals who pass the assessment for a single unit or cluster of units of competency.
3) Common Competencies - Are the skills and knowledge needed by all people working in a particular industry.
4) Competency - Is the possession and application of knowledge, skills and attitudes to perform work activities to the standard expected in the workplace.
5) Competency Assessment - Is the process o f collecting evidence and making judgments on whether competency has been achieved.
6) Competency Standard (CS) - Is the industry-determined specification of competencies required for effective work performance.
7) Context of Assessment - Refers to the place where assessment is to be conducted or carried out.
8) Core Competencies - Are the specific skills and knowledge needed in a particular area of work - industry sector/occupation/job role.
9) Critical aspects of competency - Refers to the evidence that is essential for successful performance of the unit of competency.
10) Elective Competencies - Are the additional skills and knowledge required by the individual or enterprise for work.
11) Elements - Are the building blocks of a unit of competency. They describe in outcome terms the functions that a person performs in the workplace.
12) Evidence Guide - Is a component of the unit of competency that defines or identifies the evidences required to determine the competence of the individual. It provides information on critical aspects of competency, underpinning knowledge, underpinning skills, resource implications, assessment method and context of assessment.
13) Level - Refers to the category of skills and knowledge required to do a job.
14) Method of Assessment - Refers to the ways of collecting evidence and when, evidence should be collected.
15) National Certificate (NC) – Is a certification issued to individuals who achieve all the required units of competency for a national qualification defined under the Training Regulations. NCs are aligned to specific levels within the PTQF.
16) Performance Criteria - Are evaluative statements that specify what is to be assessed and the required level of performance.
17) Qualification - Is a cluster of units of competencies that meets job roles and is significant in the workplace. It is also a certification awarded to a person on successful completion of a course in recognition of having demonstrated competencies in an industry sector.
18) Range of Variables - Describes the circumstances or context in which the work is to be performed.
19) Recognition of Prior Learning (RPL) – Is the acknowledgement of an individual’s skills, knowledge and attitudes gained from life and work experiences outside registered training programs.
20) Resource Implications - Refers to the resources needed for the successful performance of the work activity described in the unit of competency. It includes work environment and conditions, materials, tools and equipment.
21) Basic Competencies - Are the skills and knowledge that everyone needs for work.
22) Training Regulations (TR) – Refers to the document promulgated and issued by TESDA consisting of competency standards, national qualifications and training guidelines for specific sectors/occupations.
The TR serves as basis for establishment of qualification and certification under the PTQF. It also serves as guide for development of competency based curricula and instructional materials including registration of
TVET programs offered by TVET providers.
23) Underpinning Knowledge - Refers to the competency that involves in applying knowledge to perform work activities. It includes specific knowledge that is essential to the performance of the competency.
24) Underpinning Skills - Refers to the list of the skills needed to achieve the elements and performance criteria in the unit of competency. It includes generic and industry specific skills.
25) Unit of Competency – Is a component of the competency standards stating a specific key function or role in a particular job or occupation; it is the smallest component of achievement that can be assessed and
certified under the PTQF.
1.Computer System - The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes.
2. Computer Network, or simply a Network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. It is a group of devices connected to each other. Networks may be classified into a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, benefit, and organizational scope.
3. Configuration - The makeup of a system. To "configure" is to choose options in order to create a custom system. "Configurability" is a system's ability to be changed or customized.
4. Connector - Any plug and socket that links two devices together. Although taken for granted and rarely in the limelight, connectors are a huge industry, and the quality of these components is more critical than most people would imagine. When not designed or constructed properly, they often become the weakest element in an electronic system.
5. Display Adapter - A plug-in card in a desktop computer that converts the images created in the computer to the electronic signals required by the monitor. It determines the maximum resolution, refresh rate and number of colors that can be displayed, which the monitor must also be able to support. On many PC motherboards, the display adapter circuits are built into the chipset, and an AGP or PCI card is not required.
6. Expansion Board - A printed circuit board that plugs into an expansion slot and extends the computer's capability to control a peripheral device. All the boards (cards) that plug into a computer's bus are expansion boards, such as display adapters, disk controllers, network adapters and sound cards.
7. Expansion Bus - An input/output bus typically comprised of a series of slots on the motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are the common expansion buses in a PC.
8. Graphical User Interface - A graphics-based user interface that incorporates movable windows, icons and a mouse. The ability to resize application windows and change style and size of fonts are the significant advantages of a GUI vs. a character-based interface. GUIs have become the standard way users interact with a computer, and the major GUIs are the Windows and Mac interfaces along with Motif for Unix and the GNOME and KDE interfaces for Linux.
9. LAN - A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
10. Motherboard - Also called the "system board," it is the main printed circuit board in an electronic device, which contains sockets that accept additional boards. In a desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP slot, memory sockets and controller circuits for the keyboard, mouse, disks and printer. It may also have built-in controllers for modem, sound, display and network, obviating the need to plug in a card.
11. Networks – See Computer Network.
12. Operating System - The master control program that runs the computer. The first program loaded when the computer is turned on, its main part, the "kernel," resides in memory at all times. The operating system sets the standards for all application programs that run in the computer. The applications "talk to" the operating system for all user interfaces and file management operations.
13. Peripheral -Any hardware device connected to a computer, such as a monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse.
14. Server - A computer system in a network that is shared by multiple users. Servers come in all sizes from x86-based PCs to IBM mainframes. A server may have a keyboard, monitor and mouse directly attached, or one keyboard, monitor and mouse may connect to any number of servers via a KVM switch. Servers may be also be accessed only through a network connection as well.
15. Sound Card - Also called a "sound board" or "audio adapter," it is a computer expansion board that records and plays back sound, providing inputs from a microphone or other sound source and outputs to speakers or an external amplifier. The de facto standard for sound card compatibility in PCs is Creative Labs' Sound Blaster.
16. User Interface - All graphics based today, the user interface includes the windows, menus and method of interaction between you and the computer. Prior to the Mac, Windows and Motif (UNIX) interfaces, all interaction was based on commands entered by the user. Operating systems may support optional interfaces and allow a new shell or skin, to be used instead.
17. Virus - Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.
18. WAN - A Wide Area Network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location
19. WEEE Directives - The prevention of waste electrical and electronic equipment (WEEE), and in addition, the reuse, recycling and other forms of recovery of such wastes so as to reduce the disposal of waste. It also seeks to improve the environmental performance of all operators involved in the life cycle of electrical and electronic equipment, e.g. producers, distributors and consumers and in particular those operators directly involved in the treatment of waste electrical and electronic equipment.
ADDITIONAL TERMS
1.Active Hubs – Amplify or boost signals.
2.Anti-Static – A product that prevents the buildup of static electricity.
3.BIOS – Basic Input/output System, chip that controls the most basic functions of the computer and performs a self-test every time you turn it on.
4.Flash drive– RAM that can retain data without electrical power. It is widely used for BIOS chips and for digital camera and digital music storage.
5.Graphic tablet – Objects are drawn using a pen or a puck. The puck is technically a tablet cursor, not a mouse.
6.Goggles –A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.
7.Hard-disk drive – Is a storage device that stores billions of characters of data on a nonremovable disk.
8.Hardware- Refers to the tangible (things you can touch) components of a computer system. Hardware components are further divided into three groups namely.
9.Host –Any computer whether mainframe, server, or even PC that acts as an information source on a network.
10. Intelligent Hubs – Select which path a specific signal will travel.
11. Joy Stick - A hand-held control stick that allows a player to control the movements of a cursor on a computer screen or a symbol in a video game.
12. LAN Card – Local area network interface card.
13. Laptop computer - A small, portable computer small enough that it can sit on your lap.
14. Local Area Network- The smallest of the three network types, consist of PCs connected together within a limited area, such as within the same building, floor or department.
15. Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.
16. Metropolitan Area Network – Are network that spans no more than.
17. 50 miles. It is design to connect LANs spanning a town or city.
18. Minicomputer: A multi-user computer capable of supporting up to hundreds of users simultaneously.
19. Metropolitan Area Network – Is a network that spans no more than.
20. 50 miles. It is design to connect LANs spanning a town or city.
21. Motherboard – Contains the CPU, BIOS, Memory, mas s storage interfaces, serial and parallel ports, expansion slot and all the controllers.
22. Modem - (MOdulator- DEModulator) The modem is a device that allows a given computer to share data or otherwise a device which let computers exchange information.
23. Modular Hubs – Are popular in networks because they are easily expanded and always have management option. It is purchased as chassis, or card cage, with multiple card slots, each of which accepts a communication card, or module.
24. Multimedia - Is the combination of different types of communication media (sound, print, video, and so on).
25. Multitasker- Is an instrument use to measure voltage, current and resistance.
26. NIC – Network Interface Card – The PC expansion board that plug into a personal computer or server and works with the network operating system to control the flow of information over the network.
27. Network – Is a communications system connecting two or more computers.
28. Network Bridge – Divides network into smaller, more manageable sections helping reduce network traffic.
29. Network Hub - A hardware device that all PCs on a network are connected to by cabling. The hub manages receiving and transmitting data from networked services.
