Curriculum Based Learning Materials - CSS-2
Curriculum Based Learning Materials - CSS-2
LEARNING MATERIAL
Sector:
Follow these activities on your own. If you have questions, don’t hesitate to
ask your facilitator for assistance.
The goal of this course is the development of practical skills. To gain these
skills, you must learn basic concepts and terminologies. For the most part, you'll
get this information from the Information Sheets and suggested resources and
references
This module is prepared to help you achieve the required competency, in
"Installing and Configuring Computer System".
This will be the source of information for you to acquire knowledge and
skills in this particular competency independently and at your own pace, with
minimum supervision or help from your trainer.
Remember to:
Work through all the information and complete the activities in each section.
Read information sheets and complete the self-check. Suggested references
are included to supplement the materials provided in this module.
Most probably your trainer will also be your supervisor or manager. He/She is
there to support you and show you the correct way to do things.
You will be given plenty of opportunity to ask questions and practice on the
job. Make sure you practice your new skills during regular work shifts. This
way you will improve both your speed and memory and also your confidence.
Use the Self-checks, Operation Sheets or Task Sheets at the end of each
section to test your own progress.
When you feel confident that you have had sufficient skill, ask your Trainer to
evaluate you. The results of your assessment will be recorded in your Progress
Chart and Accomplishment Chart.
You need to complete this module before you perform the module on Setting Up
Computer Networks.
COMPUTER SYSTEMS SERVICING NCII
List of Competencies
1
Install and configure Installing and
computer systems configuring
computer systems
2
Set-up Computer Setting Up computer
Networks systems and
networks
3
Set-up Computer Servers Setting – up computer
Servers
4
Maintain and Repair Maintaining and
Computer Systems and repairing
Networks computer system and
networks
Computer
Systems
MODULE CONTENT
Contents:
1. Types/Parts of computers
a. Description and purpose of hardware
i. Input devices
ii. Processing devices
iii. Output devices
4. System Unit
a. Parts of Motherboard
b. RAM
c. Power Supply Unit
Conditions:
The students/trainees must be provided with the following:
Tools and test instruments
o Screwdriver set
o Philips and flat
o T-series
o Hex
o Headlamp
o Anti-static wrist strap
o Long nose pliers
o Multi-tester (VOM)
o Table mat
Desktop PC parts and peripherals
o Processor, mother board and memory card
o Video card
o Network interface card
o Hard disk and optical drive
o PC enclosure with switching power supply
o Keyboard, mouse and speaker
o Monitor
o Test speaker (internal)
o Table mat
Access to power source (220VAC)
Assessment Method:
Written exam
Practical exam/demonstration
Observation in workplace
Oral Questioning
Information Sheet 1.1
Computer Basics
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know what a
Computer is and identify the key parts of a Personal Computer.
What is a Computer?
A computer is an electronic device that manipulates information, or "data."
the computer sees data as one's and zero's but he knows how to combined
them into more complex things such as a photograph, a movie, a website, a
game and much more.
Hardware is any physical part of the computer which include all the internal
components and also the external part like the monitor and the keyboard.
Software is any set of instructions that tells the hardware what to do such
as a web browser, media player or word processor.
Types of Computers
Supercomputer
The most powerful computers in terms of performance and data
processing are the Supercomputers. These are specialized and task specific
computers used by large organizations. The supercomputers are very expensive
and very large in size. It can be accommodated in large air-conditioned rooms;
some super computers can span an entire building.
Mainframe computer
Although Mainframes are not as powerful as supercomputers, but certainly
they are quite expensive nonetheless, and many large firms & government
organizations uses Mainframes to run their business operations. Banks
educational institutions & insurance companies use mainframe computers to
store data about their customers, students & insurance policy holders.
Minicomputer
Minicomputers are used by small businesses & firms. Minicomputers are
also called as “Mid range Computers”. These are small machines and can be
accommodated on a disk with not as processing and data storage capabilities as
super-computers & Mainframes.
Microcomputer
Desktop computers, laptops, personal digital assistant (PDA), tablets &
smartphones are all types of microcomputers. The micro-computers are widely
used & the fastest growing computers. These computers are the cheapest among
the other three types of computers.
The PC System
As a Technician, you should know and be able to identify the components
found in a typical personal computer system. The PC is modular by design. It is
called a system because it includes all the components required to make a
functional computer.
Types/Parts of Computer
Desktop computer
Desktop computers come in a variety of styles ranging from large vertical tower
cases to small form factor models that can be tucked
behind an LCD monitor. In this sense, the term 'desktop' refers
specifically to a horizontally-oriented case, usually intended to have
the display screen placed on top to save space on the desk top. Most
modern desktop computers have separate screens and keyboards.
Laptop
A laptop computer or simply “laptop”, also called a notebook
computer or sometimes a notebook, is a small personal computer
designed for portability.
Keyboard – The most familiar computer input device, the keyboard is used to
introduce characters and commands into the system.
A central processing unit (CPU), also referred to as a central processor unit,
is the hardware within a computer that carries out the instructions of a computer
program by performing the basic arithmetical, logical, and input/output operations
of the system.
Mouse – An input device used with graphical user interfaces (GUI) to point to,
select, or activate images on the video monitor. By moving the mouse along a
surface, the user can cause a cursor on the display to move in a corresponding
manner.
Video display or Monitor – A Visual output device that displays characters and
graphics on screen.
Speakers – Audio output devices used to deliver voice, music and coded
messages.
A power supply unit (PSU) converts mains AC to low-voltage
regulated DC power for the internal components of a computer.
Modern personal computers universally use a switched-mode power
supply. Some power supplies have a manual selector for input
voltage, while others automatically adapt to the supply voltage.
Information Sheet 1.2
Occupational Health and Safety
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify and
apply
OHS policies and procedures in Computer Systems Servicing.
A. Workplace
1. Contingency measures during workplace accidents, fire and other
emergencies are recognized.
2. Hazard/risks in the workplace and their corresponding indicators are
identified to minimize or eliminate risk to co-workers, workplace and
environment.
3. Clean the area before and after using it to maintain sanitation and prevent
accidents.
B. Computer systems
1. Always power off and unplug the computer before working on it. When
making circuit changes switch off and unplug the power cord from the
equipment then discharge the capacitors.
2. Replace only fuses with those proper rating (usually on AVRs).
3. Handle all sensitive components in non-conducting metallic edge.
4. Check all signal pins and alignment to avoid incorrect connection.
5. Be careful with the sharp edges inside the computer case.
6. Do not use excessive force when installing computer components to prevent
damage.
7. Do not clean your system with wet clothes or any liquid detergents.
8. Use brush, compressed air or blower in cleaning the computer system.
C. Technician
1. Personal protective equipment is correctly used in accordance with
organization OHS procedures and practices.
