8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
1/198
TRAINERS METHODOLOGY 1
Information and Communication Technology
UNIT OF COMPETENCY :CONFIGURE COMPUTER SYSTEMS
AND NETWORKS
MODULE TITLE :CONFIGURING COMPUTER SYSTEMS
AND NETWORKS
Computer HardwareServicing NC II
ConfigureComputer Systemsand Networks
Date Developed:
May 2014
Document No.
Checked by:
QCLBSDC Page i of viiDeveloped by:
MELJUN P. CORTES Revision #__
COMPUTER HARDWARESERVICING NC II
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
2/198
Plan
Training
Session
Computer HardwareServicing NC II
ConfigureComputer Systemsand Networks
Date Developed:
May 2014
Document No.
Checked by:
QCLBSDC Page ii of viiDeveloped by:
MELJUN P. CORTES Revision #__
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
3/198
Data Gathering Instrument for Trainee’s Characteristics
Please answer the following instrument according to the
characteristics described below. Encircle the letter of your choice that bestdescribes you as a learner. Blank spaces are provided for some data thatneed your response.
Characteristics of learners
Language, literacyand numeracy(LL&N)
Average grade in:
English
a.95 and above b.90 to 94
c.85 to 89
d.80 to 84
a.75 to 79
Average grade in:
Math
a.95 and above b.90 to 94
c.85 to 89
d.80 to 84
e.75 to 79
Cultural andlanguage
background
Ethnicity/culture:
a.Ifugao
b.Igorot
c.Ibanag
d.Gaddang
e.Muslim
f.Ibaloy
g.Others( please specify)Tagalog
Education &generalknowledge
Highest Educational Attainment:a.High School Level
b.High School Graduate
c.College Level
d.College Graduate
e.with units in Master’s degree
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 3 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
4/198
Characteristics of learners
f.Masteral Graduate
g.With units in Doctoral Level
h.Doctoral Graduate
Sex a.Male
b.Female
Age Your age: __48___
Physical ability 1.Disabilities(if any) none2.Existing Health Conditions (Existing illness ifany)
a.None b.Asthmac.Heart diseased.Anemiae.Hypertensionf.Diabetesg.Others(please specify) none
Previous
experience withthe topic
CHS Certificates
a.CHS NC II Graduate b.CHS NC II Certifiedc.CHS Trainer / Lecturerd.CHS Lead Trainer/ Resource PersonNumber of years as a competency trainer 13
Previous learningexperience
List down trainings related to CHSa.LabSim for Networking & Troubleshooting b.Consumer Electronics Servicingc. Electronics Computer Technician
d. Others (please specify ) ______________
Training Levelcompleted
National Certificates acquired and NC levela.Instrumentation & Control Servicing NC II b.Computer Hardware Servicing NC IIc.Consumer Electronics Servicing NC IId.Others (please specify) _____________
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 4 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
5/198
Characteristics of learners
Special courses Other courses related to CHS
a. BS in Computer Science b.Master in Business Administration
c.92 units of BS Electrical Engineering
d.Others(please specify) Registered MasterElectrician ( RME )
Learning styles a.Visual - The visual learner takes mentalpictures of information given, so in order for
this kind of learner to retain information, oralor written, presentations of new informationmust contain diagrams and drawings,preferably in color. The visual learner can'tconcentrate with a lot of activity around himand will focus better and learn faster in a quietstudy environment.
b.Kinesthetic - described as the students in theclassroom, who have problems sitting still and
who often bounce their legs while tapping theirfingers on the desks. They are often referred toas hyperactive students with concentrationissues.
c.Auditory- a learner who has the ability toremember speeches and lectures in detail buthas a hard time with written text. Having toread long texts is pointless and will not beretained by the auditory learner unless it is
read aloud.d.Activist - Learns by having a go
e.Reflector - Learns most from activities wherethey can watch, listen and then review whathas happened.
f.Theorist - Learns most when ideas are linked
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 5 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
6/198
Characteristics of learners
to existing theories and concepts.
g.Pragmatist - Learns most from learningactivities that are directly relevant totheirsituation.