30. Network Server- Is a powerful computer whose sole purpose is to serve network clients.
31. Network Switch – It helps determine how data moves over large networks.
32. Notebook computer An extremely lightweight personal computer that weighs weigh less than 6 pounds and are small enough to fit easily in a briefcase.
33. OHS – Occupational Health and Safety.
34. Operating System (OS) -Software that controls the allocation and use of programs and data that a computer uses.
35. Passive Hubs – Simply connects various cables
36. Personal computer: A small , s i n g l e -user computer based on a microprocessor.
37. Port hub /Port – Is a connector on the back of a computer or other device. A port is either a serial port or a parallel port.
38. Peers- Mean any computer sharing the same protocol layer with another computer.
39. Protocol – Refers to the specific standards governing the sending and receiving of data.
40. Repeater– A device that strengthen signals and allow them to stay clear over longer distances.
41. Printer - It is a piece of hardware that produces a paper copy (also known as ‘hardcopy’) of the information generated by the computer.
42. RAM – Random Access Memory, is a primary memory. This memory is used inside the computer to hold programs and data while it is running.
43. RJ 45 – Is the connector plugged into the NIC ports on computers and often connecting the main networking hardware together.
44. Router – A device that forwards data packets between Local or Wide Area Network groups.
45. Scanner- It is an input device that read text or illustration printed on paper, translates the information into a form that a computer can use.
46. Server – Is a part of a network. It is a special computer that users on the network can assess to carry out a particular job.
47. Software – Programs and data that a computer uses.
48. Software applications- Enables you to perform specific tasks- solve problems, perform work, or entertain yourself.
49. Sound Device Driver Installer / Sound and Audio Devices – A windows XP Control Panel applet, called Sounds, and Multimedia in Windows 2000, for configuring the system’s sound card.
50. Stackable Hubs – Work just like standalone hubs, except that several of them can be “stacked” (connected) together, usually by short lengths of cable.
51. Standalone Hubs – Are single products with a number of ports. It is usually including some method of linking them to other standalone hubs for network expansion.
52. Static – The discharge of electricity between two objects with different electrical potential.
53. Sub-notebook computer - A portable computer that is slightly lighter and smaller than a full-sized notebook computer. Typically, sub-notebook computers have a smaller keyboard and screen, but are otherwise equivalent to notebook computers.
54. UTP – (Unshielded Twisted Pair) least expensive and most popular network media.
55. USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer and telephony devices.
56. Video Camera - Camera using videotape: a camera that records onto videotape.
57. Wide Area Network – Used to distribute information thousands of miles among thousands of users.
58. Wireless Hubs– Are hubs designed for the home.
59. Workstation- Is any network computer that connects to and request resources from a network.
INFORMATION SHEET 1.1-1
Learning Objective: OHS Policies and Procedures After reading this information, you must be able to identify and apply OHS policies and procedures in Computer Systems Servicing.
Occupational safety and health (OSH) is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks. Health and safety procedure is the responsibility of all persons in the computer and technology industries. You must identify the hazards where you are working and decide how dangerous they are. Eliminate the hazard or modify the risk that it presents.
What is risk?
Risk is the chance of that harm actually being caused. In other words, the probability or chance that someone may suffer injury or illness due to an existing hazard. It is important to know that when we perform a risk assessment, we need to consider two aspects of risk; the likelihood of the harm occurring and the severity of the harm that could be caused.
Risk Assessment 5 Steps
Step 1: Determine the key Hazards
Ask yourself ‘what could harm someone and how?‘
Firstly, check accident records to identify any previous workplace injury or illness Secondly, refer to manufacturer’s guidelines for safe guidance on how to operate plant and equipment
Step 2: Identify ‘Who might be harmed?’
Ask yourself who will be exposed to a particular risk. This might be primarily your own employees. But, there are also other groups of people (or animals!) who may be affected in different ways.
Step 3: Assessing the Risk - Severity and Likelihood
A very common method of assessing the level of risk is to assign a value to each of two component parts – Likelihood and Severity.
As you can see from the matrix below, a combination of Severity x Likelihood = Risk.
Severity – How bad is the outcome likely to be i.e. the severity of injury or illness?
Likelihood – What are the chances of it happening with the current controls in place?
Step 4: Evaluate Risks & add Controls
Hierarchy of Controls
We need to decide if the risks are at a reasonable or acceptable level, or if we need to put further control measures in place. Control measures include actions that can be taken to reduce the potential of exposure to the hazard.
Or the control measure could be to remove the hazard or to reduce the likelihood of the risk of the exposure to that hazard being realized. A simple control measure would be the secure guarding of moving parts of machinery eliminating the potential for contact.
The hazard controls in the hierarchy are, in order of decreasing effectiveness:
1. Elimination - Physical removal of the hazard — this is the most effective hazard control.
2. Substitution - Substitution, the second most effective hazard control, involves replacing something that produces a hazard (similar to elimination) with something that does not produce a hazard.
3. Engineering controls - The third most effective means of controlling hazards is engineered controls. These do not eliminate hazards, but rather isolate people from hazards.
4. Administrative controls - Administrative controls are changes to the way people work. Examples of administrative controls include procedure changes, employee training, and installation of signs and warning labels.
5. Personal protective equipment - Personal protective equipment (PPE) includes gloves, Nomex/Uniform, respirators, hard hats, safety glasses, high-visibility clothing, and safety footwear.
PPE is the least effective means of controlling hazards because of the high potential for damage to render PPE ineffective.
Step 5: Record and Review
Your risk assessment should be recorded and shared with the relevant people. Communicating the outcomes of the risk assessment is arguably the most important part of the process. Take the time to think about how you will go about doing this.
OCCUPATIONAL HEALTH AND SAFETY STANDARDS
Procedure
1. Identify the hazard
2. Clear the area close to the hazard
3. Partition the hazard off or clearly identify the area to protect other people from harm
4. If the hazard is easily and safely cleared, then do so
If not…
1. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain assistance.
2. Following clearing of the hazard fill out the correct documentation to assist in identifying improved practice to reduce further incidence of hazards. All hazards must be reported using Accidental Report form. This enables us to track the kinds of hazards we have in our workplace, and take action where necessary to make it safer for all student and clients.
ACCIDENT REPORTS
Forms are used to give specific details with regards to the accidents happened in the laboratory during experiments.
Accident reports contain the following details:
• Name of the person injured
• Date and time of the accident
• Type of injury
• First aid given
• Action taken to prevent further
HAZARDOUS SUBTANCES
If the workplace hazard appears to be dangerous to staff and clients and professional assistance is required:
1. Call the supervisor or manager and advise them of the problem and the urgency of the matter.
2. Depending on the risk it may be called as an evacuation.
3. Follow the evacuation procedure.
4. The supervisor or manager will call in the fire brigade or specialized personnel who will deal with the spill.
FIRE EXITS
All fire exits should be kept clear of from obstacles. All students have a responsibility to make sure that chairs, empty boxes or any other type of obstacle are not placed in or near fire exit doorways.
All corridors also need to have equipment stored on one side only to ensure that in the event of an emergency there is a clear exit.
FIRE SAFETY PROCEDURE
Each work area has a designated fire warden, who in the event of a fire will take charge. They are recognized by the wearing of a red hard hat.
If you find the fire
• Assess the danger prior to doing anything.
• If it is safe to move assist anyone in the vicinity of the fire away from danger.
• If it is possible close the door to the fire area.
• Call for assistance. Verbally call FIRE, FIRE, in a loud and clear voice.
• Break the glass section of the fire alert call point.
• Call to the switch; ensure you know where the fire is, any other details that may be of assistance to the fire brigade. Details could be size of the fire, cause or type of fire, any people hurt or trapped, has anyone tried to put it out.
• If safe to do so, attack the fire with the correct extinguisher or fire hose.
If the designated fire officer is not present, someone quickly needs to take
responsibility and:
1. Locate the source of the fire.
2. Locate any people.
3. Remove all people from the building.
4. Once outside do a head count?
5. Notify the authorities
Occupational Health and Safety Policy
The occupational safety and health policy define the goals for the occupational health and safety work in the workplace and for activities that promote the working capacity of the staff. The policy also describes occupational health and safety responsibilities and the way of organizing the cooperation measures. The preparation of the occupational safety and health policy is based on the Occupational Safety and Health Act. The policy is employer-specific and applies to all employers.
Safety practices should be learned early and always adhered to when working with any electrical device, including personal computers and peripherals. This is for the protection of not only the people working with them, but also for the devices themselves. The basis for this process begins with your Occupational Health and Safety Policies
Personal Safety While Working Along with PC’s
While working inside your computer, do not attempt to service the computer except as explained in this guide and elsewhere in product documentation. Always follow the instructions closely. Computer equipment can be dangerous, and you or others can be injured or even killed if you do not follow proper safety guidelines when working along PC’s. The following are some precautionary measures to take before working with any computer equipment.
Before you start to work on the computer, perform the following steps in the sequence indicated:
1. Turn off the computer and all peripherals.
2. Touch an unpainted metal surface on the computer chassis, such as the metal around the card-slot openings at the back of your computer, before touching anything inside your computer.
