Sector: ELECTRONICS
Qualification COMPUTER SYSTEMS SERVICING NC II
Title:
Unit of INSTALL AND CONFIGURE COMPUTER
Competency: SYSTEMS
Module Title: INSTALLING AND CONFIGURING
COMPUTER SYSTEMS
JASAAN NATIONAL HIGH SCHOOL-SENIOR HIGH SCHOOL
Lower Jasaan, Jasaan, Misamis Oriental
HOW TO USE THIS COMPETENCY BASED LEARNING
MATERIAL
Welcome to the module in “Installing and Configuring
Computer Systems” one of the competencies of Electrical
Installation and Maintenance, a course which comprises the
knowledge, skills and attitudes required for a TVET trainer to possess.
This module contains training materials and activities for you to
complete.
The unit of competency “Install and Configure Computer
Systems” deals with the skills, knowledge and attitude required to plan
and install different electrical wiring, electronic circuits, under the
schedule of work and work instructions, checking the quality of work
done with safety procedures under the safety regulation in electrical
job.
This module will lead you through different learning activities to
complete each learning outcome of the module. Each learning
outcomes is provided with Information Sheets (Reference Materials
for further reading to help you better understand the required activities).
Follow these activities and answer the self-check at the end of each
learning outcome. You may remove a blank answer sheet at the
end of each module (or get one from your facilitator/trainer) to write
your answers for each self-check. If you have questions, don’t
hesitate to ask your facilitator for assistance.
Recognition of Prior Learning (RPL)
You may already have some or most of the knowledge and
skills covered in this learner's guide because you have:
• been working for some time
• already completed training in this area.
If you can demonstrate to your trainer that you are competent in a
particular skill or skills, talk to him/her about having them formally
recognized so you don't have to do the same training again. If you have
a qualification or Certificate of Competency from previous trainings,
show it to your trainer. If the skills, you acquired are still current and
relevant to the unit/s of competency they may become part of the
evidence you can present for RPL. If you are not sure about the
currency of your skills, discuss this with your trainer.
At the end of this module is a Learner’s Diary. Use this diary
to record important dates, jobs undertaken and other workplace
events that will assist you in providing further details to your trainer
or assessor. A Record of Achievement is also provided for your
trainer to complete once you complete the module.
This module was prepared to help you achieve the required
competency, in Install and Configure Computer Systems. This will
be the source of information for you to acquire knowledge and skills in
this particular trade independently and at your own pace, with
minimum supervision or help from your instructor.
§ Talk to your trainer and agree on how you will both organize
the Training of this unit. Read through the module carefully. It
is divided into sections, which cover all the skills, and
knowledge you need to successfully complete this module.
§ Work through all the information and complete the activities in
each section. Read information sheets and complete the self-
check. Suggested references are included to supplement the
materials provided in this module.
§ Use the self-check questions at the end of each section to test
your own progress.
§ When you are ready, ask your trainer to watch you perform
the activities outlined in this module.
§ As you work through the activities, ask for written feedback on
your progress. Your trainer keeps feedback/ pre-assessment
reports for this reason. When you have successfully completed
each element, ask your trainer to mark on the reports that you
are ready for assessment.
When you have completed this module (or several modules), and
feel confident that you have had sufficient practice, your trainer will
arrange an appointment with registered assessor to assess you. The
results of your assessment will be recorded in your competency
Achievement Record.
PARTS COMPETENCY-BASED LEARNING MATERIAL
COMPUTER SYSTEMS SERVICING NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Module Title Code
Competency
Install and Installing and ELC724331
1. configure computer configure
systems computer systems
2. Set-up Computer Set-up Computer ELC724332
3. Set-up Computer Set-up Compu Servers ELC724333
Servers
Maintain and Repair Maintaining and
4. Computer Systems Repairing Computer ELC724334
and Networks Systems and Networks
MODULE CONTENT
UNIT OF COMPETENCY : INSTALL AND CONFIGURE
COMPUTER SYSTEMS
MODULE TITL : INSTALLING & CONFIGURING
COMPUTER SYSTEMS
MODULE DESCRIPTOR: This module covers the outcomes
required in installing and configuring desktop and workstation
computers systems. It consists of competencies to assemble
computer hardware, install operating system and drivers for
peripherals/devices, and install application software as well as to
conduct testing and documentation.