Other needs a.Financially challenged b.Working studentc.Solo parentd.Others(please specify)___________________________
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 6 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
7/198
COMPUTER HARDWARE SERVICING NC II
SELF-ASSESSMENT CHECK
INSTRUCTIONS: This Self-Check Instrument will give the trainer necessarydata or information which is essential in planning trainingsessions. Please check the appropriate box of your answerto the questions below.
CORE COMPETENCIES
CAN I…? YES NO
1.INSTALL COMPUTER SYSTEMS AND NETWORKS
1.1 Plan and prepare for installation √
1.2 Install equipment / device / system √
1.3 Conduct test √
2. DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEMS
2.1 Plan and prepare for diagnosis of faults of computersystems
√
2.2 Diagnose faults of computer systems √
2.3 Rectify/correct defects in computer systems andnetworks
√
2.4 Test systems and networks √
3.CONFIGURE COMPUTER SYSTEMS AND NETWORKS
3.1 Plan and prepare for configuration √
3.2 Configure computer systems and networks √
3.3 Inspect and test configured computer systems andnetworks √
4.MAINTAIN COMPUTER SYSTEMS AND NETWORKS
4.1 Plan and prepare for maintenance √
4.2 Maintain computer systems and networks √
4.3 Inspect and test the computer systems and networks √
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 7 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
8/198
FORM 1.1 SELF-ASSESSMENT CHECK
INSTRUCTIONS: This Self-Assessment Check Instrument will give thetrainer necessary data or information which is essential in
planning training sessions. Please check the appropriate box of your answer to the questions below.
CORE COMPETENCIES
CAN I…? YES NO
5.
6.
7.
8.
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 8 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
9/198
CORE COMPETENCIES
CAN I…? YES NO
9.
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 9 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
10/198
Evidence of Current Competencies acquired related to Job/Occupation
Current
competencies Proof/Evidence Means of validating
● Install Computer Systems and Networks
Plan andprepare forinstallation
Training Certificates
Certificate of Employment
TOR
Pictures
Video
Submitted requiredcertificate
Authenticate certificate
Investigate
Third party testimony
Oral Questioning
Written Examination
Practical Demonstration
Investigate pictures
Testimonial
Submitted result ofdiagnostic assessment
Watch Video
Investigate video
Oral Questioning
● Diagnose Computer systems and Networks
Plan andprepare fordiagnosis offaults ofcomputersystems
Training certificate
Certificate of Employment
TOR
Submitted requiredcertificate
Authenticate certificate
Investigate
Third Party Testimony
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 10 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
11/198
Pictures
Video
Report from CBT Facilitator
Oral Questioning
Investigate pictures
Testimonial
Submitted result ofdiagnostic assessment
Watch Video
Investigate video
Third Party Testimony
Oral Questioning
Practical Demonstration
● Configure Computer Systems and Networks
Plan andprepare forconfiguration
Training certificate
Certificate of Employment
TOR
Pictures
Submitted requiredcertificate
Authenticate certificate
Investigate
Third Party Testimony
Report from CBT FacilitatorOral Questioning
Investigate pictures
Testimonial
Submitted result ofdiagnostic assessment
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 11 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
12/198
Video Watch Video
Investigate video
Third Party Testimony
Oral Questioning
Practical Demonstration
● Maintain Computer Systems and Networks
Plan andprepare formaintenance
Training certificateCertificate of Employment
TOR
Pictures
Video
Submitted requiredcertificate
Authenticate certificate
Investigate
Third Party Testimony
Report from CBT Facilitator
Oral Questioning
Investigate pictures
Testimonial
Submitted result ofdiagnostic assessment
Watch Video
Investigate video Third Party Testimony
Oral Questioning
Practical Demonstration
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 12 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
13/198
Evidences/Proof of Current Competencies(Sample)
Form 1.2: Evidence of Current Competencies acquired related to
Job/Occupation
Currentcompetencies
Proof/Evidence Means of validating