3. Disconnect the computer and peripherals from their electrical outlets. Doing so reduces the potential for personal injury or shock. Also disconnect any telephone or telecommunication lines from the computer.
Note: Before disconnecting a peripheral from the system or removing a component from the system board, verify that the standby power light emitting diode (LED) on the system board has turned off. While you work, periodically touch an unpainted metal surface on the computer chassis to dissipate any static electricity that might harm internal components.
In addition, it is recommended that you periodically review the safety instructions in your System Information Guide.
Occupational Health and Safety Policies and Procedures
OHS or Occupational Health and Safety refers to the legislation, policies, procedures, and activities that aim to protect the health, safety, and welfare of all people at the workplace.
1. Do not work alone so that there is someone who can take care of you in case of emergency.
2. Always power off the computer and unplug the computer before working on it.
3. Take away any liquid near your working area to avoid getting electrocuted or accidentally damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the computer.
6. Do not use excessive force if things do not quite slip into place.
7. Clean the area before and after using it to maintain sanitation and prevent accidents.
8. Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with the organization's OHS procedures and practices.
10. Make sure that the pins are properly aligned when connecting a cable connector.
11. Contingency measures during workplace accidents, fire and other emergencies are recognized.
12. Use brush, compressed air or blower in cleaning the computer system.
13. Wear shoes with non-conductive rubber soles to help reduce the chance of being shocked or seriously injured in an electrical accident.
14. Do not work on components that are plugged into their power source.
15. Do not remove expansion cards from a computer when it is turned on.
16. Remove all jewelry when working inside any computer related equipment.
17. Be sure not to mix electronic components and water.
18. When you shut down your computer, be sure to shut it down properly.
19. Do not turn it off with the case switch.
20. Do not eat or drinks while working.
Information Sheet 1.1.2 COMPUTER HARDWARE
Learning Objective:
After reading this information, you must be able to identify the Basic Terms, Concepts, Functions and Characteristics of PC Hardware Components.
Types of computer systems
A workstation Is a high-end personal computer designed for technical or scientific applications. Intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems.
2. Desktop computers Come in a variety of styles ranging from large vertical tower cases to small form factor models that can be tucked behind an LCD monitor. In this sense, the term 'desktop' refers specifically to a horizontally oriented case, usually intended to have the display screen placed on top to save space on the desktop. Most modern desktop computers have separate screens and keyboards.
3. Nettop. A subtype of desktops, called nettops, was introduced by Intel in February 2008 to describe low-cost, lean-function, desktop computers.
4. A laptop computer or simply laptop, also called a notebook computer or sometimes a notebook, is a small personal computer designed for portability.
5. Netbooks (also called mini notebooks or subnotebooks) are a rapidly evolving category of small, light and inexpensive laptop computers suited for general computing and accessing web based applications; they are often marketed as "companion devices," that
is, to augment a user's other computer access.
6. A tablet PC is a notebook or slate shaped mobile computer, first introduced by Pen computing in the early 90s with their Peng Tablet Computer and popularized by Microsoft. Its touchscreen or graphics tablet/screen hybrid technology allows the user to operate the computer with a stylus or digital pen, or a fingertip, instead of a keyboard or mouse.
7. The ultra-mobile PC (UMPC) is a specification for a small form factor of tablet PCs. It was developed as a joint development exercise by Microsoft, Intel, and Samsung, among others. Current UMPCs typically feature the Windows XP, Windows Vista, Windows 11, or Linux operating system and low voltage Intel Atom or VIA C7-M
processors.
8. A home theater PC (HTPC) is a convergence device that combines the functions of a personal computer and a digital video recorder. It is connected to a television or a television-sized computer display and is often used as a digital photo, music, video player, TV receiver and digital video recorder.
9. All-in-one PC also known as all-in-one desktops, integrate the computer case and system components into the monitor so that the entire PC is contained all in one unit. All-in-one (AIO) desktop PCs offer the advantage of a smaller form factor than desktop PCs, but they often come with several drawbacks as well, including higher cost, weaker performance, and limited upgrade options. The all-in-one computer design debuted with the Apple iMac in 1998. While the early all-in-one PC computers were expensive and bulky, all-in-one PCs have become much slimmer, lighter, and cheaper with the advent of LCD monitors and smaller, less expensive desktop system components.
10. A pocket PC is a hardware specification for a handheld-sized computer (personal digital assistant) that runs the Microsoft Windows Mobile operating system. It may have the capability to run an alternative operating system like NetBSD or Linux. It has many of the
capabilities of modern desktop PCs.
Computer Hardware and Peripherals
Computer case
A computer case is the enclosure that contains the main components of a computer. Cases are usually constructed from steel or aluminum, although other materials such as wood and plastic have been used. Cases can come in many different sizes, or form factors.
Processor
The central processing unit, or CPU, is that part of a computer which executes software program instructions. In older computers this circuitry was formerly on several printed circuit boards, but in PCs is a single integrated circuit. Nearly all PCs contain a type of CPU known as a microprocessor. with a fan attached via heat sink.
Motherboard
The motherboard, also referred to as system board or mainboard, is the primary circuit board within a personal computer.
RAM
RAM (Random Access Memory) temporarily stores data and instructions for the CPU to access quickly. It enables fast processing, multitasking, and smooth performance by providing swift data access.
Hard disk drive
Mass storage devices store programs and data even when the power is off; they do require power to perform read and write functions during usage. Although flash memory has dropped in cost, the prevailing form of mass storage in personal computers is still the hard disk.
Video Card
The video card - otherwise called a graphics card, graphics adapter or
video adapter - processes and renders the graphics output from the
computer to the computer display, and is an essential part of the modern computer.
Visual display unit
A visual display unit (or monitor) is a piece of electrical equipment, usually separate from the computer case, which displays viewable images generated by a computer without producing a permanent record.
Keyboard
In computing, a keyboard is an arrangement of buttons that each
correspond to a function, letter, or number. They are the primary devices of inputting text.
Mouse
A Mouse on a computer is a small, slidable device that users hold and slide around to point at, click on, and sometimes drag objects on screen in a graphical user interface using a pointer on screen.
Other components
Mass storage
All computers require either fixed or removable storage for their
operating system programs and user generated material.
Formerly the 5¼ inch and 3½ inch floppy drive were the principal forms of removable storage for backup of user files and distribution of software.
Computer Communications
• Internal Modem Card
• External Modem
• Network Adapter Card
• Router
• Wifi Router
LAN Card
Is a network interface card. This is a computer circuit board or card that is installed in a computer so that it can be connected to a network.
MODEM
(Modulator - DEModulator) The modem is a device that allows a given computer to share data or otherwise a device which let computers exchange information.
A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to
provide access to the Internet or a private computer network. Depending on the manufacturer and model, it can function in a wired
local area network, in a wireless only LAN, or in a mixed wired and
wireless network.
Common peripherals and adapter cards
• Headset
• Joystick
• Microphone
• Printer
• Scanner
• Sound Adapter
• Speakers
• Webcam
Scanner - It is an input device that read text or illustration printed on paper, translates the information into a form that a computer can use.
Printer - It is a piece of hardware that produces a paper copy (also
known as ‘hardcopy’) of the information generated by the computer.
RAM – Random Access Memory, Is a primary memory. This memory is used inside the computer to hold programs and data while it is running.
Basic Input/output System, chip that controls the most basic
functions of the computer and performs a self-test every time you
turn it on.
USB – Universal Serial Bus, a hardware interface for low-speed
peripherals such as the keyboard, mouse, joystick, scanner, printer
and telephony devices.
Flash drive – Is a small, ultra portable storage device which, unlike an optical drive or a traditional hard drive, has no moving parts. Flash drives connect to computers and other devices via a built-in USB Type-A or USB-C plug, making a flash drive a kind of combination USB device and cable.
Video Camera - Camera using videotape: a camera that records
onto videotape.
Sound Card - Enhances the computers sound generating capabilities by allowing sound to be output through speakers.
Power Cables – It supplies power from the power supply to the drive. The power cables are red, yellow and black. The yellow wire furnishes 12 volts of power, the red wire furnishes 5 volts of power, the two black wire are ground wire for each.
IDE And Floppy Disk Ribbon Cable
– IDE stands for Integrate Device Electronics. It shows how to connect an IDE cable to two devices namely the top device (master) and the bottom device (slave).
Serial ATA (SATA, abbreviated from Serial AT Attachment) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives and optical drives.
Headset - Combines a headphone with a microphone. Headsets are
made with either a single-earpiece (mono) or a double-earpiece (mono to both ears or stereo). Headsets provide the equivalent functionality of a telephone handset but with handsfree operation.
Webcam - Is a video camera that feeds or streams an image or video
in real time to or through a computer to a computer network, such as the Internet.
Barcode reader - (or barcode scanner) Is an optical scanner that
can read printed barcodes, decode the data contained in the barcode
and send the data to a computer. Like a flatbed scanner, it consists of
a light source, a lens and a light sensor translating for optical impulses into electrical signals.
There are still other peripherals or hardware that can be attached to computer systems. You
can also attach smartphone or other gadgets wirelessly to computer systems.
