Computer Systems Servicing
Computer Systems Servicing
Inside this module you will find the activities for you to complete followed
by relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.
MODULE DESCRIPTOR:
This module covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists of competencies to assemble
computer hardware, install operating system and drivers for peripherals/devices,
and install application software as well as to conduct
testing and documentation
Assessment Criteria
1. Unit assembly is planned and prepared to ensure Occupational Health and Safety
policies and procedures are followed, the work is appropriately sequenced in
accordance with requirements
6. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety
Conditions
The students/trainees must be provided with the following:
PC or workstations
Instructional Manuals such as: Occupational Health and Safety
policies and procedure manual, device manual and hardware diagrams and
charts.
Tools, equipment’s and test instruments such as: protective eyewear, digital
multi-meter, crimping tools, pliers, screw drivers.
Supplies and materials such as: appropriate operating system ,driver software,
software applications and programs.
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing,
installing and testing of computer hardware and software.
2. Determine the effects of computers to the people, health risk, and to the
environment.
During installation and initial test, careful planning and preparation are
to be done. To avoid personal injury and damages to wiring due to sharp pins
on connectors and printed circuit assemblies, rough chassis edges and corners,
and hot components.
Adhere to warnings and limitations regarding accessibility into areas
designated only for authorized technical personnel.
CONCEPT DEVELOPMENT:
SOME BASIC PRECAUTIONS AND PROCEDURES:
Before starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.
Failure to do the proper jumper setting may cause damage to your CPU.
Without an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
Each bank must have the same size and type of memory installed in pairs.
Before adding and removing any other system components, make sure that you
unplug your power supply. Failure to do so may cause damage to your
motherboard and in the system component.
Test the computer, insuring that it meets the necessary system
requirements before booting up.
If the computer does not pass any of the power on self-test (POST), the
computer will receive an irregular power on self-test. An irregular POST is a
beep code which is different from the standard beep which can either be no
beeps at all or a combination of different beeps.
EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact
on the labor force, health risks, and the impact on the environment.
1. Violation of Privacy
Nearly every life event is stored in a computer somewhere--in medical records,
credit reports, tax records, etc. It is crucial that personal and confidential
records be protected properly. In many instances, where these records were not
properly protected, individuals have found their privacy violated and identities
stolen.
3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of
the hands, wrists, elbows, eyes, necks, and back. Computer users can protect
themselves from these health risks through proper workplace design,
good posture while at the computer, and appropriately spaced work breaks.
Another health risk, called computer addiction, occurs when someone becomes
obsessed with using the computer. Once recognized, computer addiction is
a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim
to crimes committed by dangerous strangers. Protect yourself and your
dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.
5. Impact on Environment
Computer manufacturing processes and computer waste are
depleting natural resources and polluting the environment. The amount of
resources required to manufacture a personal computer equals that of a
mid-sized car. When computers are discarded in landfills, they release toxic
materials and potentially dangerous levels of lead, mercury, and flame
retardants. Strategies that can help protect the environment include
recycling, regulating manufacturing processes, extending the life of
computers, and immediately donating replaced computers Prolonged or
improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, necks, and back. Computer users can protect themselves from
these health risks through proper workplace design, good posture while at the
computer, and appropriately spaced work breaks. Another health risk, called
computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim
to crimes committed by dangerous strangers. Protect yourself and your
dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.
5. Impact on Environment
Computer manufacturing processes and computer waste are
depleting natural resources and polluting the environment. The amount of
resources required to manufacture a personal computer equals that of a
mid-sized car. When computers are discarded in landfills, they release toxic
materials and potentially dangerous levels of lead, mercury, and flame
retardants. Strategies that can help protect the environment include
recycling, regulating manufacturing processes, extending the life of
computers, and immediately donating replaced computers
B. MATCHING TYPE
Direction: Select your answer on the choices below that will correspond on
the statement. Write the letter of your answer on the space provided.
A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force