2. Always discharge yourself before touching any part of the computer.
3. Use anti-static devices and rubber footwear to disperse static electricity.
4. Do not eat, drink or smoke when working on your computer.
5. do not wear loose clothing
Information Sheet 1.3
Used of Hand Tools
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify Use of
hand tools and proper use.
A tool is a handheld device that aids in accomplishing a task. Tools range
from a traditional metal cutting part of a machine to an element of a
computer program that activates and controls a particular function.
Hardware Tools
To complete hardware repairs, it is important to have a toolkit that should contain
all of the necessary tools. As you gain experience, you will learn which tools to
have available for different types of jobs. Hardware tools are grouped into these
four categories:
Electro-Static Discharge (ESD) tools
Hand tools
Cleaning tools
Diagnostic tools
Anti-static mat - used to stand on or place hardware on to prevent static
electricity from building up.
Hand Tools
A hand tool is a device for performing work on a material or a physical
system using only hands. The hand tools can be manually used employing
force, or electrically powered, using electrical current.
Examples of Hand Tools
Flat head screwdriver - used to loosen or tighten slotted screws.
Hex driver – sometimes called a nut driver, is used to tighten nuts in the
same way that a screwdriver tightens screws.
Part retriever - used to retrieve parts from location those are too small for
your hand to fit.
Compressed air - used to blow away dust and debris from different
computer parts without touching the components.
Cable ties - used to bundle cables neatly inside and outside of a computer.
Parts organizer - used to hold screw, jumpers, fasteners and other small
parts and prevents them from getting mixed together.
Diagnostic Tools
Computers are easier to use and more dependable with each new
generation of hardware and operating system update, but that doesn't mean
they're problem-free.
Multi meter - used to test the integrity of circuits and the quality of electricity
in computer components.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify
Motherboard Parts and Functions.
1. Back Panel Connectors & Connectors and ports for connecting the
Ports computer to
external devices such as display ports, audio
ports, USB ports, Ethernet ports, PS/2 ports
etc. See image below for
a close-up view.
2. PCI Slots PCI: Peripheral Component Interconnect
Slot for older expansion cards such as sound
cards, network cards, connector cards. See
image below for close-up view.
Have been largely replaced by PCI-Express x1
slots (see motherboard parts #3 below)
3. PCI Express x1 Slots Slot for modern expansion cards such as
sound cards,network cards (Wi-Fi, Ethernet,
Bluetooth), connector cards (USB, FireWire,
eSATA) and certain low-end graphics
cards. See image below for a close-up view.
4. PCI Express x16 Slot Slot for discrete graphic cards and high
bandwidth devices
such as top-end solid state drives. See image
below for a close-up view.
5. Northbridge Also known as Memory Controller Hub (MCH).
Chipset that allows the CPU to communicate
with the RAM and graphics card.
Beginning from the Sandy Bridge generation of
Intel CPUs, motherboards no longer have this
component as it has
been integrated within the CPU itself.
6. CPU Socket A CPU socket or CPU slot is a mechanical
component(s) that provides mechanical and
electrical connections
between a microprocessor and a printed circuit
board(PCB). This allows the CPU to be
replaced without soldering.
7. ATX 12V Power Connector Connects to the 4-pin power cable of a power
supply unit which supplies power to the CPU.
8. Front Panel USB 2.0 Connects to USB 2.0 ports at the front or top of a
Connectors computer case. See image above for a close-up
view.
9. Front Panel Connectors Connects to the power switch, reset switch, power
LED, hard drive LED and front audio ports of a
computer case.
See image above for a close-up view.
10. IDE Connector Connects to older hard drive disks and optical
drives for data transfer. See image above for a
close-up view.
Have been replaced over by SATA connectors
(see
motherboard components #13 below).
11. CMOS Battery Supplies power to store BIOS settings and keep
the real-time clock running. See image above for a
close-up view.
The CMOS battery found on most motherboards is
the CR2032 lithium coin cell.
12. Southbridge Also known as the Input/output Controller Hub
(ICH).
Chipset that allows the CPU to communicate with
PCI slots, PCI-Express x 1 slots (expansion
cards), SATA connectors (hard drives, optical
drives), USB ports (USB devices), Ethernet ports
and on-board audio.
13. SATA Connectors Connects to modern hard disk drives, solid state
drives and optical drives for data transfer. See
image above for a
close-up view.
14. Fan Headers Supplies power to the CPU heat sink fan and
computer case fans. See image above for a close-
up view.
15. RAM Slots Insert RAM here. To learn how to install RAM, click
here for our guide to installing RAM.
16. ATX Power Connector Connects to the 24-pin ATX power cable of a
power supply unit which supplies power to the
motherboard.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to Identify
Motherboard Panel Connectors
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify RAM’s.
There are many different types of RAM which have appeared over the years and
it is often difficult knowing the difference between them both performance wise
and visually identifying them. This article tells a little about each RAM type, what
it looks like and how it performs.
FPM RAM
FPM RAM, which stands for “Fast Page Mode” RAM is a type of Dynamic RAM
(DRAM). The term "Fast Page Mode" comes from the capability of memory being
able to access data that is on the same page and can be done with less latency.
Most 486 and Pentium based systems from 1995 and earlier use FPM Memory.
EDO RAM
EDO RAM, which stands for "Extended Data Out RAM" came out in 1995 as a
new type of memory available for Pentium based systems. EDO is a modified
form of FPM RAM which is commonly referred to as "Hyper Page Mode".
Extended Data Out refers to fact that the data output drivers on the memory
module are not switched off when the memory controller removes the column
address to begin the next cycle, unlike FPM RAM. Most early Pentium based
systems use EDO.
SDRAM
SDRAM , which is short for Synchronous DRAM is a type of DRAM that runs in
synchronization with the memory bus. Beginning in 1996 most Intel based
chipsets began to support SDRAM which made it a popular choice for new
systems in 2001.
SDRAM is capable of running at 133MHz which is about three times faster than
FPM RAM and twice as fast as EDO RAM. Most Pentium or Celeron systems
purchased in 1999 have SDRAM.
DDR RAM
DDR RAM, which stands for "Double Data Rate" which is a type of SDRAM and
appeared first on the market around 2001 but didn’t catch on until about 2001
when the mainstream motherboards started supporting it. The difference between
SDRAM and DDR RAM is that instead of doubling the clock rate it transfers data
twice per clock cycle which effectively doubles the data rate. DDRRAM has
become mainstream in the graphics card market and has become the memory
standard.
DDR2 RAM
DDR2 RAM, which stands for "Double Data Rate 2" is a newer version of DDR
which is twice as fast as the original DDR RAM. DDR2RAM came out in mid
2003 and the first chipsets that supported DDR2 came out in mid 2004. DDR2
still is double data rate just like the original DDR however DDR2-RAM has
modified signaling which enables higher speeds to be achieved with more
immunity to signal noise and cross-talk between signals.