INFORMATION SHEET 1.1-2
Tools, Equipment and Testing Device
Safety Goggles – A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.
2. Multimeter - A measuring instrument used by technician for measuring: current, voltage, resistance.
3. Flat Screwdriver – A tool used to drive or fasten negative slotted screws.
4. Philips Screwdriver- A tool used to drive or fasten positive slotted screws.
5. Side Cutter Pliers – A tool used for cutting or trimming of connecting wires or terminal leads in the circuit board.
6. Long nose Pliers – Used for holding, bending and stretching the lead of electronics component or connecting wire.
7. Tweezers- A tool use to hold small sensitive part of a computer.
8. Cutter- A tool used in cutting wires.
9. Flashlight - A small electric light, a flash of electric light used to give light in dark conditions.
10. Paint Brush- A device made of bristles set in handle, use for cleaning sensitive parts of a computer.
11. Magnifier- A device made in glass with handle, to exaggerate or to increase the apparent size of an object.
12. Anti-static wrist strap, mat and spray - are used to eliminate electrostatic discharge in your work area.
13. Soldering Pencil – A tool used to join two or more metal conductors with the support of soldering lead melted around it.
14. Desoldering Tool – A tool used to unsolder unwanted parts or component in the circuit with the support of soldering pencil.
Lens cleaner- It is used for cleaning optical media, such as DVD- ROMS and CD-writers.
Thermal paste-It is a paste used for heat dissipation for your processor.
Information Sheet 1.1-4
Procedure in Assembling Computer System
Assembling Computer System.
Introduction
• Computer assembly is a large part of a technician's job.
• Work in a logical, methodical manner when working with computer components
• Improve computer assembly skills dramatically with practice
• In this learning activity the learners may also apply his/her knowledge on the proper observation of OHS and the use essential materials in performing the assembly of computer systems
• For actual disassembly and assembly of Computer Systems see reference for video tutorials links.
Procedures in Disassembly and Assembly of Computer Systems
1.Open the Case
Prepare the workspace before opening the computer case:
• Adequate lighting
• Good ventilation
• Comfortable room temperature
• Workbench accessible from all sides
• Avoid cluttering workbench
• An antistatic mat on the table
• Small containers to hold screws and other small parts
There are different methods for opening cases.
To learn how, consult the user manual or manufacturer's website.
2. Install the Power Supply
Power supply installation steps include the following:
1. Insert the power supply into the case.
2. Align the holes in the power supply with the holes in the case.
3. Secure the power supply to the case using the proper screws.
3. Attach Components to the Motherboard
As part of an upgrade or repair, a technician may need to attach components to the motherboard, and then install the motherboard.
4. CPU on Motherboard
The CPU and motherboard are sensitive to electrostatic discharge so use a grounded antistatic mat and wear an antistatic wrist strap.
CAUTION: When handling a CPU, do not touch the CPU contacts.
The CPU is secured to the socket on the motherboard with a locking assembly.
5. Thermal Compound
Thermal compound helps to keep the CPU cool.
To install a used CPU, clean it and the base of the heat sink with isopropyl alcohol to remove the old thermal compound.
Follow manufacturer’s recommendations about applying the thermal compound.
6. Heat Sink/Fan Assembly
The Heat Sink/Fan Assembly is a two-part cooling device. The heat sink draws heat away from the CPU. The fan moves the heat away from the heat sink. The heat sink/fan assembly usually has a 3-pin power connector.
7. Install CPU and Heat Sink/Fan Assembly:
1. Align the CPU so that the Connection 1 indicator is lined up with Pin 1 on the CPU socket.
2. Place the CPU gently into the socket.
3. Close the CPU load plate and secure it by closing the load lever and moving it under the load lever retention tab.
4. Apply a small amount of thermal compound to the CPU and spread it evenly. Follow the application instructions provided by the manufacturer.
5. Line up the heat sink/fan assembly retainers to the holes on the
motherboard.
6. Place the heat sink/fan assembly onto the CPU socket, being careful not to pinch the CPU fan wires.
7. Tighten the heat sink/fan assembly retainers to secure the assembly in place.
8. Connect the heat sink/fan assembly power cable to the header on the motherboard.
8. Install RAM
RAM provides temporary data storage for the CPU while the computer is operating. RAM should be installed in the motherboard before the motherboard is placed in the computer case.
RAM installation steps:
1. Align the notches on the RAM module to the keys in the slot and press down until the side tabs click into place.
2. Make sure that the side tabs have locked the RAM module and visually check for exposed contacts.
9. The Motherboard
The motherboard is now ready to install in the computer case. Plastic and metal standoffs are used to mount the motherboard and to prevent it from touching the metal portions of the case.
Install only the standoffs that align with the holes in the motherboard. Installing any additional standoffs may prevent the motherboard from being seated properly in the computer case.
10. Install Motherboard
1. Install standoffs in the computer case.
2. Align the I/O connectors on the back of the motherboard with the openings in the back of the case.
3. Align the screw holes of the motherboard with the standoffs.
4. Insert all the motherboard screws.
5. Tighten all screws on the motherboard.
Note: Drill a hole as needed for the screw
11. Install Internal Drives
Drives that are installed in internal bays are called internal drives.
A hard disk drive (HDD) is an example of an internal drive.
HDD installation steps:
1. Position the HDD so that it aligns with the 3.5- inch drive bay.
2. Insert the HDD into the drive bay so that the screw holes in the drive line up with the screw holes in the case.
3. Secure the HDD to the case using the
proper screws.
12. Install Drives in External Bays
Drives, such as optical drives (CD and DVD) and floppy drives, are installed in drive bays that are accessed from the front of the case.
Optical drives and floppy drives store data on removable media.
Drives in external bays allow access to the media without opening the case.
13. Install Optical Drive
An optical drive is a storage device that reads and writes information to CDs or DVDs.
Optical drive installation steps:
1. Position the optical drive to align with the 5.25-inch drive bay.
2. Insert the optical drive into the drive bay so that the optical drive screw holes align with the screw holes in the case.
3. Secure the optical drive to the case using the proper screws.
14. Install Floppy Drive
A floppy disk drive (FDD) is a storage device that reads and writes information to a floppy disk.
FDD installation steps:
1. Position the FDD so that it aligns with the 3.5-inch drive bay.
2. Insert the FDD into the drive bay so that the FDD screw holes align with the screw holes in the case.
3. Secure the FDD to the case using the proper screws.
15. Install Adapter Cards
Adapter cards are installed to add functionality to a computer.
Adapter cards must be compatible with the expansion slot.
Some adapter cards:
1. PCIe x1 NIC
2. PCI Wireless NIC
3. PCIe x16 video adapter card
16. Install the Network Interface Card (NIC)
A NIC enables a computer to connect to a network.
NICs use PCI and PCIe expansion slots on the motherboard.
NIC installation steps:
1. Align the NIC to the appropriate slot on the motherboard.
2. Press down gently on the NIC until the card is seated.
3. Secure the NIC PC mounting bracket to the case with the appropriate screw.
17. Install the Wireless NIC
A wireless NIC enables a computer to connect to a wireless network. Some wireless NICs are installed externally with a USB connector.
Wireless NIC installation steps:
1. Align the wireless NIC to the appropriate expansion slot on the
motherboard.
2. Press down gently on the wireless NIC until the card is fully seated.
3. Secure the mounting bracket to the case with the appropriate screw.
18. Install the Video Adapter Card
A video adapter card is the interface between a computer and a display monitor. An upgraded video adapter card can provide better graphic capabilities for games and graphic programs.
Video adapter card installation steps:
1. Align the video adapter card to the appropriate expansion slot on the motherboard.
2. Press down gently on the video adapter card until the card is fully seated.
3. Secure the video adapter card PC mounting bracket to the case with the appropriate screw.
19. Connect Internal Cables
Power cables are used to distribute electricity from the
power supply to the motherboard and other components.
Data cables transmit data between the motherboard and storage devices, such as hard drives.
Additional cables connect the buttons and link lights on the front of the computer case to the motherboard.
20. Motherboard Power Connections
The Advanced Technology Extended (ATX) main power connector has either 20 or 24 pins.
The power supply may also have a 4- pin or 6- pin Auxiliary (AUX) power connector that connects to the motherboard.
A 20-pin connector will work in a motherboard with a 24-pin socket.
Connect Power Cables
• ATA Power Connectors use a 15-pin
connector to connect to hard disk drives,
optical drives, or any devices that have a
SATA power socket.
• Molex Power Connectors are used by hard disk drives and optical drives that do not have SATA power sockets.
• CAUTION: Do not use a Molex connector and a SATA power connector on the same drive at the same time.
• 4-pin Berg Power Connector supplies
power to a floppy drive.
Power Connector Installation Steps:
1. Plug the SATA power connector into the HDD.
2. Plug the Molex power connector into the optical drive.
3. Plug the 4-pin Berg power connector into the FDD.
4. Connect the 3-pin fan power connector into the appropriate fan header on the motherboard, according to the motherboard manual.
5. Plug the additional cables from the case into the appropriate connectors according to the motherboard manual.
PATA Cables
• Drives connect to the motherboard using data cables.