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 13 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
14/198
Summary of Current Competencies Versus Required Competencies
Required Units ofCompetency/LearningOutcomes based on CBC
CurrentCompetencies
TrainingGaps/Requirements
1. INSTALL COMPUTER SYSTEMS AND NETWORKS
1.1Plan and prepare forinstallation
1.1 Plan and preparefor installation
1.2 Install equipment /device / system
1.2. Install equipment/ device / system
1.3 Conduct test 1.3 Conduct test
2. DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEMS
2.1 Plan and prepare fordiagnosis of faults of
2.1.Plan and preparefor diagnosis of
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 14 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
15/198
computer systems faults of computersystems
2.2 Diagnose faults of
computer systems
2.2.Diagnose faults of
computer systems2.3 Rectify/correct defects
in computer systemsand networks
2.3.Rectify/correctdefects incomputer systemsand networks
2.4 Test systems andnetworks
2.4.Test systems andnetworks
3.CONFIGURE COMPUTER SYSTEMS AND NETWORKS
3.1 Plan and prepare forconfiguration
3.1.Plan and preparefor configuration
3.2 Configure computer
systems and networks
3.2.Configure
computer systems andnetworks
3.3 Inspect and testconfigured computersystems and networks
3.3.Inspect and testconfiguredcomputer systemsand networks
4.MAINTAIN COMPUTER SYSTEMS AND NETWORKS
4.1 Plan and prepare formaintenance
4.1. Plan and preparefor maintenance
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 15 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
16/198
4.2 Maintain computersystems andnetworks
4.2.Maintaincomputer systemsand networks
4.3 Inspect and test thecomputer systemsand networks
4.3. Inspect and testthe computersystems andnetworks
Identifying Training Gaps
From the accomplished Self-Assessment Check (Form 1.1) and the
evidences of current competencies (Form 1.2), the Trainer will be able toidentify what the training needs of the prospective trainee are.
Form 1.3 Summary of Current Competencies Versus RequiredCompetencies (Sample)
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 16 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
17/198
Required Units ofCompetency/LearningOutcomes based on CBC
CurrentCompetencies
TrainingGaps/Requirements
1.
Required Units ofCompetency/LearningOutcomes based on CBC
CurrentCompetencies
TrainingGaps/Requirements
2.
3.
4.
Training Needs
Training Needs Module Title/Module of
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 17 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
18/198
(Learning Outcomes) Instruction
Install equipment / device / system 1.INSTALLING COMPUTERSYSTEMS AND NETWORKSConduct test
Diagnose faults of computer systems 2.DIAGNOSING AND TROUBLESHOOTING
COMPUTER SYSTEMS
Rectify/correct defects in computersystems and networks
Configure computer systems andnetworks
3.CONFIGURING COMPUTERSYSTEMS AND NETWORKS
Inspect and test configuredcomputer systems and networks
Maintain computer systems andnetworks
5.MAINTAINING COMPUTERSYSTEMS AND NETWORKS
Inspect and test the computersystems and networks
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 18 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
19/198
Using Form No.1.4, convert the Training Gaps into a Training Needs/Requirements. Refer to the CBC in identifying the Module Title or Unit of
Competency of the training needs identified.
Form No. 1.4: Training Needs (Sample)
Training Needs
(Learning Outcomes)
Module Title/Module ofInstruction
1.
2.
3.
4.
8.
ComputerHardware Servicing
NC II
ConfigureComputer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 19 of viiDeveloped by:
Jesus N. Abalo, MBARevision# __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
20/198
SESSION PLAN
Sector : Information and Communication Technology (ICT)
Qualification Title : Computer Hardware Servicing NC 11
Unit of Competency : Configure Computer Systems and Networks
Module Title : Configuring Computer Systems and Networks
Learning Outcomes:
LO1. Plan and prepare for configuration
LO2. Configure computer systems and networks
LO3. Inspect and test configured computer systems and networks
B. INTRODUCTION
This module covers the knowledge, skills and attitudes needed to configure computer systems and networksand required to provide as Computer Technician. It reflects the role as technical support provider and SystemNetwork Administrator.