RAMBUS (RIMM) RAM
RAMBUS RDRAM is a type of ram of its own, it came out in 1999 and was
developed from traditional DRAM but its architecture is totally new. The RAMBUS
design gives smarter access to the ram meaning that units can prefetch data and
free some CPU work. The idea behind RAMBUS RAM is to get small packets of
data from the RAM, but at very high clock speeds. For example, SD RAM can get
64bit of information at 100MHz where RAMBUS RAM would get 16bits of data at
800MHz. RIMM ram was generally unsuccessful as Intel had a lot of problems
with the RAM timing or signal noise. RD RAM did make an appearance in the
Sony Playstation 2 and the Nintendo 64 game consoles.
DDR3 RAM
DDR3 was the next generation memory introduced in the summer of 2007 as the
natural successor to DDR2. DDR3 increased the pre-fetch buffer size to 8-bits an
increased the operating frequency once again resulting in high data transfer rates
than its predecessor DDR2. In addition, to the increased data transfer rate
memory chip voltage level was lowered to 1.5 V to counter the heating effects of
the high frequency. By now you can see the trend of memory to increase pre-
fetch buffer size and chip operating frequency, and lowering the operational
voltage level to counter heat.
Information Sheet 1.7
Power Supply Unit
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know and
identify Power Supply Unit and its functions.
It allows you turn on the motherboard: early models had a 20-pin configuration,
whilst the current standard is now 24. Note that it still comes as a block of 20
pins,
to which you can add a block of 4 pins. This is to ensure compatibility with older
motherboards and their 20-pin connectors.
The MOLEX
The most classic. Still very present in every PC, it is sometimes used directly on
the motherboard (MSI) and is used to connect the hard disk and other drives.
Some graphics cards may require this connector too. Note that Molex/Sata
connectors are easily available nowadays.
The SATA connector Modern power supply must have at least 4 of these, to
power up drives at the SATA standard.
The "PCI Express" Modern graphics cards need more power. They need to
power themselves directly from the power block. This is the role of this connector.
Originally a 6-pin configuration and now available in 8-pin.
The SATA connector
Modern power supply must have at least 4 of these, to power up drives at the
SATA standard.
If your power supply doesn't have an 8-pin connector, there are 6 to 8 adapters:
Notes:
The use of these adapters is not recommended and requires the power supply to
be of good quality and powerful enough to feed the latest graphics card.
The pins
As you can see, all these connectors are fitted with pins. Never force! Take your
time, look at the connector and ask yourself two questions: is this correct? is it in
the right direction?
Information Sheet 1.8
Steps to a Safe and Successful Disassembly and Assembly
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to successfully
disassemble/assemble and apply OHS policies and procedures.
To Disassemble:
1. Prepare all your tools.
a. Long Philip Screw Driver
b. Anti-static strap
2. Before opening the system case, be sure to turn off the system unit. Turn off
and unplug the AVR from the wall socket as well. After that, unplug all the cables
connecting to the back of the system unit. After clearing all the connected cables,
put the system unit on an empty working table.
3. Touch the unpainted part of your system unit with your bare hands to remove
the ESD of your body. Wear anti-static strap. This is an important part before
opening your system case. You might destroy your RAM, Chip sets and other
components of your motherboard.
4. Remove the screws of the side cover opposite to the side where the ports are.
By most system cases, if you are facing the back of the system unit the right side
cover is to be removed. Return the screws back to the screw holes to avoid
losing them.
5. Once the side cover is removed, turn your system side down where the
opened side of the system unit should be facing upward where you can
comfortably look down on the inside of your system case.
6.
6. We are now ready to remove the components inside of the computer. The first
thing we need to do is remove the power supply. To be able to remove the power
supply, remove first the molex connectors or the motherboard power connector,
drive power connectors, the floppy drive power connector, the sata power
connectors and the four pin 12-volt motherboard connector. With all power
connectors are removed from the motherboard and drives, the power supply is
now ok to be removed as well
9. Remove all drives. This will include your hard drive,cd/dvd drives, and the
floppy drive.
10. Since all peripherals where removed, the next thing to do is to remove the
front panel connectors. This will include the USB, Front Panel (FP) and Audio
header. If you are not sure of which connector is being match to, write down or
document the connections and orientation of the connectors before removing
them from the headers. Remember that not all motherboards have the same
header configuration so be careful and watchful while documenting.
11. After removing the header connectors, we are now ready to remove the
motherboard. To remove the motherboard, locate first all the screws and lightly
unscrew all screws alternately. With this technique, we are reducing the risk of
warping or bending our motherboard. It may not have a large impact on the
bending of the motherboard but still it does have even a little. Upon lightly
loosening all screws, remove all screws then. Remove the motherboard by
carefully and lightly pulling it away from the I/O shield.
Why? because we need to free the ports that are fitted from the holes in the I/O
shield. After freeing the motherboard ports from the I/O shield holes, lift up the
motherboard and put it on the safe place.
To Assemble:
1. Provided that all peripherals are clean and ready. We are now going to
assemble your computer. In assembling back your computer, what we have done
during disassembling is just doing the reverse order to assemble it. Since the
motherboard was last to be removed, it should then be the first to put back.
Remove the retaining screws from the standoff screws of the motherboard and let
the motherboard seat on it with the ports facing out towards the I/O shield. Lightly
push the motherboard to set its ports to the holes of the I/O shield. Put the
retaining screws on the motherboard screw holes but do not tighten it yet. Now
be careful in doing this one and if this is your first time doing it, it is best if you
lend a hand for assistance. Lightly push the motherboard towards to I/O shield
and lightly tighten the motherboard retaining screws alternately until all screws
are tight enough but not too tight. This is to ensure that your ports are protruding
correctly out of the I/O shield.
2. Once the motherboard is secured, put back the FP, Audio, and USB header
connectors as you will be using your documentation for reference.
4. Connect back the RAM, Video Card and other card peripherals to its proper
slot inserting it properly and some cards will require screws to be secured.
5. The data cables (IDE, SATA, floppy cable) should be connected to its proper
headers and drives. Remember the proper configuration of the placement of the
cables specially if you are dealing with the IDE cables.
6. After the data cables are properly connected, put back the power supply and
secure it with the screws you removed earlier. After securing the PSU to the
chassis, connect the power connectors to the drives and the motherboard.
7. Once all peripherals are connected properly, have a final inspection by visually
checking for loose connection or improper connection. Once the system unit
connections are thoroughly checked and verified, connect the keyboard; the
monitor, and the power connector then power up the computer. This initial
powering up of the computer while the side cover is open ensures us that
everything is ok before putting back the side cover. In case something goes
wrong, we can accessibly correct the problem right away. If everything is fine
shutdown the computer, unplugged the AVR and remove the cables
connected to the back of your computer. Put the side cover back.