• Types of data cables are PATA, SATA, and floppy disk.
• The PATA cable (sometimes called a ribbon cable) is wide and flat and can have either 40 or 80 conductors.
• A PATA cable usually has three 40-pin connectors.
• If multiple hard drives are installed, the master drive will connect to the end connector. The slave drive will connect to the middle connector.
• Many motherboards have two PATA cable sockets, which provides support for a maximum of four PATA drives.
SATA Cables
• The SATA data cable has a 7-pin connector.
• One end of the cable is connected to the motherboard.
• The other end is connected to any drive that has a SATA data connector.
Floppy Drive Cables
• The floppy drive data cable has a 34-pin connector and it has a stripe to denote the location of pin 1.
• One connector at the end of the cable connects to the motherboard.
• The other two connectors connect to drives.
• If multiple floppy drives are installed, the
A: drive will connect to the end connector.
The B: drive will connect to the middle connector.
• Motherboards have one floppy drive controller which provides support for a maximum of two floppy drives.
Install Data Cables
1. Plug the motherboard end of the PATA cable into the motherboard socket.
2. Plug the connector at the far end of the PATA cable into the optical drive.
3. Plug one end of the SATA cable into the motherboard socket.
4. Plug the other end of the SATA cable into the HDD.
5. Plug the motherboard end of the FDD cable into the motherboard socket
6. Plug the connector at the far end of the FDD cable into the floppy drive.
Re-attach Panels, Connect External Cables
• Now that all the internal components have been installed and connected
to the motherboard and power supply, the side panels are re-attached to the computer case.
• The next step is to connect the cables for all computer peripherals and the power cable.
Re-attach Side Panels
• Most computer cases have two panels, one on each side.
• Once the cover is in place, make sure that it is secured at all screw locations.
• Refer to the documentation or manufacturer’s website if you are unsure about how to remove or replace your computer case.
CAUTION: Handle case parts with care. Some computer case covers have sharp or jagged edges.
After the case panels have been re-attached, connect the external cables to the back of the computer.
External cable connections include:
• Monitor
• USB Type peripherals
• Keyboard
• Power
• Mouse
• Ethernet
CAUTION: When attaching cables, never force a connection.
NOTE: Plug in the power cable after you have
connected all other cables.
Connect External Cables
1. Attach the monitor cable to the video port.
2. Secure the cable by tightening the screws on the connector.
3. Plug the keyboard cable into the PS/2 keyboard port.
4. Plug the mouse cable into the PS/2 mouse port.
5. Plug the USB cable into a USB port.
6. Plug the network cable into the network port.
7. Connect the wireless antenna to the antenna connector.
8. Plug the power cable into the power supply.
The BIOS is a set of instructions stored in a nonvolatile memory chip.
When the computer is booted, the basic input/output system (BIOS)
will perform a power-on self-test (POST) to check on all of the internal
components.
A special key or combination of keys on the keyboard is used to enter
the BIOS setup program.
The BIOS setup program displays information about all of the components in the computer. Identify Beep Codes.
POST checks to see that all of the hardware in the computer is operating correctly.
If a device is malfunctioning, an error or a beep code alerts the technician that there is a problem.
Typically, a single beep denotes that the computer is functioning
properly.
If there is a hardware problem, the computer may emit a series of
beeps.
Each BIOS manufacturer uses different codes to indicate hardware
problems.
Consult the motherboard documentation to view beep codes for your
computer.
INFORMATION SHEET 1.1-4
Basic-Input-Output-System (BIOS)
Configuration
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the Basic-input-output-system (BIOS) configuration.
BIOS
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on. It also manages data flow between the computer's operating
system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.
BIOS is an integral part of your computer and comes with it when you bring it home. (In contrast, the operating system can either be pre-installed by the manufacturer or vendor or installed by the user.) BIOS is a program that is made accessible to the microprocessor on an erasable programmable read-only
memory (EPROM) chip. When you turn on your computer, the microprocessor passes control to the BIOS program, which is always located at the same place on EPROM.
When BIOS boots up (starts up) your computer, it first determines whether all of the attachments are in place and operational and then it loads the operating system (or key parts of it) into your computer's random access memory (RAM) from your hard disk or diskette drive.
With BIOS, your operating system and its applications are freed from having to understand exact details (such as hardware addresses) about the attached input/output devices. When device details change, only the BIOS program needs to be changed. Sometimes this change can be made during your system setup. In any case, neither your operating system or any applications you use need to be changed.
Although BIOS is theoretically always the intermediary between the microprocessor and I/O device control information and data flow, in some cases, BIOS can arrange for data to flow directly to memory from devices (such as video cards) that require faster data flow to be effective.
Configuring BIOS
In the previous list, you saw that the BIOS checks the CMOS Setup for custom settings. Here's what you do to change those settings.
To enter the CMOS Setup, you must press a certain key or combination of keys during the initial startup sequence. Most systems use "Esc," "Del," "F1," "F2," "Ctrl-Esc" or "Ctrl-Alt-Esc" to enter setup. There is usually a line of text at the bottom of the display that tells you "Press Setup to enter." Once you have entered setup, you will see a set of text screens with a number of options. Some of these are standard, while others vary according to the BIOS manufacturer. Common options include:
System Time/Date - Set the system time and date.
Boot Sequence - The order that BIOS will try to load the operating system.
Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" if your computer and operating system both support it.
Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse"...
Drive Configuration - Configure hard drives, CD-ROM and floppy drives.
Memory - Direct the BIOS to shadow to a specific memory address.
Security - Set a password for accessing the computer.
Power Management - Select whether to use power management, as well as set the amount of time for standby and suspend.
Exit - Save your changes, discard your changes or restore default settings.
Be very careful when making changes to setup. Incorrect settings may keep your computer from booting. When you are finished with your changes, you should choose "Save Changes" and exit. The BIOS will then restart your computer so that the new settings take effect.
The BIOS uses CMOS technology to save any changes made to the computer's settings. With this technology, a small lithium or Ni-Cad battery can supply enough power to keep the data for years. In fact, some of the newer chips have a 10-year, tiny lithium battery built right into the CMOS chip!
INFORMATION SHEET 1.2-1
Portable Bootable Devices
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar and use the Portable Bootable Devices properly.
Portable Bootable Devices
A live USB is a USB flash drive or a USB external hard disk drive containing a full operating system that can be booted. Live USBs are closely related to live CDs, but sometimes have the ability to persistently save settings and permanently install software packages back onto the USB device. Like live CDs, live USBs can be used in embedded systems for system administration, data recovery, or the testing of operating system distributions without committing to a permanent installation on the local hard disk drive. Many operating systems including Mac OS 9, Mac OS X, Microsoft Windows XP Embedded and many of the Linux and BSD distributions can also be used from a USB flash drive. Windows 8 is also capable of running from a USB drive, with Windows To Go.
How to Make a USB Bootable
Have an old USB drive lying around that you don't use anymore? Turn
it into an operating install disk for Windows, Linux or Mac, or a diagnostic tool for your PC.
Using Disk part
Insert your USB flash drive (4Gb + preferable) into your system.
Warning: All data on the USB flash drive will be lost, make sure
you save any data before proceeding.
Navigate to the Command Prompt. Select Start & type CMD
in the search field, right click on CMD.exe and select Run as
administrator Alternatively, navigate to Start > All programs > Accessories > right click on Command Prompt and select Run as administrator.
Elevated Command Promp
A User Account Control (UAC) dialog Window may appear. Click Yes to Continue. When the Command Prompt opens, enter the following commands followed by Enter.
DISKPART - This will start the utility.
LIST DISK - This will show the disk number of your USB flash drive. In the image below the USB flash drive shows as Disk 2.
SELECT DISK X (Replace X with your USB flash drive number, we are using 2 in this example)
CLEAN - This wipes the drive
CREATE PARTITION PRIMARY- Creates partition
SELECT PARTITION 1- Selects partition 1
ACTIVE- Marks the current partition as active
FORMAT FS = NTFS QUICK - This format the partition
ASSIGN- Assigns a drive letter.
EXIT
Insert your Windows DVD into the optical drive.
From the command prompt, enter the following:
g: <enter> (Where "g" is your DVD drive letter)
cd boot <enter> (changes to boot directory) G:\boot boot sect /nt60 d: <enter> (Where "d" is your USB drive letter)
Copy all files from the Windows CD to the USB flash drive using copy
cd\ <enter>
G:\xcopy g:\*. * /s/h/f f:\ <enter>
This will copy the Windows installation files onto the USB flash drive, it may take several minutes.
copy switches are as follows:
/s - Copies directories and subdirectories except empty ones.
/h - Copies hidden and system files.
/f - Displays full source and destination filenames while copying.
To display the full list of switches, type copy /? <enter>
This will make the USB drive bootable and when selected at start up, will boot
straight into the Windows installation.
Another procedure for copying files is in file explorer
Copy the operating system. Once the USB drive has been made bootable, you can copy over the installation files for the operating system you want to install.
You can do this by dragging and dropping using your preferred file
manager/explorer.
Note: You can also create a bootable USB Drive using a third-party software.
