100% found this document useful (1 vote)
1K views5 pages

Computer Systems Servicing

This document provides instructions for using a module on installing and configuring computer systems. The module contains learning materials and activities to complete the unit of competency on installing and configuring desktop computer systems. Learners must go through a series of learning activities, information sheets, job sheets, operation sheets, and activity sheets to complete each learning outcome. The module will provide the activities and relevant information sheets for each learning outcome.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views5 pages

Computer Systems Servicing

This document provides instructions for using a module on installing and configuring computer systems. The module contains learning materials and activities to complete the unit of competency on installing and configuring desktop computer systems. Learners must go through a series of learning activities, information sheets, job sheets, operation sheets, and activity sheets to complete each learning outcome. The module will provide the activities and relevant information sheets for each learning outcome.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

HOW TO USE THIS MODULE

Welcome to the Module “Installing and Configuring Computer Systems”.


This module contains training materials and activities for you to complete.

The unit of competency “Install and Configure Computer Systems”


contains knowledge, skills and attitudes required for a Computer System
Servicing NC II course.

You are required to go through a series of learning activities in


order to complete each of the learning outcomes of the module. In each
learning outcome there are Information Sheets, Job Sheets, Operation
Sheets, and Activity Sheets. Follow these activities on your own and answer
the Self-Check at the end of each learning activity.

Inside this module you will find the activities for you to complete followed
by relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.

COMPUTER SYSTEMS SERVICING (GRADE 11)


MODULE CONTENT

This course is designed to develop knowledge, skills, and attitudes of


a Computer Service Technician in accordance with industry standards. It covers basic
and common competencies such as installing, maintaining, configuring, and
diagnosing computer systems and networks.

UNIT OF COMPETENCY: Install and Configure Computer Systems


MODULE TITLE: Installing and Configuring Computer Systems

MODULE DESCRIPTOR:
This module covers the outcomes required in installing and configuring desktop and
workstation computers systems. It consists of competencies to assemble
computer hardware, install operating system and drivers for peripherals/devices,
and install application software as well as to conduct
testing and documentation

NOMINAL DURATION: 10 hours

LEARNING OUTCOME NO. 1

ASSEMBLE COMPUTER HARDWARE


Contents:
1. OH&S policies and procedures
2. Tools, equipment and testing devices
3. Computer hardware
4. Operating system
5. Established installation procedures
6. Peripherals/devices
7. Application software
8. Stress test

Assessment Criteria
1. Unit assembly is planned and prepared to ensure Occupational Health and Safety
policies and procedures are followed, the work is appropriately sequenced in
accordance with requirements

2. Appropriate personnel are consulted to ensure the work is coordinated effectively


with others involved on the work site

3. Devices/systems are obtained in accordance with established procedures and


to comply with requirements

4. Location in which devices / systems are to be installed is determined from job


requirements

5. Materials necessary to complete the work are obtained in accordance with


established procedures and checked against job requirements

6. Tools, equipment and testing devices needed to carry out the installation
work are obtained in accordance with established procedures and checked for
correct operation and safety

7. Preparatory work is checked to ensure no unnecessary damage has occurred


and complies with requirements

Conditions
The students/trainees must be provided with the following:
 PC or workstations
 Instructional Manuals such as: Occupational Health and Safety
 policies and procedure manual, device manual and hardware diagrams and
charts.
 Tools, equipment’s and test instruments such as: protective eyewear, digital
multi-meter, crimping tools, pliers, screw drivers.
 Supplies and materials such as: appropriate operating system ,driver software,
software applications and programs.

INFORMATION SHEET NO. 1.1-1


OCCUPATIONAL HEALTH AND SAFETY POLICIES AND PROCEDURES

LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
1. Identify the basic precautions and procedures in planning, preparing,
installing and testing of computer hardware and software.

2. Determine the effects of computers to the people, health risk, and to the
environment.

During installation and initial test, careful planning and preparation are
to be done. To avoid personal injury and damages to wiring due to sharp pins
on connectors and printed circuit assemblies, rough chassis edges and corners,
and hot components.
Adhere to warnings and limitations regarding accessibility into areas
designated only for authorized technical personnel.