8. Put the assembled computer back to its place and connect the rest of the
cables and connectors. Power it up and see if there are unusual effects of your
disassembling/assembling procedure done earlier.
Learning Outcome 2
Install operating system and drivers for peripherals or devices
Contents:
1. Windows Server 2008 R2
a. System Requirements
b. Materials/application needed
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
system requirements for windows Server 2008 R2
System Requirements
Before installing Windows Server 2008 R2, the computer must meet the following
minimum system requirements
1.4 GHz x86/x64 or Itanium 2 processor
512 MB RAM (2 GB recommended)
Super VGA or higher display
32 GB disk space (10 GB for Foundation Edition)
DVD drive
Keyboard and pointing device
Materials/Application Needed:
Windows Server 2008 R2 Standard x64 bit CD
Power Iso
Rufus
4 Gb or higher USB flash drive
Information Sheet 2.2
Making ISO Image Using Power ISO
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to how to create
ISO image using PowerISO
PowerISO can make an ISO file from a CD, DVD, or Blu-ray disc. PowerISO do a
sector-by-sector copying. All information in the disc, including the boot
information, will be copied. You can launch the iso maker using the main program
or the shell context menu.
Learning Objective:
Once you have the required items, you can start by opening up Rufus. Don’t
worry about any of the settings here as Rufus will automatically do this for you
depending on the type of ISO you are using.
By default, it will appear to have many of the options blank until you connect your
USB. Once you connect the USB, these fields will be automatically filled for you.
Next, connect your USB to your computer.
Now we need to select our ISO. (Windows server 2008 r2 ISO) Select the icon
highlighted as shown below, which will let you browse for the required ISO file.
Select the file by left clicking on it once and then clicking on Open.
Rufus will now have filled out the fields for you. All you have to do now is hiStart.
Note, if you are using a USB stick that is too small, like using a 2GB USB for an
ISO that is larger than 2GB you will get the following error:
If your USB is the correct size then you will get a standard warning telling you
that any data/partitions that was on the USB before starting the process will be
permanently deleted
How long the process will take to complete will depend on the specs of your
computer, the USB (read/write speeds) and the size of the ISO you are using
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to install and
configure Windows server 2008 R2.
To boot from a CD, DVD or USB device, make sure that the device has boot
sequence priority over the hard drive.
BIOS Boot
BIOS (Basic Input Output Subsystem) is a programmable chip that controls how
information is passed to various devices in the computer system. A typical
method to access the BIOS settings screen is to press ESC, F1, F2, F8 or F10
during the boot sequence.
BIOS settings allow you to run a boot sequence from a floppy drive, a hard drive,
a CD-ROM drive or an external device. You may configure the order that your
computer searches these physical devices for the boot sequence.
The first device in the order list has the first boot priority. For example, to boot
from a CD-ROM drive instead of a hard drive, place the CD-ROM drive ahead of
the hard drive in priority.
Before you set boot priority for a USB device, plug the device into a USB port.
To specify the boot sequence:
1. Start the computer and press ESC, F1, F2, F8 or F10 during the initial
startup screen. Depending on the BIOS manufacturer, a menu may appear.
2. Choose to enter BIOS setup. The BIOS setup utility page appears.
3. Use the arrow keys to select the BOOT tab. System devices appear in order
of priority.
4. To give a CD or DVD drive boot sequence priority over the hard drive, move it
to the first position in the list.
5. To give a USB device boot sequence priority over the hard drive, do the
following:
Move the hard drive device to the top of the boot sequence list.
Expand the hard drive device to display all hard drives.
Move the USB device to the top of the list of hard drives.
Some computer manufacturers allow you to select the device that contains the
boot sequence from a special device selection menu. The example below uses a
Dell system board.
2. When prompted for an installation language and other regional options make
your selection and press next.
4. Next, press Install Now to begin the installation process.
5.
4. On Select the Operating System you want to install page, from the
displayed
Windows Server 2008 R2 editions (choose: Standard full Installation), edition
5. Read and accept the license terms by clicking to select the checkbox and
pressing Next.
6. In the “Which type of installation do you want?” window, click the only
available option – Custom (Advanced).
7. On Where do you want to install Windows page, ensure that the hard disk
drive on which Windows Server 2008 R2 is to be installed is selected. Once
selected, click Drive options (advanced).
8. From the enabled options, click New to create a new disk drive partition. On
the Size field, specify the size of the new volume in MB.
9. On the displayed Install Windows message box, click OK. Back on the same
page, click to select the hard disk drive partition (E. g. Disk 0 Partition
2, in this demonstration) where Windows Server 2008 R2 is to be installed
and click Next.
10. On the Installing Windows page, wait till the Windows Server 2008 R2
installed and the computer get restarted.
Computer
Note: Do not press any key if the screen displays the message, ‘Press any key
to boot from CD or DVD’ while computer restarts for the first time, to resume the
installation process.
11. After second restart, on the displayed screen, click OK to change the user
password before logging on for the first time. On the available fields, type and
retype the new password and press Enter.
12. On the next confirmation screen, click OK to log on to the Windows Server
2008 R2 computer.
Install application software
Learning Outcome 3
Contents:
1. Application Software
2. WinRAR
Application software
Learning Objective:
3. Click YES
4. Click Install
1. Compresing 3 pdf files and creating RAR archieve. Usually people use
it for the larger files. WinRAR reduces the size of a file into RAR and
ZIP file format.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to install network
device driver.
Step 1
Select the Start button, type Device Manager, and select it from the list of results
Step 2
Right-click on your Ethernet card and click "Update Driver Software…"
Step 3
Select the option to search automatically for updated driver software. This option
will search the Internet for any new drivers available for your Ethernet card. If you
presently have the latest drivers then you will be prompted that the latest drivers
are already installed on your system and the window will close. If new drivers are
available they will be automatically installed.
Step 4
Or choose “browse my computer for driver software” if you have a driver file in
your computer.
Step 5
Then browse the driver in your file then click next
If successfully installed you will see the driver that currently installed in the
network adapters
Information Sheet 3.4
Installing Kingsoft office
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to install Kingsoft
office.
Step 1: To install Kingsoft Office to your PC, first download the office to your
computer .Then click Save button in the following picture:
Step 2: It will be automatically saved in your system files unless you choose to
save it in specific file. Then just wait for it to finish the downloading as the
following picture:
Step 4: Then for further access, input serial number which you will obtain once
purchasing the product. Or You may have access the product for free within 30
days.
Several components will be available that you will feel free to choose:
Step 5:
Then you can browse The King soft Office in the file you prefer, or leave it to be
automatically stored.