NOMINAL DURATION: 40 Hours
LEARNING OUTCOMES: Install wiring devices
At the end of this module you MUST be able to:
1. Assemble computer hardware
2. Prepare installer
3. Install operating system and drivers for peripherals/
devices
4. Install application software
5. Conduct testing and documentation
ASSESSMENT CRITERIA:
1. Plan and prepare unit t o b e assembled and ensure OH&S
policies and procedures are followed in accordance with
systems requirements
2. Identify and obtain Materials needed to complete the work in
accordance with established procedures and check against
systems requirements
3. Prepare tools, equipment and testing devices needed to
carry out the installation work in accordance with
established procedures and check for correct operation
and safety
4. Assemble the Computer hardware in accordance with
established procedures and systems requirements
5. Configure the Basic-input-output-system (BIOS) in
accordance with hardware requirements.
6. Create Portable bootable devices in accordance with
software manufacturer instruction
7. Prepare a customized installers in accordance with software
utilization guide and end user agreement.
8. Install the portable applications in accordance with software
user guide and software license
9. Install the Operating system (OS) in accordance with
established installation procedures and to comply with end-
user requirements
10. Install the Peripherals/devices drivers and configure in
accordance with manufacturer’s instructions and/or OS
installation procedures.
11. Install OS and drivers in accordance with manufacturer’s
recommendations and requirements for updates/patches
accessibility
12. On-going checks of the quality of the work are undertaken in
accordance with established procedures
13. Install the Application software based on software installation
guides, end-user requirements and software license
agreement
14. Install the application software in its variation in accordance
to customer/client requirements
15. Access and Install Software updates in accordance with
manufacturer’s recommendations and requirements
16. Test the devices / systems and/or installation to determine
whether it conforms to requirements
17. Conduct a stress test to ensure reliability of equipment in
accordance with manufacturer’s instructions and system
requirements
18. Follow 5S and 3Rs according to environmental policies
19. Forward the documentation in relation to the test to the
appropriate personnel and/or authority in accordance with
requirements
CONDITIONS:
The following resources MUST be provided:
1. Tools and test instruments
2. PC or workstation
3. Computer peripherals/devices
ASSESSMENT METHOD:
1. Practical Demonstration with oral questioning
2. Interview
3. Portfolio
4. Direct observation
5. Hands-on
LEARNING EXPERIENCES
LEARNING OUTCOME 3
INSTALL APPLICATION SOFTWARE
Learning Activities Special Instructions
Read Info Sheet 1.3-1 on Productivity
Tools and Microsoft Office
Answer Self- Check 1.3-1 On Compare answer with answer key
Productivity Tools and Microsoft Office 1.3-1
Read info sheet 1.3-2 and View slides
presentation on Games and Utilities
Answer Self- Check 1.3-2 On Games Compare answer with answer key
and Utilities 1.3-2
Read info sheet 1.3-3 View slide
presentation on Application Software
agreement
Answer Self- Check 1.3-3 On Games Compare answer with answer key
and Utilities 1.3-3
Read info sheet 1.3-4 on Software
updates procedures
Answer Self- Check 1.3-4 On Software Compare answer with answer key
updates procedures 1.3-4
View slide presentation on the
installation of the Microsoft Office
Application
Job sheet 1.3-1 on Installation of Evaluate Performance using the
Microsoft Application Software Performance Criteria Checklists 1.3-1
Information Sheet 1.3-1
PRODUCTIVITY TOOLS
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be
able to:
1. Provide a comprehensive understanding of how these tools can
transform individual and team performance, leading to more efficient
and effective work processes.
2. Explore how the suite of applications can be utilized to enhance
productivity, streamline workflows, and improve overall efficiency in
various settings such as business, education, and personal use.