Copy over any drivers you might need during the operating system
installation to make the process much smoother.
Note: You can also create a bootable USB Drive using a third-party software.
2. Use Rufus to Create Bootable USB Drive
1. First, download Rufus if you haven’t already. Along with a regular installer, Rufus also comes in a portable variant. Download the portable version if you don’t want to install Rufus on your system. In my case I’ve downloaded the portable version. After downloading, install and open Rufus.
2. Plug in the USB drive, and you will instantly see it in the top drop-down menu. Once you see the drive, click on the “Select” button.
3. In the Browse window go to where you’ve stored your ISO file, select it, and click on the “Open” button. In my case, as I wanted to create an Ubuntu bootable USB drive, I selected the Ubuntu ISO. You can choose the ISO of your choice.
4. (Optional) If you want to, click on the little “Tick” icon next to the “Boot Selection” drop-down menu to compute and see the MD5, SHA1, and SHA256 checksums of the ISO file. This is useful to verify if the ISO file has been tampered with in any way. Remember how Linux Mint editions are compromised?
5. Select “MBR” from the Partition Scheme drop-down menu and “BIOS or UEFI” from the Target System drop-down menu. If you are trying to use this bootable USB drive on an old system, select the “Add fixes for old BIOSes” checkbox under the “Advanced Drive Properties” section.
6. (Optional) You can change the USB drive name using the “Volume Label” field. Additionally, under “Advanced Format Options” make sure that the “Quick Format” checkbox is selected. As the name implies, Quick Format formats the drive quicker by skipping the check for bad sectors.
7. Click on the “Start” button.
8. Depending on the ISO file, Rufus may prompt you to download additional files. For instance, to create a bootable Ubuntu drive, Rufus prompts you to download the newer version of Syslinux. Just click on the “Yes” button, and Rufus will take care of everything.
9. In the next prompt, select the recommended “Write in ISO image mode” option, and click on the “OK” button. You might also see a drive format warning – click on the “OK” button.
10. As soon as you click on the button, Rufus starts to create the bootable USB drive. Depending on your USB drive, it can take a few minutes to complete the creation process.
11. Once completed, you will not see a completion message but will hear a completion sound, and the progress bar will turn fully green.
Create a bootable drive using Rufus
To use Rufus to create a bootable drive that is compatible with UEFI, follow the instructions below.
3. Use Rufus to write an .iso file
1. Download Rufus . Rufus is a standalone program and does not require installation.
2. Open the Rufus program from where you downloaded it to run it.
3. From the Device drop-down menu, select your USB drive, if it isn't automatically selected.
4. Under "Boot selection", select Disk or ISO image (Please select), if it isn't already chosen, and then click SELECT to choose the .iso file you downloaded.
5. Leave "Image option" set to Standard Windows installation.
6. Leave "Partition scheme" set to GPT.
7. For "Target system", select UEFI (non CSM).
8. Under "Format Options", to ensure the flash drive is compatible with UEFI, select FAT32 for "File System".
9. To create the flash drive with the "Press any key to boot from USB" prompt at startup, under the "Advanced format" options, select Create extended label and icon files.
10. When you are finished selecting options, click Start. When prompted, confirm that you want to erase the flash disk.
11. The .iso files will start copying to the flash drive; the process can take several minutes. When Rufus is done, close the program and eject and remove the flash drive.
4. Create a bootable installation flash drive on a macOS computer
Note:
In macOS, the option to create a Windows flash drive appears only when the computer does not have an optical drive. If your Mac has an optical drive, the option will be either missing or grayed out.
1. From the Finder, open the Applications folder, and then Utilities.
2. Open the Boot Camp Assistant, and then click Continue. The next screen should give you a list of options.
3. UITS recommends making the USB drive installer first. You don't need to install Windows or download the support software at this time, as it will be easier to do both later. To proceed:
a. Verify that the USB drive you will be writing to is plugged in.
b. Uncheck the Install Windows 7 or later version and Download the latest Windows support software from Apple options.
c. Check Create a Windows 7 or later install disk and click Continue.
4. Your USB drive should be listed in the "Destination disk" area. Use choose to browse to your .iso file; after selecting it, click Continue.
5. If prompted, confirm your action and/or provide an administrator password. The process of writing the .iso file to the USB drive can take 20 minutes or longer.
INFORMATION SHEET 1.2-2
CUSTOMIZED INSTALLERS
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar
and create customized installers properly.
Installer
An installer is a piece of software that is used to install software programs on a system. An installer is a way to simplify the process of installing software by providing the user with a step-by-step process with the ability to select the desired options.
Useful Software Programs for Windows Users:
1. Good Antivirus
A good antivirus software is a must for PCs to safeguard them from harmful threats, trojans, malware, spyware, ransomware etc.
Below I listed some of the best antivirus programs.
Bit Defender
Kaspersky
Norton Internet Security
AVG Antivirus
Avira
ESET
Panda
MacAfee
2. VLC Media Player
Listening to songs and watching movies is one of the most important things we do in our PC. So, we need a good media player which can play almost all formats of audio and video files. So VLC Media Player
comes 2nd in the list.
2. VLC Media Player
Listening to songs and watching movies is one of the most important things we do in our PC. So, we need a good media player which can play almost all formats of audio and video files. So VLC Media Player
comes 2nd in the list.
4. Image Burner (Nero)
Nero is the best software if you want to burn any type of CD or DVD, but Nero is not free so I recommend Imp Burner which is very much similar to Nero but you can get it for free.
5. Firefox and Google Chrome
These are the two leading browsers right now that I recommend you get.
Mozilla Firefox is the best browser ever made for its multi-functional use. Google Chrome is the fastest and safest browser. It’s a good idea to have at least 2 browsers installed, in case something doesn’t work or display right with one browser, you can test it using the other one.
6. MS Office / Open Office
We can’t imagine a business without MS Office. Right from student to a business man, it’s a must have software, but it’s not for free so I recommend
you use Open Office which is very much similar to MS office with the added bonus that it is free.
7. Adobe Reader
If you want to read eBooks and pdf documents then it’s a must software for you.
8. 7 Zip
-Is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as "archives".
9. Internet Download Manager
IDM is a must have software for PC as it increases our overall download speed by 5 times.
10. uTorrent
uTorrent is a light weight and very efficient torrent client.
11.Adobe Photoshop/GIMP
Adobe Photoshop is a great software for editing photos, but it’s sadly not for free, I have an alternative for this called GIMP, which is free and very similar to Adobe Photoshop. It can also be sued to make gifs for whoever is interested.
12. Revo Uninstaller
Reva Uninstaller is a freeware innovative uninstall utility much faster than Windows Add/Remove applet. With its advanced and fast algorithm, Reva Uninstaller performs a scan before and after you uninstall an application.
13. Adobe Flash Player
This is a must software if you want to watch flash videos on your computer.
14. Malware Bytes
Malware Bytes is a tool that quarantines and removes malicious and infected files on your PC and it can optimize your PC’s performance.
15. Zone Alarm Firewall
Zone Alarm is a cutting- e d g e firewall security option which blocks dangerous sites and downloads. Zone Alarm comes with a ‘Two-way firewall’ which keeps track of all incoming and outgoing traffic protecting you from hackers and other intruders.
16. Team Viewer
Team Viewer is the best software for remote desktop viewing. You can share your desktop from anywhere in this world with this software.
7. Notepad++
Notepad++ is a free source and one of the best text editors for several programming languages under the Windows environment.
18. Folder Lock
Folder locker allows you to store all your files with a protected password.
19. Sandboxes
This is a must have software for virus testers. If you download any application from internet just run it in Sandboxes to check whether it’s infected or not.
20. Key scrambler
In this world of the internet, you can’t always know when a keylogger gets installed on your PC and makes you lose your confidential passwords. Key scrambler software scrambles your keys and helps to stay safe even if a keylogger gets installed somehow.
21. WinRAR
-Is a 32-bit / 64-bit Windows version of RAR Archiver, the powerful archiver and archive manager.
22. File Opener
File Opener is a software which can open different formats of files. This software can fulfill the need of 10 other programs for opening files.
23. VMWARE WORKSTATION
VMware helps us in installing multiple Operating Systems over one single Operating System. Puzzled? Well, to simplify things, VMware allows us to run multiple Operating Systems (called slaves) on our computer. Say you are having Windows 7 installed on your computer as the main Operating System. VMware runs as an application on Windows 7 and allows us to install other Operating Systems like Windows XP, Linux and 20 other types of Operating Systems. So, you don’t need to boot your computer to change your OS. One VMware Workstation can accommodate 20 such OSes
VMware helps us in installing multiple Operating Systems over one single Operating System. Puzzled? Well, to simplify things, VMware allows us to run multiple Operating Systems (called slaves) on our computer. Say you are having Windows 7 installed on your computer as the main Operating System. VMware runs as an application on Windows 7 and allows us to install other Operating Systems like Windows XP, Linux and 20 other types of Operating Systems. So, you don’t need to boot your computer to change your OS. One VMware Workstation can accommodate 20 such OSes.