Please notice that the options above aren't compulsory. If you tick the them, the
system will automatically open and save all the office files via King soft Office. In
case you've got used to MS office, you may choose not to tick them and only
open or save the office files via King soft Office when you're in need.
Then click the Install and wait for it to complete the setup
.
Then feel free to choose your favorite interface style and the installation is thus
completed
Till now we've accomplished the Kingsoft Office Installation. You can close it.
How to Remove Kingsoft Office from your Computer?
It convenient to remove Kingsoft Office from your computer. Below is the simple
illustration:
Find the Uninstall button from Start menu > Kingsoft Office > Kingsoft Office
Tools > Uninstall.
Click Unistall and the removal of the Kingsoft Office will be accomplish.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know how use
the Windows firewall
5. Check the boxes that you want to configure in your computer. Then
click ok.
Settings Value
*A session limit of zero (0) causes rekeys to be determined only by the Key
lifetime (minutes) setting.
Data integrity
Settings Value
Protocol ESP (primary)/AH (secondary)
Protocol ESP
Authentication method
Computer Kerberos version 5 authentication is the default authentication method.
Policies created using the Windows Firewall with Advanced Security snap-in and
distributed with Group Policy are applied in this order
Learning Outcome 4
Contents:
1. Techniques and strategies to solve common computer hardware problems.
a. Trial and Error
b. It’s the Cable
c. Don’t be frustrated
d. Take notes
e. Take a Look
7. Tech Acronyms
8. Computer Virus
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the PC’s
common troubleshooting techniques & Strategies.
Here are five common-sense techniques and strategies to solve common
computer hardware problems.
(1) Trial-and-error
Personal computers are highly modular by design. The most powerful
troubleshooting technique is to isolate the problem to a specific component by
trial-and error. Swap compatible components and see if the system still works.
Try different peripherals on different machines and see if the same problem
occurs. Make one change at a time.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for new monitors.
Here are some basic troubles shooting tips for new monitors:
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for a motherboard
More than 70% of all computer problems are related to cabling and connections.
Ensure all cables are connected and connected firmly. IDE and floppy ribbon
cables and power cables can often go loose. Ensure microprocessor, memory
modules, and adapters such as video card are inserted correctly and didn't
"popup" due to vibration.
System has no power at all. Power light does not illuminate, fan of power
supply does not turn on, and indicator light on keyboard does not turn on.
System inoperative. Keyboard lights are on, power indicator lights are lit,
and hard drive is spinning.
PROBABLE CAUSE DIAGNOSIS SOLUTION
System does not boot from hard disk drive, can be booted from floppy disk
Drive
System only boots from Floppy Disk. Hard Disk can be read and
applications can be used, but booting from Hard Disk is impossible
Disk formatted on IBM PS/2 will not operate with this system.
No power to monitor. IBM PS/2 disk format will Format disk in the AT
not work in an AT type type computer insert
computer disk into the IBM PS/2
and copy the files you
wish.
Screen is blank.
Problem
No color on screen.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting tips after installing a new hard drive.
After you install your new drive, your computer will not boot, and no error
message appears on the screen.
The screen remains blank when you power up the system.
The system does not recognize the drive.
The dealer partitioned and formatted the drive for you in the store, but the
drive does not respond when you install it.
The system hangs in FDISK or fails to create or save the partition record
The system error message, "Drive not Ready," appears.
The FDISK error message, "No Fixed Disk Present," appears.
The drive does not format to full capacity.
The DOS message "Disk Boot Failure," "Non-System Disk" or "No ROM
Basic -SYSTEM HALTED" appears.
The system error message, "HDD controller failure" appears.
2. After you install your new drive, your computer will not boot, and no
error message appears on the screen.
Turn off your computer, open the case, and remove your new
drive.CAUTION: To avoid electrostatic discharge damage to your computer
or hard drive, make sure you are well grounded before touching the drive,
cable, connector or jumpers.
Move the jumper on the alternate-capacity jumper, as shown in Figure 6. This
causes the drive to appear to your BIOS as having a 2.1-Gbyte capacity
(4,092 cylinders, 16 heads, 63 sectors per track). You may need third-party
partitioning software, such as Disk Manager, to achieve full capacity of the
drive.
Remount your drive in the computer and replace the computer cover.
Insert a bootable system diskette into drive A and turn on the computer. It
should boot from drive A and automatically detect the new drive as a 2.1-
Gbyte drive.
Insert your DiscWizard diskette into drive A and type A:XDM. Then press
ENTER. This runs the Disk Manager program.
Follow the Disk Manager instructions to install the dynamic drive overlay and
to partition and format your new drive to its full capacity.
After Disk Manager is done, reboot your system. You should see the Disk
Manager banner and be able to access the full capacity of your new drive.
If the steps listed above do not remedy this problem, try the following:
Make sure the monitor is plugged in and turned on.
Check all cards.
Make sure the video card is seated in its slot and secured with mounting
screws.
Turn off the computer and remove the drive host adapter. If the screen turns
on after you reboot, the host adapter may be incompatible or defective. If so,
see your dealer.
The system does not recognize the drive.
The dealer partitioned and formatted the drive for you in the store, but the
drive does not respond when you install it.
Reboot the computer and make sure the drive spins up.
Check all cables.
Make sure the power supply is adequate for system needs.
Make sure the DOS or Windows version the dealer used to partition and
format the drive is the same version you have installed in your computer. If it
isn't, see your dealer.
Verify the drive-type values in the system setup program. You must install the
drive using the same drive-type values your dealer used to partition the drive.
Check for 1/0 address conflicts between peripheral cards.
Check for viruses.
The system hangs in FDISK or fails to create or save the partition record.
Check all cables.
Your setup system diskette may be corrupted. Try using a backup diskette.
Make the partitions smaller.
Change the interrupt jumper setting on the host adapter.
Some BIOS have a Track 0 protection feature that protects Track 0 from
viruses. This may cause FDISK to hang the system. You must disable this
feature in the system setup program before you can use FDISK. See your
computer reference guide for assistance. Be sure to re-enable this important
feature when FDISK is done.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting for Network Card.
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to know the
troubleshooting tips for soundcard.
1. Right-click the My Computer icon on your desktop, and select Properties. The
System Properties dialog appears.
2. Click the Device Manager tab. In the Device Manager, a plus sign(+)
represents an expandable list of items. A minus sign (-) represents an
expanded list. A circled exclamation mark denotes a conflict.
3. Double-click Sound, video, game controllers. A list of multimedia devices
appears.
4. Select your audio card.
5. Choose the Properties button.
6. Click the Resources tab.
7. Uncheck the Use automatic settings option.
8. Change "Settings based on:" if alternate settings are available.
9. Determine the conflict by reviewing the "Conflicting device list".
10.Select the conflicting item in the "Resource Settings" list.