Productivity tools are software applications or platforms designed to help
individuals and teams efficiently complete tasks, manage projects, and optimize
workflows. These tools aim to enhance productivity by simplifying processes,
improving collaboration, and automating repetitive tasks. Here are some
common types of productivity tools:
1. Task Management Tools: Help organize and prioritize tasks, set deadlines,
and track progress (e.g., Todoist, Asana, Trello).
2. Project Management Software: Aid in planning, executing, and
monitoring projects, often featuring task assignments, timelines, and
reporting (e.g., Microsoft Project, Monday.com, Jira).
3. Communication Tools: Facilitate team communication and collaboration
through messaging, video conferencing, and file sharing (e.g., Slack,
Microsoft Teams, Zoom).
4. Note-taking Applications: Allow users to jot down ideas, make lists, and
organize information (e.g., Evernote, OneNote, Notion).
5. Time Management and Scheduling Tools: Help manage time effectively
by scheduling meetings, setting reminders, and tracking time spent on
tasks (e.g., Google Calendar, Microsoft Outlook, Toggl).
6. File Storage and Sharing Services: Provide secure storage for
documents and facilitate easy sharing and collaboration (e.g., Google Drive,
Dropbox, OneDrive).
7. Automation Tools: Automate repetitive tasks and integrate different
software applications to streamline workflows (e.g., Zapier, IFTTT).
8. Document Collaboration Platforms: Allow multiple users to work on
documents simultaneously and track changes (e.g., Google Docs,
Microsoft Office 365).
9. Mind Mapping and Brainstorming Tools: Help visualize ideas and
organize thoughts (e.g., MindMeister, XMind).
10. Customer Relationship Management (CRM) Software: Manage
interactions with customers, track sales, and organize customer information
(e.g., Salesforce, HubSpot CRM).
These tools are essential for increasing efficiency, enhancing
collaboration, and maintaining organization in both personal and professional
settings.
MICROSOFT OFFICE
Microsoft Office is a suite of productivity software applications developed
by Microsoft. It is widely used in both personal and professional settings for
various tasks related to document creation, data analysis, communication, and
more. The suite includes a variety of applications, each designed for specific
types of tasks:
1. Microsoft Word: A word processing program used for creating, editing,
and formatting documents. It is commonly used for writing reports, letters,
and other text-based documents.
2. Microsoft Excel: A spreadsheet program used for data analysis, financial
modeling, and calculations. It includes features for creating charts, graphs,
and pivot tables, making it a powerful tool for handling numerical data.
3. Microsoft PowerPoint: A presentation program used for creating
slideshows. It is often used for business presentations, lectures, and other
forms of visual communication.
4. Microsoft Outlook: An email client and personal information manager. It
includes features for email management, calendar scheduling, task
management, and contact management.
5. Microsoft Access: A database management system that combines the
relational Microsoft Jet Database Engine with a graphical user interface and
software-development tools. It is used for creating and managing
databases.
6. Microsoft OneNote: A note-taking application that allows users to organize
notes, drawings, screen clippings, and audio commentaries. Notes can be
shared with other OneNote users over the internet or a network.
7. Microsoft Publisher: A desktop publishing application used for creating
brochures, flyers, newsletters, and other marketing materials.
8. Microsoft OneDrive: A file hosting service that allows users to store files
in the cloud and sync them across devices. It also enables sharing and
collaborative editing of documents.
9. Microsoft Teams: A collaboration platform that includes chat, video
meetings, file storage, and application integration. It is designed to enhance
teamwork and communication.
10. Microsoft SharePoint: A web-based collaborative platform that
integrates with Microsoft Office. It is used for creating websites, storing
documents, and enabling collaboration within organizations.
Microsoft Office is available in different versions, including Office 365 (now
known as Microsoft 365), which is a subscription-based service providing
access to the latest versions of Office applications along with cloud services.
There are also standalone versions of Office that can be purchased outright.
Overall, Microsoft Office is a comprehensive suite of tools that enhances
productivity and efficiency for a wide range of tasks.
SELF – CHECK 1.3-1
MULTIPLE CHOICE
Direction: Select the letter of the correct answer and write it in a
separate paper.