24. DEEP FREEZE:
- Is a reboot to restore software application available for the Microsoft Windows, and macOS operating systems which allows system administrators to protect the core operating system and configuration files on a workstation or server by restoring a computer back to the saved configuration, each time the computer is restarted.
25. CYBERGHOST VPN
Are you banned from any forum? Try out this software. If you want to surf anonymously on the web without displaying your real IP address, you use this VPN – Cybergoth VPN. There are many other proxy software programs on web. But none of them gives total protection
for your computer. Also, most of them are restricted toonly browser activities.
INFORMATION SHEET 1.3-1
Operating System
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar with the different operating systems, navigate on the different OS components and Install Operating system and device drivers.
Operating System (OS)
-Is a program on which application programs are executed and acts as a communication bridge (interface) between the user and the computer hardware. The main task an operating system carries out is the allocation of resources and services, such as allocation of: memory, devices, processors and information. The operating system also includes programs to manage these resources, such as a traffic controller, a scheduler, memory management module, I/O programs, and a file system
Operating System listing
Below is a listing of many of the different operating systems available today, the dates they were released, the platforms they have been developed for, and who developed them.
The Purpose of an Operating System
1. Security
The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.
2. Control over system performance
Monitors overall system health to help improve performance. Records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.
3. Job accounting
Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of users.
4. Error detecting aids
Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.
5. Coordination between other software and users
Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.
6. Memory Management
The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management: It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management. Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more
required.
8. Device Management
An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. De-allocates devices when they are no longer required.
9. File Management
A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.
Characteristics of Operating Systems
• Control hardware access
• OS automatically discovers and configure PnP hardware
• File and folder management
• User interface
• Command line interface (CLI)
• Graphical user interface (GUI)
• Application management
• Open Graphics Library (OpenGL)
• DirectX
The Types of Operating Systems
1. Command Line Interface (CLI):
The user types commands at a prompt.
2. Graphical User Interface (GUI):
The user interacts with menus and icons.
Most operating systems include both a GUI and a CLI.
Compare Operating Systems
Terms often used when comparing operating systems:
Multi-user – Two or more users can work with programs and share peripheral devices, such as printers, at the same time.
Multi-tasking – The computer is capable of operating multiple applications at the same time.
Multi-processing – The computer can have two or more central processing units (CPUs) that programs share.
Multi-threading – A program can be broken into smaller parts that can be loaded as needed by the operating system. Multi-threading allows individual programs to be multi-tasked.
Real Mode
Executes only one program at a time
Addresses only 1 MB of system memory at a time
Directly accesses memory and hardware
Subject to crashes
Available to all modern processors
Only used by DOS and DOS applications
Protected Mode
Has access to all memory.
Can manage multiple programs simultaneously.
Allows the system to use virtual memory.
Provides 32-bit access to memory, drivers, and I/O transfers.
Each program is assigned a space in memory.
Computer is protected from program errors.
Virtual Real Mode
Allows a real-mode application to run within a protected-mode operating system.
Creates virtual machines for each program that runs in real mode.
Each virtual machine receives 1 MB of memory and access to hardware.
In the event of a program error, only the virtual machine is affected.
OS provides virtual machine to host the code and protect the PC.
Installing the Operating System
Reasons to perform a clean installation of an OS:
• When a computer is passed from one employee to another.
• When the operating system is corrupted.
• When a new replacement hard drive is installed in a computer.
Before performing a clean installation:
• Back up all data first
• Explain to the customer that existing data will be erased
• Confirm that all needed data has been successfully transferred
Hard Drive Setup Procedures
Operating system setup methods:
• Install an OS over a network from a server
• Install from a copy of the OS files stored on the hard drive
• Install from OS files stored on CDs or DVDs
Partitioning and Formatting:
• Hard drive must be logically divided (partitioned)
• File system must be created on the hard drive
• During the installation phase, most operating systems will automatically partition and format the hard drive.
Prepare the Hard Drive
• The first portion of the installation process deals with formatting and partitioning the hard drive.
• The second portion prepares the disk to accept the file system.
• The file system provides the directory structure that organizes the user's operating system, application, configuration, and data files.
Examples of file systems:
• The FAT32 file system
• The New Technology File System (NTFS)
How to Install Windows 7
When you make the decision to upgrade your current OS to Windows 7, there are a couple of ways to go about it. The most hassle free is a complete clean installation. This method will save you lots of headaches down the road. Follow this guide to help make your transition to Windows 7 as smooth as possible.
When you make the decision to upgrade your current OS to Windows 11, there are a couple of ways to go about it. The most hassle free is a complete clean installation. This method will save you lots of headaches down the road. Follow this guide to help make your transition to Windows 11 as smooth as possible.
Step 1
Check your specs. In order to run Windows 7, you must have at least a 1 gigahertz (GHz) processor, 1 gigabyte (GB) of RAM (2 if installing 64-bit), 16 GB of hard disk space (20 if installing64-bit), and a DirectX 9 graphics card with WDDM 1.0. Different programs
will have different system requirements.
To check your system specs in Windows Vista, open the Start menu and right click Computer. From the menu, select Properties. The screen that opens will provide you with your computer’s specifications. To check your system specs in Windows XP, open the Start menu and right-click My Computer. From the menu, select Properties. This will open the System Properties window. In the General tab, your system specifications will be listed under the Computer heading.
Step 2
Backup your data. If you are upgrading from another OS, you will lose all of your files and programs. The programs can’t be backed up; they will need to be reinstalled. Any files—including documents, music, pictures, and videos—that you want to save need to be copied to a backup location.
You can use DVDs, CDs, external hard drives, flash drives, or the cloud, depending on how much data you have to backup.
Step 3
Set your BIOS to boot from CD. To do this, restart the computer and enter the setup screen when the manufacturer logo appears. The key to do this will be displayed, and var ides by manufacturer. The most common keys are F2, F10, F12, and Del. Once in the BIOS menu, select the Boot menu. Change the order of devices so that your computer boots from CD before booting from the hard drive. Save your changes and exit. Your computer will restart. If you are installing from a flash drive, then you will need to set the BIOS to boot from
removable storage.
Step 4
Begin Setup. If the CD has been inserted and the BIOS is set correctly, you will see a message telling you to “Press any key to boot from CD…” Press a key on the keyboard and the setup process for Windows 7 will launch. Your system may automatically launch the setup program without asking you to press any key.
Step 5
Watch the Windows files load. After completion, the Windows 7 logo will appear. No files have been altered on your computer yet. Your data will be deleted in later steps.
Step 6
Choose your preferences. You will be prompted to confirm your Language, Time & Currency format, and Keyboard or input method. Select the appropriate options for you and click Next.
Step 7
Click Install Now. Do not click repair computer, even if you are repairing a computer by reinstalling Windows. Once clicked, Setup will begin loading the files it needs to continue.
Step 8
Read and accept the terms. In order to advance, you must indicate that you have read and agree to Microsoft’s terms of use. Be sure to read through it so that you know your rights and limitations as a user.
Step 9
Choose Custom install. This will allow you to perform a clean installation. Even if you are upgrading a previous version of Windows, it is highly recommended that you perform a clean install. Performing an Upgrade will often lead to devices and programs not operating efficiently and effectively.
Step 10
Delete the partition. A window will open asking where you would like to install Windows. In order to perform a clean install, you need to delete the old partition and start with a clean slate. Click “Drive options (advanced).” This will give you the ability to delete and create partitions. Select the partition of your existing operating system and click the Delete button. If you are installing an operating system for
the first time on this hard drive, then there will be no partitions to delete. If your hard drive has multiple partitions, be sure to delete the correct one. Any data on a deleted partition is lost for good. Confirm
the deletion process.
Step 11
Select the Unallocated Space and click Next.
There is no need to create a partition before you install Windows 7, this is done automatically.
Step 12
Wait while Windows installs files. The percentage next to Expanding Windows files will steadily increase. This part of the process
can take up to 30 minutes. Windows will automatically restart your
computer when finished. Setup will launch again, and a message will
tell you that Setup is updating registry settings.
Setup will then configure your computer’s services. This happens every time you start Windows, but will happen in the background
next time. A window will open letting you know that Windows is completing the installation. Your computer will restart again when this is complete.
Setup will now load drivers and check video settings. This part does not require any input from you.
Step 13
Enter your user name and computer name. Your username will be used to log in to the computer and personalize your account.
Your computer name is the name that your computer will display on the network. You can add more users later through the Windows 7 control panel. Windows will ask you for a password. This is optional but highly recommended, especially if the computer will be accessible by users other than yourself. If you’d rather not have a password, leave the fields blank and click Next.
Step 14
Enter your product key. This is the 25- character key that came with your copy of Windows. Check the “Automatically activate Windows when I’m online” to have Windows automatically verify your key the next time it is connected to the internet.
Step 15
Select your Windows Update option. To make sure that your copy of Windows runs securely and stably, it is highly recommended that you choose one of the first two options. The first option will install all
updates automatically, the second option will prompt you when important updates are available.
Step 16
Select your date and time. These should be correct already as they are linked to your BIOS, but you can change them now if they are not. Check the box if your area observes Daylight Savings.