11.Click the Change Settings button.
12.Use the mouse to select a new setting.
13.Select OK to close each of the properties windows, and restart your
computer.
Learning Objectives:
After Reading this information sheet you will be able to know the different
Computer and Internet acronyms.
Computer and Internet acronyms
Acronyms Meanings
ACL Access Control List
ADC Analog-to-Digital Converter
ADF Automatic Document Feeder
ADSL Asymmetric Digital Subscriber Line
AGP Accelerated Graphics Port
AIFF Audio Interchange File Format
AIX Advanced Interactive Executive
ALU Arithmetic Logic Unit
ANSI American National Standards Institute
API Application Program Interface
ARP Address Resolution Protocol
ASCII American Standard Code for Information Interchange
ASP Active Server Page or Application Service Provider
ATA Advanced Technology Attachment
ATM Asynchronous Transfer Mode
BASIC Beginner's All-purpose Symbolic Instruction Code
Bcc Blind Carbon Copy
BIOS Basic Input/Output System
Blob Binary Large Object
BMP Bitmap
BSOD Blue Screen of Death
CAD Computer-Aided Design
Cc Carbon Copy
CCD Charged Coupled Device
CD Compact Disc
CD-R Compact Disc Recordable
CD-ROM Compact Disc Read-Only Memory
CD-RW Compact Disc Re-Writable
CDFS Compact Disc File System
CDMA Code Division Multiple Access
CGI Common Gateway Interface
CISC Complex Instruction Set Computing
CLOB Character Large Object
CMOS Complementary Metal Oxide Semiconductor
CMS Content Management System
CMYK Cyan Magenta Yellow Black
CPA Cost Per Action
CPC Cost Per Click
CPL Cost Per Lead
CPM Cost Per 1,000 Impressions
CPS Classroom Performance System
CPU Central Processing Unit
CRM Customer Relationship Management
CRT Cathode Ray Tube
CSS Cascading Style Sheet
CTP Composite Theoretical Performance
CTR Click-Through Rate
DAC Digital-to-Analog Converter
DAW Digital Audio Workstation
DBMS Database Management System
DCIM Digital Camera IMages
DDL Data Definition Language
DDR Double Data Rate
DDR2 Double Data Rate 2
DDR3 Double Data Rate Type 3
DFS Distributed File System
DHCP Dynamic Host Configuration Protocol
DIMM Dual In-Line Memory Module
DLC Downloadable Content
DLL Dynamic Link Library
DMA Direct Memory Access
DNS Domain Name System
DOS Disk Operating System
DPI Dots Per Inch
DRAM Dynamic Random Access Memory
DRM Digital Rights Management
DSL Digital Subscriber Line
DSLAM Digital Subscriber Line Access Multiplexer
DTD Document Type Definition
DV Digital Video
DVD Digital Versatile Disc
DVD+R Digital Versatile Disc Recordable
DVD+RW Digital Versatile Disk Rewritable
DVD-R Digital Versatile Disc Recordable
DVD-RAM Digital Versatile Disc Random Access Memory
DVD-RW Digital Versatile Disk Rewritable
DVI Digital Video Interface
DVR Digital Video Recorder
ECC Error Correction Code
EDI Electronic Data Interchange
EIDE Enhanced Integrated Drive Electronics
EPS Encapsulated PostScript
EUP Enterprise Unified Process
EXIF Exchangeable Image File Format
FAQ Frequently Asked Questions
FDDI Fiber Distributed Data Interface
FIFO First In, First Out
FiOS Fiber Optic Service
FLOPS Floating Point Operations Per Second
FPU Floating Point Unit
FSB Frontside Bus
FTP File Transfer Protocol
Gbps Gigabits Per Second
GIF Graphics Interchange Format
GIGO Garbage In, Garbage Out
GIS Geographic Information Systems
GPS Global Positioning System
GPU Graphics Processing Unit
GUI Graphical User Interface
GUID Globally Unique Identifier
HDD Hard Disk Drive
HDMI High-Definition Multimedia Interface
HDTV High Definition Televsion
HDV High-Definition Video
HFS Hierarchical File System
HSF Heat Sink and Fan
HTML Hyper-Text Markup Language
HTTP HyperText Transfer Protocol
HTTPS HyperText Transport Protocol Secure
I/O Input/Output
ICANN Internet Corporation For Assigned Names and Numbers
ICF Internet Connection Firewall
ICMP Internet Control Message Protocol
ICS Internet Connection Sharing
ICT Information and Communication Technologies
IDE Integrated Device Electronics or Integrated Development Environment
IEEE Institute of Electrical and Electronics Engineers
IGP Integrated Graphics Processor
IM Instant Message
IMAP Internet Message Access Protocol
InterNIC Internet Network Information Center
IP Internet Protocol
IPX Internetwork Packet Exchange
IRC Internet Relay Chat
IRQ Interrupt Request
ISA Industry Standard Architecture
iSCSI Internet Small Computer Systems Interface
ISDN Integrated Services Digital Network
ISO International Organization for Standardization
ISP Internet Service Provider
IT Information Technology
IVR Interactive Voice Response
JFS Journaled File System
JPEG Joint Photographic Experts Group
JRE Java Runtime Environment
JSF JavaServer Faces
JSON JavaScript Object Notation
JSP Java Server Page
Kbps Kilobits Per Second
KDE K Desktop Environment
KVM Switch Keyboard, Video, and Mouse Switch
LAMP Linux, Apache, MySQL, and PHP
LAN Local Area Network
LCD Liquid Crystal Display
LDAP Lightweight Directory Access Protocol
LED Light-Emitting Diode
LIFO Last In, First Out
LPI Lines Per Inch
LTE Long Term Evolution
LUN Logical Unit Number
MAC Address Media Access Control Address
MAMP Mac OS X, Apache, MySQL, and PHP
MANET Mobile Ad Hoc Network
Mbps Megabits Per Second
MBR Master Boot Record
MCA Micro Channel Architecture
MIDI Musical Instrument Digital Interface
MIPS Million Instructions Per Second
MMS Multimedia Messaging Service
MP3 MPEG-1 Audio Layer-3
MPEG Moving Picture Experts Group
MTU Maximum Transmission Unit
NAT Network Address Translation
NetBIOS Network Basic Input/Output System
NIC Network Interface Card
NNTP Network News Transfer Protocol
NOC Network Operations Center
NTFS New Technology File System
NUI Natural User Interface
NVRAM Non-Volatile Random Access Memory
OASIS Organization for the Advancement of Structured Information
Standards
OCR Optical Character Recognition
ODBC Open Database Connectivity
OEM Original Equipment Manufacturer
OLAP Online Analytical Processing
OLE Object Linking and Embedding
OOP Object-Oriented Programming
OSD On Screen Display
OSPF Open Shortest Path First
P2P Peer To Peer
PC Personal Computer
PCB Printed Circuit Board
PCI Peripheral Component Interconnect
PCI-X Peripheral Component Interconnect Extended
PCMCIA Personal Computer Memory Card International Association
PDA Personal Digital Assistant
PDF Portable Document Format
PHP Hypertext Preprocessor
PIM Personal Information Manager