1. Slack is best described as a tool for:
A. Creating spreadsheets
B. Team communication and collaboration
C. Writing and editing code
D. Designing marketing materials
2. Which of the following tools is used for creating and managing to-do
lists and tasks?
A. Asana
B. Audacity
C. Unity
D. Final Cut Pro
3. Which productivity tool is known for its real-time collaboration on
documents?
A. Adobe Photoshop
B. Google Docs
C. AutoCAD
D. DaVinci Resolve
4. Which application in Microsoft Office is primarily used for word
processing?
A. Microsoft Excel
B. Microsoft Word
C. Microsoft PowerPoint
D. Microsoft Access
5. Which Microsoft Office application is designed for creating and
managing spreadsheets?
A. Microsoft Outlook
B. Microsoft OneNote
C. Microsoft Excel
D. Microsoft Publisher
SELF – CHECK ANSWER KEY 1.3-1
1. B. Team communication and collaboration
2. A. Asana
3. B. Google Docs
4. B. Microsoft Word
5. C. Microsoft Excel
Information Sheet 1.3-2
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be
able to:
1. Provide a historical overview of games included in Microsoft Office.
2. Discuss the purposes these games served and their benefits to users.
3. Highlight specific games that were included in various versions of
Microsoft Office.
GAMES
Microsoft Office is primarily a suite of productivity tools, but over the years,
some versions and components of Microsoft Office have included built-in
games or playful features. Here are a few notable examples:
1. Excel Easter Eggs:
• Excel 95: A flight simulator was hidden in Excel 95, accessible
through a series of specific steps.
• Excel 97: A hidden racing game called "Dev Hunter" could be
activated by following certain steps.
2. Word Easter Eggs:
• Word 97: There was a pinball game hidden within Word 97, accessed
through a series of steps involving a particular document.
3. Microsoft Office 2003:
• Office 2003 included some hidden Easter eggs, though not full-
fledged games like in the earlier versions.
4. OneNote:
• In OneNote, you can create to-do lists and checklists which can be
turned into a playful way to manage tasks, although not a game in the
traditional sense.
5. Microsoft Solitaire Collection:
• While not part of Microsoft Office, Microsoft Solitaire Collection comes
pre-installed with Windows and has been a long-time companion to
the Office suite on many computers.
These hidden games, known as Easter eggs, were typically created by
the developers as a fun and secret feature. However, newer versions of
Microsoft Office have moved away from including such Easter eggs, focusing
more on productivity and security.
For modern gaming within the Microsoft ecosystem, users are more likely
to find games through the Microsoft Store or Xbox services, rather than within
the Office suite itself.
UTILITIES
In computing, "Utilities" refer to specialized programs that help manage,
maintain, and optimize computer systems. These utilities perform specific tasks
aimed at improving the performance, security, and efficiency of the system.
Here are some common types of computer utilities and their functions:
1. Antivirus software is a type of utility program designed to detect, prevent,
and remove malware (malicious software) from computers and other
devices. Malware includes viruses, worms, Trojan horses, spyware,
adware, ransomware, and other harmful programs that can compromise
the security and performance of a system.
2. Diagnostic and repair utilities in computing refer to software tools and
procedures used to identify, troubleshoot, and fix issues within a computer
system. These utilities help maintain the health and performance of the
system by detecting problems, providing solutions, and repairing any
detected issues.
3. Virtualization software allows a single physical computer to run multiple
virtual machines (VMs), each with its own operating system and
applications. This technology abstracts the physical hardware, enabling
more efficient resource use, flexibility, and isolation between different
computing environments. Virtualization is widely used in data centers,
cloud computing, software development, and testing environments.
During installation and initial test, careful planning and
preparation are to be done. To avoid personal injury and damages
to wiring due to sharp pins on connectors and printed circuit
assemblies, rough chassis edges and corners, and hot components.
Adhere to warnings and limitations regarding accessibility
into areas designated only for authorized technical personnel.