CONCEPT DEVELOPMENT:
SOME BASIC PRECAUTIONS AND PROCEDURES:
 Before starting the installation, read carefully the documentation and
procedures on any hardware and software settings that may be required.
 Failure to do the proper jumper setting may cause damage to your CPU.
 Without an effective cooling fan, the CPU can overheat and cause damage to
both CPU and the motherboard.
 Each bank must have the same size and type of memory installed in pairs.
 Before adding and removing any other system components, make sure that you
unplug your power supply. Failure to do so may cause damage to your
motherboard and in the system component.
 Test the computer, insuring that it meets the necessary system
requirements before booting up.
 If the computer does not pass any of the power on self-test (POST), the
computer will receive an irregular power on self-test. An irregular POST is a
beep code which is different from the standard beep which can either be no
beeps at all or a combination of different beeps.

EFFECTS OF COMPUTERS
Some effects of computers relating to the violation of privacy, the impact
on the labor force, health risks, and the impact on the environment.

1. Violation of Privacy
Nearly every life event is stored in a computer somewhere--in medical records,
credit reports, tax records, etc. It is crucial that personal and confidential
records be protected properly. In many instances, where these records were not
properly protected, individuals have found their privacy violated and identities
stolen.

2. Impact on Labor Force


Although computers have improved productivity in many ways and created an
entire industry with hundreds of thousands of new jobs, the skills of millions of
workers and managers have been replaced by computers. Thus, it is crucial
that workers keep their education up-to-date. A separate impact on the labor
force is that some companies are outsourcing jobs to foreign countries instead
of keeping their homeland labor force employed.

3. Health Risks
Prolonged or improper computer use can lead to injuries or disorders of
the hands, wrists, elbows, eyes, necks, and back. Computer users can protect
themselves from these health risks through proper workplace design,
good posture while at the computer, and appropriately spaced work breaks.
Another health risk, called computer addiction, occurs when someone becomes
obsessed with using the computer. Once recognized, computer addiction is
a treatable disorder.

4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim
to crimes committed by dangerous strangers. Protect yourself and your
dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.

5. Impact on Environment
Computer manufacturing processes and computer waste are
depleting natural resources and polluting the environment. The amount of
resources required to manufacture a personal computer equals that of a
mid-sized car. When computers are discarded in landfills, they release toxic
materials and potentially dangerous levels of lead, mercury, and flame
retardants. Strategies that can help protect the environment include
recycling, regulating manufacturing processes, extending the life of
computers, and immediately donating replaced computers Prolonged or
improper computer use can lead to injuries or disorders of the hands, wrists,
elbows, eyes, necks, and back. Computer users can protect themselves from
these health risks through proper workplace design, good posture while at the
computer, and appropriately spaced work breaks. Another health risk, called
computer addiction, occurs when someone becomes obsessed with using the
computer. Once recognized, computer addiction is a treatable disorder.

4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
Some of these unsuspecting, innocent computer users have fallen victim
to crimes committed by dangerous strangers. Protect yourself and your
dependents from these criminals by being cautious. For example, do not share
information that would allow others to identify or locate you.

5. Impact on Environment
Computer manufacturing processes and computer waste are
depleting natural resources and polluting the environment. The amount of
resources required to manufacture a personal computer equals that of a
mid-sized car. When computers are discarded in landfills, they release toxic
materials and potentially dangerous levels of lead, mercury, and flame
retardants. Strategies that can help protect the environment include
recycling, regulating manufacturing processes, extending the life of
computers, and immediately donating replaced computers

SELF-CHECK NO. 1.1-1


A. IDENTFICATION
Direction: Identify the Precautions and Procedures write TRUE if the statement
is correct and FALSE if the statement is wrong.

____________1. Failure to do the proper jumper setting may cause damage to


your CPU.
____________ 2. After adding and removing any other system components, make
sure that you unplug your power supply.
_____________3. Test the computer, insuring that it meets the necessary system
requirements before booting up.
_____________4. With an effective cooling fan, the CPU can overheat and cause
damage to both CPU and the motherboard.
_____________5. After starting the installation, read carefully the documentation
and procedures on any hardware and software settings that may be required.

B. MATCHING TYPE

Direction: Select your answer on the choices below that will correspond on
the statement. Write the letter of your answer on the space provided.

A. Violation of Privacy
B. Impact on the Environment
C. Public Safety
D. Health Risk
E. Impact on Labor Force

________1. Computer manufacturing processes and computer waste are


depleting natural resources and polluting the environment.
________2. Although computers have improved productivity in many ways and
created an entire industry with hundreds of thousands of new jobs, the skills of
millions of workers and managers have been replaced by computers.
________3. It is crucial that personal and confidential records be protected
properly.
_________4. Adults, teen, and children around the world are using computers to
share publicly their photos, videos, journals, music, and other personal
information.
_________5. Prolonged or improper computer use can lead to injuries or
disorders of the hands, wrists, elbows, eyes, necks, and back.

You might also like