PMU Power Management Unit
PNG Portable Network Graphic
POP3 Post Office Protocol
POST Power On Self Test
PPC Pay Per Click
PPGA Plastic Pin Grid Array
PPI Pixels Per Inch
PPL Pay Per Lead
PPM Pages Per Minute
PPP Point to Point Protocol
PPPoE Point-to-Point Protocol over Ethernet
PPTP Point-to-Point Tunneling Protocol
PRAM Parameter Random Access Memory
PROM Programmable Read-Only Memory
PS/2 Personal System/2
PUM Potentially Unwanted Modification
PUP Potentially Unwanted Program
QBE Query By Example
RAID Redundant Array of Independent Disks
RAM Random Access Memory
RDF Resource Description Framework
RDRAM Rambus Dynamic Random Access Memory
RFID Radio-Frequency Identification
RGB Red Green Blue
RISC Reduced Instruction Set Computing
ROM Read-Only Memory
RPC Remote Procedure Call
PM Revenue Per 1,000 Impressions
RSS RDF Site Summary
RTE Runtime Environment
RTF Rich Text Format
RUP Rational Unified Process
SaaS Software as a Service
SAN Storage Area Network
SATA Serial Advanced Technology Attachment
SCSI Small Computer System Interface
SD Secure Digital
SDK Software Development Kit
SDRAM Synchronous Dynamic Random Access Memory
SDSL Symmetric Digital Subscriber Line
SEO Search Engine Optimization
SERP Search Engine Results Page
SIMM Single In-Line Memory Module
SIP Session Initiation Protocol
SKU Stock Keeping Unit
SLA Software License or Service Level Agreement
SLI Scalable Link Interface
SMART Self-Monitoring Analysis And Reporting Technology
SMB Server Message Block
SMM Social Media Marketing
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SO-DIMM Small Outline Dual In-Line Memory Module
SOA Service Oriented Architecture
SOAP Simple Object Access Protocol
SQL Structured Query Language
SRAM Static Random Access Memory
sRGB Standard Red Green Blue
SSD Solid State Drive
SSH Secure Shell
SSID Service Set Identifier
SSL Secure Sockets Layer
TCP/IP Transmission Control Protocol/Internet Protocol
TFT Thin-Film Transistor
TIFF Tagged Image File Format
TTL Time To Live
TWAIN Toolkit Without An Informative Name
UAT User Acceptance Testing
UDDI Universal Description Discovery and Integration
UDP User Datagram Protocol
UGC User Generated Content
UML Unified Modeling Language
UNC Universal Naming Convention
UPnP Universal Plug and Play
UPS Uninterruptible Power Supply
URI Uniform Resource Identifier
URL Uniform Resource Locator
USB Universal Serial Bus
UTF Unicode Transformation Format
VCI Virtual Channel Identifier
VDSL Very High Bit Rate Digital Subscriber Line
VDU Visual Display Unit
VFAT Virtual File Allocation Table
VGA Video Graphics Array
VLB VESA Local Bus
VLE Virtual Learning Environment
VoIP Voice Over Internet Protocol
VPI Virtual Path Identifier
VPN Virtual Private Network
VRAM Video Random Access Memory
VRML Virtual Reality Modeling Language
W3C World Wide Web Consortium
WAIS Wide Area Information Server
WAMP Windows, Apache, MySQL, and PHP
WAN Wide Area Network
WDDM Windows Display Driver Model
WEP Wired Equivalent Privacy
Wi-Fi Wireless Fidelity
WINS Windows Internet Name Service
WPA Wi-Fi Protected Access
WWW World Wide Web
XHTML Extensible Hypertext Markup Language
XML Extensible Markup Language
XSLT Extensible Style Sheet Language Transformation
Y2K Year 2000
ZIF Zero Insertion Force
Information Sheet 5.7
Computer Virus
Different types of computer viruses would reach you through the normal web
activities like,
1. Opening email attachments from fake accounts.
2. Clicking inappropriate internet advertisements without understanding fully.
3. Installing/downloading the free games, tool-bars or system utilities.
4. Visiting an infected webpage
5. Setting up of software without license agreements and so on.
Not only with web activities, if you are not running the latest updates of your
operating
system and not using the good antivirus software, computer viruses would reach
you easily.
3. Multipartite Virus
Multipartite virus spreads in multiple ways and infects the programming files.
They used to hide in the memory like Memory resident virus and do infect the
hard disk.
4. Polymorphic Virus
Polymorphic virus are the powerful virus which might guards itself with encryption
algorithm and has the tendency to change automatically when certain conditions
are meet. Because of having encrypting capability, it is tough to find it by even
with an antivirus program.
5. FAT virus
FAT virus spoils the file allocation system section (Information where the location
of files and the details of the available spaces are stored) and might cause crucial
damage to it. It would result in defeating the individual files or complete
directories. Not only these! There are still some common types of computer
viruses like Web scripting viruses, Boot sector viruses, time/logic bombs, direct
action viruses, Trojan horse virus, Root kits, spyware and worms have affinity to
disrupts the computer operation.
In late 1980’s, computer viruses has started to born. Did you know about the
first computer virus? It is “The Brain” released from Pakistan in the year 1986.
So the 25th anniversary of the first PC virus was marked in 2011. The danger
rating of the first computer virus is very low, but the most dangerous viruses
came into existence in 1990’s. Let’s check some worst types of computer viruses
now.
1. Code red
A powerful worm named “Code red” had made the anti-virus researchers in
hindrance and it infected millions of computers and lakhs of servers. It took
advantage in Microsoft internet information server too and was first detected by
the employees of eEye digital security. It is not necessary to open an email
attachment or execute a file, it catches your PC if you open a specific webpage.
3. Melissa
Melissa is a well-known worm which infected the MS word document files through
email attachments using MS outlook. This virus caused a serious destruction to
the computers in 1999 and the damage was estimated in millions of dollars. It
had made the popular concerns like Intel and Microsoft temporarily to shut down.
3. My doom
My doom was considered a powerful virus in 2004 as it had the proficiency to
stop accessing the antivirus program by the operating system. This virus spread
through email with the text “Mail transaction failed” and gets downloaded into the
system once the message got clicked. Millions of computers were infested
through this virus and loss was estimated in billions.