B. LEARNING ACTIVITIES
LO 1: Plan and Prepare for configuration (30 Hrs)
LearningContent
Methods Presentation Practice Feedback Resources Time
1.Inspecting work
• Modular/Self-
•Read information3.1-1 on
• Answer
self check 3.1-1
●Compare toModel Answer to
●InformationSheet 3.1-1
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 20Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
21/198
instructionsaccording to
jobrequirements.
pacedlearning
•
ActiveLecture
Inspecting workinstructionsaccording to jobrequirements
● Participate in thegroup discussion onInspecting workinstructionsaccording to jobrequirements
onInspectingthe workinstructionsaccordingto job
Self check 3.1-1
●Have thetrainer evaluatethe answer
●Self-Check 3.1-1Self-Check 3.1-1●Model Answer toSelf-check 3.1-1
4
2.Planning andpreparing ofstandardoperatingprocedures
●Modular/ Self-pacedlearning
● ActiveLecture
● Read InformationSheet 3.1-2 onPlanning andpreparing of standardoperating procedures
●Participate in the
group discussion onPlanning andpreparing of standardoperating procedures
● AnswerSelf-check3.1-2on Planningandpreparingstandard
operatingprocedures.
● Compare toModel answer toSelf-check 3.1-2
●Have the
trainer evaluatethe answer
● InformationSheet 3.1-2 ● Self-check 3.1-2
● Model answer
to Self-check3.1-2 ● Power pointpresentation
●Questionnaire
4
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 21Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
22/198
3.OccupationalHealth andSafety
●Modular/ Self-pacedlearning
● ActiveLecture
●Demonstration
● Read InformationSheet 3.1-3 onOccupational Healthand Safety
● Participate in thegroup discussion onOccupational Healthand safety
●Observe thedemonstration onOccupational Healthand Safety
● AnswerSelf-check3.1-3 onOHS
●Perform TaskSheet3.1-3
● Compare toModel Answer toself-check3.1-3
●Have thetrainer evaluatethe answer
● Evaluate theperformance
based on theperformancecriteria
checklist●Have thetrainer evaluatethe performance
● InformationSheet 3.1-3 ● Self-check 3.1-3
● Model answerto Self-check3.1-3 ● Power pointpresentation ● Questionnaire
● Task Sheet 3.1-3 ● PerformanceCriteriachecklist
6
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 22Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
23/198
4.ConfigureComputerSystems andNetworks
●Modular/ Self-pacedlearning
●Demonstration
●Read Informationsheet 3.1-4 onConfigure Computer
●Observe thedemonstration onConfigureComputer SystemsandNetworks
● AnswerSelf-check3.1-4 onconfigurecomputersystems andnetworks
●Perform TaskSheet3.1-
● Compare toModel Answer toself-check3.1-4
●Evaluate theperformance
based on theperformancecriteriachecklist
●Have thetrainer evaluatethe performance
● InformationSheet 3.1-4 ● Self-check 3.1-4
● Task Sheet 3.1-4 ● PerformanceCriteriachecklist
12
5.Procedures inusing thetools andequipment
●Modular/Self-pacedlearning
● Read Informationsheet 3.1-5 onprocedures in usingthe tools andequipment
● AnswerSelf-check3.1-5 onproceduresin using the
● Compare toModel Answer toself-check3.1-5
● InformationSheet 3.1-5 ● Self-check3.1-5
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 23Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
24/198
● Lecture
●Demonstration
● Participate in thegroup discussion inusing the tools andequipment
●Observe thedemonstration onProcedures in usingthe tools andequipment
tools andequipment
●Perform TaskSheet3.1-5
●Have thetrainer evaluatethe answer
●Evaluate theperformance
based on theperformancecriteriachecklist
●Have thetrainer evaluate
the performance
● Model answerto Self-check3.1-5 ● Power pointpresentation
● Questionnaire
● Task Sheet 3.1-5
● PerformanceCriteriachecklist
4
LO 2: Configure computer systems and networks ( 38 hrs)
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 24Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
25/198
1.Occupational Healthand Safety
● Modular/Self-pacedlearning
● Lecture
●Demonstration
● Read InformationSheet 3.2-1 onOccupationalHealth and Safety
● Participate in thegroup discussion on
OccupationalHealth and Safety
●Observe thedemonstration onOccupationalHealth and Safety
● AnswerSelf-check3.2-1 onOccupationalHeath &safety.