SELF – CHECK 1.3-2
MULTIPLE CHOICE
Direction: Select the letter of the correct answer and write it in a
separate paper.
4. Which classic game was included with Microsoft Office to help users
learn mouse skills?
A. Solitaire
B. Minesweeper
C. FreeCell
D. Microsoft Office Quiz
2. In which version of Microsoft Office was the game "Hover!" included?
A. Office 95
B. Office 97
C. Office 2000
D. Office XP
3. Which game was hidden in Microsoft Excel 97 as an Easter egg?
A. Space Invaders
B. Tic-Tac-Toe
C. Flight Simulator
D. Racing Car
4. What is the main purpose of an antivirus utility?
A. To design graphics
B. To play video files
C. To detect and remove malware
D. To manage email accounts
5. What is the main purpose of an antivirus utility?
A. To design graphics
B. To play video files
C. To detect and remove malware
D. To manage email accounts
SELF – CHECK ANSWER KEY 1.3-2
A. Solitaire
A. Office 95
C. Flight Simulator
C. To detect and remove malware
C. File History
Information Sheet 1.3-3
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be
able to:
1. Provide an overview of software licensing and its importance in regulating
the use of application software.
2. Discuss the rights granted to users and the restrictions imposed by the
software license agreement.
3. Explore how the license agreement protects the intellectual property
rights of the software developer or vendor.
APPLICATION SOFTWARE LICENSE AGREEMENT
An application software agreement, also known as a software
license agreement or end-user license agreement (EULA), is a legal contract
between the software provider (licensor) and the user (licensee) that outlines
the terms and conditions for using a particular software application. This
agreement defines how the software can be used, the rights and responsibilities
of both parties, and any limitations or restrictions on the use of the software.
Here are the key components typically found in an application software
agreement:
Key Components of an Application Software Agreement
1. License Grant:
• Describes the scope of the license being granted to the user, such as
whether it is a perpetual or subscription-based license, and the
extent of use permitted (e.g., single user, multi-user, site license).
2. Usage Rights and Restrictions:
• Specifies how the software can be used, including any limitations
(e.g., number of installations, geographic restrictions).
• Prohibits certain activities, such as reverse engineering, modifying, or
redistributing the software.
3. Intellectual Property Rights:
• Clarifies that the software provider retains ownership of the software
and its intellectual property.
• Explains that the user is only granted a license to use the software
and does not gain any ownership rights.
4. Payment Terms:
• Details the payment structure for the software license, including any
initial fees, subscription fees, renewal terms, and payment
schedules.
5. Support and Maintenance:
• Describes the level of support and maintenance provided by the
software provider, including any associated costs.
• May include details on software updates, patches, and bug fixes.
6. Warranties and Disclaimers:
• Provides any warranties offered by the software provider, such as the
software being free from defects or performing as described.
• Includes disclaimers of warranties, stating that the software is
provided "as is" and limiting the provider's liability.
7. Limitation of Liability:
• Limits the software provider's liability for any damages arising from
the use or inability to use the software.
• Specifies the maximum number of damages the provider may be
liable for.
8. Termination:
• Outlines the conditions under which the agreement can be terminated
by either party, such as breach of terms or non-payment.
• Describes the consequences of termination, including the user's
obligation to cease using the software and delete all copies.
9. Governing Law and Dispute Resolution:
• Specifies the governing law that will apply to the agreement and how
disputes will be resolved (e.g., arbitration, mediation, court
jurisdiction).
10. Confidentiality:
• Obligates the user to keep certain information related to the software
confidential and not disclose it to third parties.
11. Audit Rights:
• Grants the software provider the right to audit the user's compliance
with the agreement terms, usually concerning usage and payment.
Importance of an Application Software Agreement
• Protects Intellectual Property: Ensures that the software provider's
intellectual property rights are safeguarded.
• Defines Usage Rights: Clearly outlines what users can and cannot do
with the software, preventing misuse and unauthorized distribution.
• Manages Expectations: Sets clear expectations regarding support,
maintenance, and updates, which helps avoid misunderstandings.