4. Nimda
Nimda virus had risen in the year 2001 and it is just the reverse form of the word
“Admin”. This virus targeted to slow down the internet traffic and it propagated to
the system in different ways through emails, while sharing files, server weakness
etc. Once this worm gets activated on the computer, the attacker would have the
full control to the system if certain conditions are meet.
5. Conficker
Conficker is the widespread internet virus and so the anti-virus researchers called
it as “Super worm”. Microsoft operating systems was targeted by this dangerous
virus and so millions of computer which had vulnerable Windows OS had hit by it.
This worst virus might spread through removable drives and assembled in such a
way to take the financial and other vital data from the system.If you’re are using
computer from long, then you might be aware of some other worst types of
viruses ike I love you (2000), Stuxnet (2009), agent.btz (2008), SQL Slammer
(2003) and Blackworm (2006).
Now, do check some types of computer viruses which caused significant damage
to the computers in the year 2012.
Shamoon
Shamoon was discovered in August 2012 that has been used for cyber spying. It
infects the system runs on Windows NT, Windows me and Windows 9x. The
attacker uses the “dropper” function to spread in the network to the hard disk of
the computer so that to compile the list of files on attacked computers. Then the
attacker receives the data with the help of “reporter” program. “Wiper” is the
function used to erase the involved files and this might create problems in booting
by overwriting action.
Gauss
Gauss is the highly destructive computer worm which was intentionally created to
steal the data from Middle-east banks. It was discovered in June 2012 by a
Russian lab and it affected thousands of computers. It can infect the USB drives
and collected information will be stored as a hidden file on the removable drives.
DNS changer
Cyber-criminals created this virus to redirect the internet traffic to a phishing
website. The DNS changer computer virus modified the Domain Name System
(DNS) configuration of computers and redirects the users to a specific website.
FBI got involved in this virus and the interim servers were official shutdown on
July 9, 2012.
Belgian
Belgian is the worst computer virus spreads through spam emails or hacked
webpages. It locked the computers and then asked for some money to unlock the
data. This global virus has the power to gain the remote access to computers to
track the Files and launch the malware when Windows gets started.
Flame
Flame is the complex malware found in 2012 which used Bluetooth to send
commands. It was discovered in Russian lab and it grabs the data from chats,
emails and screenshots. It steal sensitive data and infects many computers in
Iran and Middle east countries.
Many types of computer viruses are created everyday and the new computer
virus like Ransomware (freezes the PC and ask to pay ransom to unlock) have
started to cause damage to the computer this year. Even though the anti-virus
researches are working to prevent these actions with powerful anti-virus software,
cyber-criminals are tactically creating the malware.
Symptoms of an infected computer
Computer virus symptoms are a not cast in stone, but rather a moving target.
Just like with the human viral conditions, they evolve through generations – which
in computer technology terms may mean weeks or even days. Some symptoms
may not necessarily mean an infection – for example, if you are sneezing, you do
not necessarily have a flu, it may be just an allergy – which means different
cause, and different treatment methods. Same with computers – if your system
seems to be slower than usual, it may be a symptom of a virus, but it may also be
a symptom of “program overload” – when you have too many programs running
at once, and it crashes your computer system’s performance.
With that in mind, let’s go over some of the most common symptoms that can
alert you to the potential virus within your computer system, or even your
computer network, presented here in no particular order.
Antivirus software protects your computer from worms, Trojan horses and many
other types of threats. Without a antivirus application your computer is vulnerable
to these types of attacks.
Steps
1. Decide if you want to spend some extra money and pay for your antivirus
software or use a free antivirus application.
If you decide to pay for your antivirus software you can buy it directly from the
antivirus company or head out to your local store with a electronic section and
buy it there.
If you decide to download a free antivirus application you can download it from
directly from the antivirus company's website. If you have dial-up internet it may
take hours to download.
2. Run the installer for your antivirus application. Follow all steps exactly as the
installer says too. About all antivirus installers setup the antivirus application
for maximum protection.
3. Once installed it is a good idea to check for updates if the installer did not do it
during the installation.
4. Once everything is setup and updated it is also a good idea to run a scan and
remove any virus that may have been on your computer before the antivirus
application was installed.
Self- Check ____
(Information Sheet 1.1)
Computer Basics
1. An input device used with graphical user interfaces (GUI) to point to, select,
or activate images on the video monitor.
2. Is the hardware within a computer that carries out the instructions of a
computer program by performing the basic arithmetical, logical, and
input/output operations of the system?
3. A hard copy output device that applies data to paper.
4. is also known as a "computer chassis", "tower", "system unit", "base
unit" or simply "case". Also sometimes incorrectly referred to as the "CPU"
or "hard drive"
5. Converts mains AC to low-voltage regulated DC power for the internal
components of a computer.
6. The most powerful computers in terms of performance and data processing.
7. Are any physical part of the computer which include all the internal
components and also the external part like the monitor and the keyboard.
8. It holds many of the crucial electronic components of the system, such as
the central processing unit (CPU) and memory, and provides connectors for
other peripherals.
9. Is any set of instructions that tells the hardware what to do such as a web
browser, media player or word processor.
10. Is an electronic device that manipulates information, or "data." the computer
sees data as one's and zero's but he knows how to combined them into more
complex things such as a photograph, a movie, a website, a game and much
more.
ANSWER KEY ____
(Computer Basics)
5. Always power off and unplug the computer before working on it.
(Information Sheet 1.3)
Used of Hand Tools
(Identification) : ( Identify what is this tool.. tell what is that tool for)
Multimeter - used to test the integrity of circuits and the quality of electricity
in computer components.
Compressed air - used to blow away dust and debris from different
computer parts without touching the components.
TASK SHEET
Title:
Performance Objective: Given (condition), you should be able to
(performance) following (standard
Supplies/Materials : Motherboard
Equipment : Motherboard
Steps/Procedure:
Yellow
Red
Orange
Black
Purple
Green
Grey
White
Blue
Yellow: +12V
Red: +5V
Orange: +3.3V
Black: Ground
Blue: -12V
Information Sheet 1.8
Steps to a Safe and Successful Disassembly and Assembly
TASK SHEET
Steps/Procedure:
TASK SHEET
Steps/Procedure:
1. Download PowerISO
2. Install PowerISO
3. Create ISO image
TASK SHEET
Steps/Procedure:
1. Download Rufus
2. Install Rufus
3. Create Bootable flash drive using Rufus
TASK SHEET
1. Change the BIOS boot order so the USB device option is listed first.
2. Create a partition for the hard drive;
Drive C: 40 %
Drive D: 60 %
3. Install Windows Server 2008 R2
4. Put password : asian@12345
TASK SHEET
Steps/Procedure:
1. Install winRAR
2. Install Network device driver
3. Install kingsoft office