●Perform Task Sheet3.2-1
●Compare toModel Answer toself-check 3.2-1
●Have the trainerevaluate theanswer
●Evaluate theperformance
based on theperformanceHave the trainer●
evaluate theperformance
criteria checklist
● InformationSheet 3.2-1 ● Self-check3.2-1
● Modelanswer to
Self-check3.2-1 ● Power pointpresentation
●Questionnaire
● Task Sheet3.2-1 ●Performanc
e Criteriachecklist
8
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 25Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
26/198
2. TestingNormalFunction ofsystemsandNetworks
● Modular/Self-pacedlearning
●Demonstration
● Read InformationSheet 3.2-2 on
Testing NormalFunctions ofsystems andNetworks
●Observe thedemonstration ontesting normalfunctions ofsystems andnetworks
● AnswerSelf-check3.2-2 ontestingnormalfunction ofsystems and
networks
●Perform Task Sheet3.2-2
●Compare toModel Answer toself-check 3.2-2
●Evaluate theperformance
based on theperformancecriteria checklist
●Have the trainerevaluate theperformance
● InformationSheet 3.2-1 ● Self-check3.2-1 ● Modelanswer to
Self-check3.2-
1
● Task Sheet3.2-2 ● PerformanceCriteriachecklist
8
3.Procedures
in checkingthe faults orproblems
● Modular/
Self-pacedlearning
● Read Information
Sheet 3.2-3 onProcedures inchecking the faultsor problems
● Answer
Self-check3.2-3 onprocedures incheckingfaults or
●Compare to
Model Answer toself-check 3.2-3
● Information
Sheet 3.2-3 ● Self-check3.2-3
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 26Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
27/198
● Lecture
●Demonstration
● Participate in thegroup discussion onprocedures inchecking the faultsor problems
●Observe thedemonstration onProcedures inchecking the faultsor problems
problems
●Perform Task Sheet3.2-3
●Have the trainerevaluate theanswer
●Evaluate theperformance
based on theperformancecriteria checklist
●Have the trainerevaluate theperformance
● Modelanswer to Self-check3.2-3 ● Power pointpresentation●Questionnair
e
● Task Sheet3.2-3 ●Performance Criteriachecklist
12
4.Procedures
in configureSystems andNetworks
●Modular/
Self-pacedlearning
● Read Information
Sheet 3.2-3 onProcedures inConfigure Systemsand Networks
● Answer
Self-check3.2-4 onprocedures inconfiguresystems and
●Compare to
Model Answer toself-check 3.2-4
● Information
Sheet 3.2-4 ● Self-check3.2-4 ● Modelanswer to
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 27Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
28/198
●Demonstration
●Observe thedemonstration onProcedures inConfigure Systems
and Networks
networks
●Perform Task Sheet3.2-4
●Evaluate theperformance
based on theperformancecriteriachecklist
●Have the trainerevaluate theperformance
Self-check3.2-4
● Task Sheet3.2-4 ● PerformanceCriteria
checklist
10
LO 3.Inspect and test configured computer systems and networks ( 32 hrs.)