• Limits Liability: Provides legal protection for the software provider by
limiting their liability for potential issues arising from software use.
• Facilitates Compliance: Helps ensure that users comply with the terms
of use, which is crucial for both legal and operational reasons.
By establishing clear terms and conditions, an application software
agreement helps create a fair and transparent relationship between the
software provider and the user, ensuring that both parties understand their
rights and obligations.
SELF – CHECK 1.3-3
TRUE OR FALSE
Direction: Read each question carefully, write the word TAMA if
the statement is correct and MALI if it is wrong. Write your correct
as answer in a separate paper.
1. An End-User License Agreement (EULA) is a type of application
software agreement.
o True or False?
2. Application software agreements typically grant users full ownership of
the software.
o True or False?
3. The "License Grant" section of an application software agreement
specifies how the software can be used.
o True or False?
4. A "Limitation of Liability" clause in an application software agreement
usually increases the software provider's liability for damages.
o True or False?
5. The "Termination" section of an application software agreement outlines
the conditions under which the agreement can end.
o True or False?
SELF – CHECK ANSWER KEY 1.3-3
1. TAMA
2. MALI
3. TAMA
4. MALI
5. TAMA
Information Sheet 1.3-4
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be
able to:
1. Provide an overview of what software updates entail and why they
are necessary.
2. Discuss the systematic process involved in updating application
software.
SOFTWARE UPDATE PROCEDURES
A software update procedure outlines the systematic steps and best
practices for updating software to ensure that it remains secure, stable, and
functional. The procedure typically includes several key stages and
considerations to minimize risks and disruptions while implementing updates.
Here's a general framework for a software update procedure:
1. Preparation Phase
a. Review Release Notes:
o Understand what changes, improvements, or fixes are included in the
update.
b. Backup Data and Configuration:
o Before proceeding with updates, ensure critical data and configuration
settings are backed up to prevent data loss in case of unforeseen issues
during the update process.
c. Assess Impact and Risks:
o Evaluate how the update may affect existing functionalities, integrations,
and dependencies.
o Identify potential risks such as compatibility issues with other software
or hardware.
d. Notify Stakeholders:
o Inform relevant stakeholders about the upcoming update, including IT
teams, users, and customers if applicable.
o Provide information on expected downtime, if any, and how users may
be affected.
2. Testing Phase
a. Test in Development Environment:
o Deploy the update in a controlled development or test environment to
identify any issues or conflicts that may arise.
o Verify that all critical functionalities are working correctly after the update.
b. User Acceptance Testing (UAT):
o If applicable, involve end-users or a representative group to test the
update in a simulated production environment.
o Gather feedback and address any concerns or issues identified during
testing.
3. Deployment Phase
a. Schedule Downtime:
o Plan a maintenance window or schedule downtime during off-peak hours
to minimize disruption to users.
b. Execute the Update:
o Follow the vendor's instructions or guidelines for installing the update.
o Ensure that all necessary prerequisites (e.g., software dependencies,
system requirements) are met before proceeding.
c. Monitor Progress:
o Monitor the update process closely to detect and resolve any issues
promptly.
o Verify that the update completes successfully without errors.
4. Post-Update Phase
a. Verification and Testing:
o Conduct post-update testing to confirm that the software is functioning
as expected.
o Verify that all critical functionalities and integrations are working correctly.
b. Communicate Completion:
o Notify stakeholders, including users and IT teams, once the update is
successfully completed.
o Provide any necessary instructions or information about changes
introduced by the update.
c. Documentation and Reporting:
o Document details of the update process, including any challenges faced
and solutions implemented.
o Update relevant documentation, such as system manuals or support
guides, to reflect the current software version.
d. Monitor and Support:
o Monitor the system closely after the update to address any post-update
issues promptly.
o Provide support to users or customers who may experience difficulties
related to the update.
5. Security Considerations
a. Patch Management:
o Ensure that critical security patches are applied promptly to mitigate
vulnerabilities.
o Stay informed about security advisories and prioritize updates that
address security risks.
b. Compliance and Regulations:
o Adhere to regulatory requirements and compliance standards related to
software updates and security measures.
c. Backup and Disaster Recovery:
o Maintain regular backups and disaster recovery plans to minimize
potential data loss or system downtime resulting from failed updates.