Step 17
Select network preferences. If your computer is connected to a network, you will be given an option to identify that network. Most users will select Home or Work network. If your computer is being
used in a public place, select Public network. Mobile broadband users should always select Public network. Windows will now attempt to connect your computer to the network. This process is completely automated.
Step 18
Explore your desktop. After one final loading screen, your new Windows 7 desktop will appear. Installation is now
complete. After Installing
Step 19
Run Windows Update. If you selected not to update automatically, you should run Windows Update as soon as possible. This will ensure that you have the latest security and stability fixes. If you chose to automatically update, your computer will start downloading and installing updates as soon as it is connected to the internet.
Step 20
Check your devices and drivers. Windows 7 should install most if not all of your devices automatically. Some older devices may not be initially supported, however. You will need to find the correct drivers
from the device’s manufacturer’s website.
Step 21
Reinstall your programs. Because you did a clean install, none of your old program will be available. You will need to reinstall everything you want to use again. This includes word processors, web browsers,
games, and more. Not all old programs are compatible with Windows 7. Check for updates from the program’s manufacturer, or take a look at our guide on running old programs in Compatibility Mode.
Step 22
Be sure to install a good antivirus program. This is especially important if your computer is connected to an always-online internet
connection.
I hope my guide makes installing Ubuntu an enjoyable, simple experience. By the end of the guide you should have a dual boot Windows / Ubuntu machine that happily plays music, video, and acts
as a perfectly usable home office computer with Open office 3.0. For the really adventurous you could even run Windows XP inside VirtualBox, which is linked to later on in the guide. The
Ubuntu OS is unique and seriously cool, so, enjoy the trip.
If you’re planning on installing the latest version of Ubuntu (Jaunty Jackalope 9.04) you can install Ubuntu straight from the CD inside Windows or from a USB stick and the install process can takes care of formatting your hard drive partition for you. You might not yet have a spare partition to do this, so I’ve covered shrinking your existing Windows partition to make space for Ubuntu here.
How to install Ubuntu from CD
1.) Download the Ubuntu ISO from
http://www.ubuntu.com/getubuntu/download and save to your desktop
2.) Burn the ISO image to a blank CD using Roxio CD creator or similar:
3.) Run the CD from “My Computer” – the CD should ask permission to run at which point you’ll see this option screen:
Install Ubuntu with Wuxi
4.) If you’d like to install Ubuntu using Wuxi, select “install inside Windows” and follow the instructions. Installing with WUBI is ideal for a first taste of Ubuntu as you can remove from add/remove programs in Windows later on. This install process is really easy but you don’t get the same performance as if Ubuntu had a separate partition running on its EXT3 file system. The following screens are all based on the Wuxi installer process, so you can follow the rest of the instructions below.
If you’d like to install Ubuntu separately to Windows,
then skip to point 7) below.
Here’s what you see next:
If you’ve got the space on your hard drive, go for 30gb or more for the installation size.
5.) Now configure your installation using the simple settings options. You can specify the location of the Ubuntu installation on your Windows partition, the size of the Ubuntu installation, the Ubuntu flavor (Ubuntu, Ubuntu, Ubuntu, etc.), your preferred language, and a username and password for the Ubuntu system.
When you click install, you’ll see this screen:
As soon as the files have finished downloading, you’ll see this:
6.) That’s it! Click reboot now, and select “Ubuntu” on the startup screen. You now have a fully functional dual boot Windows / Ubuntu machine.
Install Ubuntu on a single (EXT3) partition (separately to Windows)
7) Click “Demo and full installation” and your computer will restart and boot into Ubuntu.
It’s worth saying at this point that you’re about to install Ubuntu on an entirely separate drive partition. That means, you need to make sure you have enough space on your computer’s hard drive to accommodate the new setup. Keir Thomas found that a partition less than 4gb would lead Ubuntu to crash during install in his first look at Ubuntu 9.04 over at Lifehacker. Here’s a guide on how to resize or shrink your Windows Vista partition. Follow those instructions before you reboot into the live version of Ubuntu and you’ll have
a really easy time during the following steps. Maybe you’d like to install from a USB? Let’s have a quick look at the process of installing from a USB before we continue:
Here’s how to install Ubuntu on a USB drive from Windows Vista:
8.) Format your USB stick with a FAT32 partition from Windows. You can get to the format dialogue by opening My Computer and right moue se clicking the removable drive icon. Click “Format” and follow the settings in the image below. You need a minimum 2gb USB stick.
9.) Download Unbooting allows for the installation of various Linux/Ubuntu distributions to a partition or USB drive,
so it’s no different from a standard install, only it doesn’t need a CD. The coolest thing about the application is that it’s a “portable” app. You don’t need to install it into Windows meaning Unbooting will run on your Windows PC without “admin” privileges.
The new version of Ubuntu isn’t in the Distribution list supplied with Unboots n yet, so u s e t h e d o wn loaded Ubun tu ISO from ear l ier on. Add t h e ISO using the “Disk image”, make sure your USB drive is selected below and click OK.
The ISO transfers to the USB pretty quickly, so soon after you click OK, you’ll see this screen:
10.) That’s it – when the installation process is complete, restart your
computer and make sure it’s set up to boot from USB. On my HP Laptop, pressing F9 on the boot screen shows a boot order menu. Selecting “USB Hard Drive” follows a black screen, an Ubuntu logo, and finally, your new Ubuntu desktop appears.
Completing your Ubuntu installation, step by step
Installing Ubuntu is so easy that it requires very little effort past this point. If you’ve managed to repartition your hard drive and restart your computer you’ll sail through the next few steps:
11.) Click “install” on the live desktop (top left)
12.) Choose your language in the welcome screen.
13.) Choose your location
14.) Choose your keyboard layout.
15.) Set up your disk partition. This is probably the most “technical” part of the installation. When I shrunk my Windows Vista drive volume, I never formatted the new partition, which means the “use the largest continuous free space” option works
nicely:
16.) Choose your username and password.
17.) Migrate your Windows documents and settings.
18.) You’re now ready to install your new Ubuntu installation.
19) When the installation has finished, restart your computer (you’ll be instructed to remove your cd rom or USB drive). You’re now ready to begin using Ubuntu.
Vista. Enter your Product ID in the next window, and if you want to automatically activate Windows the moment the installation finishes, click Next.
If you do not have the Product ID available right now, you can leave the box empty, and click Next. You will need to provide the Product ID later, after the server installation is over.
Click No
6. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own, and therefore you will be prompted to select your correct version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your selection later on.
7. If you did provide the right Product ID, select the Full version
of the right Windows version you’re prompted, and click Next.
8. Read and accept the license terms by clicking to select the checkbox and pressing Next.
9. In the “Which type of installation do you want?” window, click the only available option – Custom (Advanced).
10. In the “Where do you want to install Windows?”, if you’re installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click
Next.
If you’re installing on a hard disk that’s connected to a SCSI controller, click Load Driver and insert the media provided by the controller’s manufacturer.
If you’re installing in a Virtual Machine environment, make sure you read the “Installing the Virtual SCSI Controller Driver for Virtual Server 2005 on
Windows Server 2008”
If you must, you can also click Drive Options and manually create a partition on the destination hard disk.
11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard drive only takes about one minute. However, extracting and uncompressing the files takes a good deal longer
After 20 minutes, the operating system is installed. The exact time it takes to install server core depends upon your hardware specifications. Faster disks will perform much faster installs… Windows Server 2008 takes up approximately 10 GB of hard drive space.
The installation process will reboot your computer, so, if in step #10 you inserted a floppy disk (either real or virtual), make sure you remove it before going to lunch, as you’ll find the server hanged without the ability to boot (you can bypass this by configuring the server to boot from a CD/DVD and then from the hard disk in the booting order on the server’s BIOS).
12. Then the server reboots you’ll be prompted with the new Windows
Server 2008 type of login screen. Press CTRL+ALT+DEL to log in
13. Click on Other User.
14. The default Administrator is blank, so just type Administrator and press Enter.
15. You will be prompted to change the user’s password. You have no
choice but to press Ok.
16. In the password changing dialog box, leave the default password blank (duh, read step #15…), and enter a new, complex, at-least-7- characters-long new password twice. A password like “top
secret” is not valid (it’s not complex), but one like “T0pSecreT!” sure is. Make sure you remember it.
17. Someone thought it would be cool to nag you once more, so now you’ll be prompted to accept the fact that the password had been changed. Press Ok.
18. Finally, the desktop appears and that’s it, you’re logged on and can begin working. You will be greeted by an assistant for the initial server configuration, and after performing some initial configuration tasks, you will be able to start working.
Learning Objective:
After reading this information, you must be able to identify and use hand tools, equipment and testing devices used in install and configure computer systems.
Introduction
A tool is a handheld device that aids in accomplishing a task. Tools range from a traditional metal cutting part of a machine to an element of a computer program that activates and controls functions.
Once selected, use the tool for the purpose for which it was designed. Not all tools come with detailed instructions, but there are those that do spell out the safety “Do’s” and “Don’ts” for your safety. If there are set-up/use options, operator judgment must always be based on what is the safest way to use the tool.