1.Occupational Health andsafety
●Modular/Self-pacedlearning
●Demonstration
●Refer toInformation Sheet3.3-1 onOccupationalHealth and Safety
●Observe thedemonstration onOccupational
● AnswerSelf-check3.3-1 onoccupationalhealth and
safety●Perform
Task Sheet3.3-1
●Compare toModel Answer toself-check 3.3-1
●Evaluate theperformance
based on the
● InformationSheet 3.3-1 ● Self-check3.3-1
● Task Sheet3.3-1
● Performance
10
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 28Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
29/198
Health and Safety performancecriteria checklist
●Have the trainerevaluate theperformance
Criteriachecklist
2.Inspection of
systems
●Modular/
Self-pacedlearning
●Demonstration
●Refer to
Information Sheet3.3-2 on Inspectingof systems
●Observe thedemonstration onInspecting ofsystems
● Answer
Self-check3.3-2 oninspection ofsystems
●Perform Task Sheet3.3-2
●Compare to
Model Answer toself-check 3.3-2
●Evaluate theperformance
based on theperformancecriteria checklist
●Have the trainerevaluate theperformance
● Information
Sheet 3.3-2 ● Self-check3.3-2 ● Modelanswer toSelf-check3.3-2
● Task Sheet3.3-2 ● PerformanceCriteriachecklist
12
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 29Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
30/198
3.Makingdocuments andReport
●Modular/Self-pacedlearning
●Demonstration
● Read InformationSheet 3.3-3 onMaking documentsand reports
●Observe theInstructor
● Answer Self-check 3.3-3 onmakingdocuments andreport
●Perform TaskSheet 3.3-3
●Compare toModel Answer toself-check 3.3-3
●Evaluate theperformance based on theperformancecriteria checklist
●Have the trainerevaluate theperformance
● InformationSheet 3.3-3 ● Self-check3.3-3 ● Model answerto Self-check3.3-3
● Task Sheet3.3-3 ● PerformanceCriteriachecklist
10
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 30Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
31/198
C.ASSESSMENT PLAN
1. Tools, materials and equipment needed.
Tools Materials & Supplies Equipment PPE
Set of Pliers OHS P0licies / Manuals 1 Server/Peripherals Anti-static wrist Strap
Set of Screwdrivers Wires & cables/ OSSoftware 1 !es"top P#
2. Venue of Assessment : Institutional Assessment/ Practical Work Area3. Type of Assessment : Written, Oral uestionin! an" #emonstration
$. Type of %&i"ence :'or Written Test
▪ Inspecting work instructions according to job requirements
▪ Planning and preparing of standard operating procedures ▪ Procedures in using the tools and equipment ▪ Occupational Health and safety ▪ Procedures in checking the faults and problems ▪ Procedures in configure systems and networks ▪ Making documents and reports
'or #emonstration on
$ Plannin% and preparin% of standard operatin% procedures
▪ Occupational Health and Safety
▪ Procedures in using the tools and equipment ▪ Configuring systems and networks ▪ Testing normal functions of systems and networks ▪ Procedures in checking the faults and problems ▪ Procedures in configure systems and networks ▪ Inspection of systems and networks with manuals
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 31Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
32/198
D.TEACHER’S SELF-REFLECTION OF THE SESSION
At the end of the session , evaluate the result of the performance of the trainees, if the result is not good thenask the trainees what are the problems they encountered? What part is difficult for them to perform? So thatthe trainees can suggest what intervention the trainer can do to help them better understand and guide them
to improve their efficiency and effectiveness in their performance.
Other trainees have to practice more on how to terminate UTP cable to RJ-45 effectively. The methods workedsuccessfully and effectively to the trainees even if most of them were high school graduate.
Computer Hardware ServicingNC II
Configure Computer Systemsand Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC Page 32Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
33/198
COMPETENCY-BASEDLEARNING MATERIAL
Sector:
Information and Communication TechnologyQualification:
Computer Hardware Servicing NC-IIUnit of Competency:
Configure Computer Systems and NetworksModule Title:
Configuring Computer Systems andNetworks
L Y C E U M O F A L A B A N G
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 33Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
34/198
Km 30 National Road, Tunasan Muntinlupa City
HOW TO USE THIS COMPETENCY-BASED LEARNING
MATERIAL Welcome to the Module“Configuring Computer Hardware a”. This
module contains training materials and activities for you to complete.
The unit of competency “Configure Computer Systems andNetworks” contains knowledge, skills and attitudes required for aComputerHardware Servicing NC IIcourse.
You are required to go through a series of learning activities in orderto complete each of the learning outcomes of the module. In each learningoutcome there areInformation Sheets, Operation Sheets, and ActivitySheets. Follow these activities on your own and answer the Self-Check atthe end of each learning activity.