Best Practices
• Regular Maintenance: Implement a regular schedule for software updates
to keep systems secure and up to date.
• Change Management: Follow established change management
procedures to track and document all changes made to software systems.
• Communication: Maintain clear communication with stakeholders
throughout the update process to manage expectations and minimize
disruptions.
By following a structured software update procedure, organizations can
effectively manage software updates while minimizing risks and ensuring the
continued reliability and security of their systems.
Software update procedures for applications involve specific steps and
considerations to ensure that updates are deployed smoothly while minimizing
disruption to users and maintaining system integrity.
Update procedures for utilities software, which includes various
system management tools and applications designed to optimize and maintain
computer systems, typically involve specific steps to ensure that updates are
deployed effectively without causing disruptions.
SELF – CHECK 1.3-4
1. Which of the following is the first step in a typical software update
procedure?
A. Deploying the update to all users
B. Backing up data and configuration
C. Reviewing release notes and change logs
D. Conducting post-update testing
2. What is the main purpose of the testing phase in a software
update procedure?
A. To notify stakeholders
B. To ensure the update works as expected without issues
C. To back up data
D. To execute the update process
3. Which environment is typically used to test an update before
deploying it to production?
A. Production environment
B. Development environment
C. Staging or test environment
D. Backup environment
4. What is a rollback plan in the context of software updates?
A. A plan to increase the number of users
B. A plan to revert to the previous software version if the update fails
C. A plan to improve the update features
D. A plan to notify users about new updates
5. Which of the following is a key security consideration during
software updates?
A. Ignoring security patches
B. Applying security patches promptly
C. Avoiding any form of user notification
D. Delaying updates indefinitely
SELF – CHECK ANSWER KEY 1.3-4
1. C. Reviewing release notes and change logs
2. B. To ensure the update works as expected without issues
3. C. Staging or test environment
4. B. A plan to revert to the previous software version if the update fails
5. B. Applying security patches promptly
JOB SHEET 1.3-1
TITLE: Installation of Microsoft Application Software
PERFORMANCE OBJECTIVE:
By performing this task, you should be a b l e to
s u c c e s s f u l l y install the Microsoft Office application in your
Computer or Laptop.
TIME DURATION: 40 minutes
SUPPLIES/ MATERIALS:
§ Ball Pen
§ Reservations Form
§ Installation Guide
EQUIPMENT:
§ Computer/laptop
§ Flash Drive with OS Installer (Bootable Disk)
§ Printer
STEPS/ PROCEDURE:
1. Turn on your Computer/ Laptop and insert the flash disk
2. Double Click/ right click and select open my computer icon.
3. Double Click and open the folder named Office 2013.
4. Double click to run application named SET UP.
5. Click yes when dialogue prompt the user to allow the
application to make changes to your device.
6. Click Accept and click continue when the software license term
agreement appears.
7. Click continue online after installation is done.
8. Click window button, right click office 2013 and select pin to
start.
9. Click Microsoft Word, in first things first dialogue, click ask
me later.
ASSESSMENT METHOD: Role-play / Demonstration
PERFORMANCE CRITERIA CHECKLIST JOB SHEET 1.1-3
Installation of Microsoft Application Software
Student: _____________________________________ Date:___________
CRITERIA YES NO
Did the trainee …
1. Turn on your Computer/ Laptop and insert the
flash disk?
2. Double Click/ right click and select open my
computer icon?
3. Double Click and open the folder named Office
2013?
4. Double click to run application named SET UP?
5. Click yes when dialogue prompt to allow the
application to make changes on device?
6. Click Accept and click continue when the software
license term agreement appears?
7. Click continue online after installation is done?
8. Click window button, right click office 2013 and
select pin to start?
9. Click Microsoft Word, in first things first dialogue
box and click ask me later?
Comments/ Suggestions:
Trainer’s Signature:____________________ Date:____________