If you have questions, don’t hesitate to ask your trainer for assistance.
Remember to:
• Read information sheets and complete the self-check. Suggestedreferences are included to supplement the materials provided in thismodule.
• Perform the Task Sheets and Job Sheets until you are confident that your outputs conform to the Performance Criteria Checklist thatfollows the sheets.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 34Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
35/198
Module ContentModule Content
Learning Outcome Summary
Learning Experiences
Information Sheet
Self Check
Self Check Answer Key
Operation/Task/Job Sheet
Performance Criteria Checklist
References/Further Reading
• Submit outputs of the Task Sheet and Job Sheets to your facilitatorfor evaluation and recording in the Accomplishment Chart. Outputsshall serve as your portfolio during the Institutional Competency
Evaluation. When you feel confident that you have had sufficientpractice, ask your trainer to evaluate you. The results of yourassessment will be recorded in your Progress Chart and
Accomplishment Chart.
Recognition of Prior Learning (RPL)
You may already have some of the knowledge and skills covered in thismodule because you have:
• Been working for some time• Already have completed training in this area.
You need to complete this module before you perform the module onMaintain and Repair Computer Systems and Networks .
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 35Developed by:
Jesus N. Abalo, MBARevision # __
-
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
36/198
Module Content
Module Content
Module Content
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 36Developed by:
Jesus N. Abalo, MBARevision # __
List of Competencies
Front Page
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
37/198
Computer Hardware Servicing NC II
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
No. Unit of Competency Module Title Code
CORE COMPETENCIES
1.Install computersystems and networks
Installing computer systemsand networks ELC724318
2.Diagnose andtroubleshoot computersystems
Diagnosing andtroubleshooting computersystem
ELC724319
3.Configure computer
systems and networks
Configuring computer
systems and networks
ELC724320
4.Maintain computersystems and networks
Maintaining computersystems and networks
ELC724321
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 37Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
38/198
MODULE CONTENT
UNIT OF COMPETENCY : Configure Computer Systems and Networks
MODULE TITLE : Configuring Computer Systems and Networks
MODULE DESCRIPTOR : This unit covers the knowledge, skills andattitudes needed to configure computer systemsand networks
NOMINAL DURATION :100 hours
LEARNING OUTCOMES :
Upon completion of this module the students/ trainees MUST be able to:
1. Plan and prepare for configuration
2. Configure computer systems and networks
3. Inspect and test configured computer systems and networks
ASSESSMENT CRITERIA:
• Configured computer systems and networks identified from the Job/Service Order or instructions.
• Planned and prepared job requirements.• Followed OHS policies and procedures of job requirements.• Checked computer systems and networks configuration with specifiedrequirements.
• Checked necessary tools, equipment materials• Appropriate Personal Protective Equipment are used and OHS policiesand procedures followed
• Normal function of systems and networks checked in accordance withmanufacturer’s instructions
• Fault or problem in the systems and networks diagnosed in line withthe standard operating procedures.
• Computer systems and networks are checked to ensure safe operation.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 38Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
39/198
• Final inspections are undertaken to ensure that the configurationdone on the systems and networks conforms with the manufacture’sinstruction/manual
•
Computer systems and networks configured in line with the standardoperating procedures.• Report is prepared and completed according to company requirements.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 39Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
40/198
CONDITIONS:
Students/trainees must be provided with the following:
• OH & S policies and procedures- OH & S policies- manuals
• Computer systems and networks- 1 Server- Peripherals- 1 Desktop Computers
• Materials- Wires and Cables
- Appropriate Software- Computer Storage Media
• Tools- Pliers- Philips screw driver
• Equipment/testing devices- Computer
• Personal protective equipment Anti-static wrist wrap
ASSESSMENT METHODS:
• Hands-on application• Direct observation• Practical Demonstration /oral questioning
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 40Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
41/198
LEARNING OUTCOME NO. 2.
CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Contents:
1.Occupational Health and Safety
2. Testing normal function of systems and networks
3. Procedures in checking the faults or problems
4. Procedures in configure computer systems and networks
Assessment Criteria
1.Appropriate Personal Protective Equipment are used and OHS policiesand procedures followed
2. Normal function of systems and networks checked in accordance withmanufacturer’s instructions.
3. Fault or problem in the systems and networks diagnosed in line withthe standard operating procedures
4. Computer systems and networks configured in line with the standardoperating procedures.
Conditions
The students /trainees must be provided with the following:
• OH & S policies and procedures- OH & S policies- Manuals
• Computer systems and networks- 1 Server
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 41Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
42/198
- Peripherals- 1 Desktop Computers
• Materials- Wires and Cables- Appropriate Software- Computer Storage Media
• Tools- Pliers- Philips screw driver
• Equipment/testing devices- Computer
• Personal protective equipment
Anti-static wrist wrap
Assessment Method:
• Hands-on application• Direct observation• Practical Demonstration /oral questioning
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 42Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
43/198
Learning Experiences
Learning Outcome 2
CONFIGURE COMPUTER SYSTEMS AND NETWORKS
Learning Activities Special Instructions
1. Read information 3.2-1 on OccupationalHealth and Safety
●If you think that you are nowknowledgeable on the content ofthe information sheet, answer selfcheck provided in the module.
● Watch power point presentation onOccupational Health and Safety
● Watch power point presentation onOccupational Health and Safety
• If you got almost 100% correctanswer in this self-check3.2-1, youcan now move to the next task. Ifnot review the information sheet
and go over the self-check again.
• Let your trainer evaluate youroutput based on theperformance criteria checklist ,3.2-1. If you got 100% correctanswer in this task, you cannow move on to the next task.
If not review the informationsheet and go over the taskagain.
●If you think that you are nowknowledgeable on the content of
2. Answer self check 3.2-1
Compare answers with
answer key 3.2-13.Observe the demonstration on
Occupational Health and Safety
4.Perform Task Sheet 3.2-1
5.Have the trainer evaluate theperformance
6.Evaluate the performance based onthe performance criteria checklist
7.Read Information sheet 3.2-2 on Testing normal function of systemsand networks
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 43Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
44/198
the information sheet, answer selfcheck provided in the module.
• The output of your practice ofthis Learning Outcome are thefollowing:
► To know and follow theoccupational health and safety
in configuring computersystems and networks
► To test the normal function ofsystems and networks
► To check faults or problems
► To configure computer systemsand networks
8. Answer Self check 3.2-2
Compare to Model Answer to SelfCheck 3.2-2
9. Observe the demonstration on Testing normal function of systemsand networks
10.Perform Task Sheet 3.2-2
11.Have the trainer evaluate theperformance
12. Evaluate the performance based onthe performance criteria checklist
13.Read Information sheet 3.2-3 onProcedures in checking the faults or
problems14. Answer Self check 3.2-3
15.Compare to Model Answer to SelfCheck 3.2-3
16. Watch Power Point Presentation onProcedures in checking the faults orproblems
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 44Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
45/198
17.Observe the demonstration onProcedures in checking the faults orproblems
18.Perform Task Sheet 3.2-3 ●Let your trainer check your outputin your operation sheet 3.2-3 If yougot 100% correct answers in thistask, you can now move on to thenext task. If not review theinformation sheet and go over thetask again.
19.Have the trainer evaluate the
performance20.Evaluate the performance based on
the performance criteria checklist
21.Read Information Sheet 3.2-4 onProcedures in Configure Computersystems and Networks
22. Answer Self Check 3.2-4
Compare to Model Answer to SelfCheck 3.2-4
23. Watch Video on Procedures inConfigure Computer systems andNetworks
24.Perform Task Sheet 3.2-4 After doing all activities of this
25.Have the trainer evaluate theperformance
LO, you are ready to proceed to
the LO on Maintaining
Computer Systems and26.Evaluate the performance based on
Performance criteria checklistNetworks.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 45Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
46/198
Information Sheet 3.2-1
OHS Policies and Procedures
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1.Identify the OHS policies and procedures;
2.Familiarize OHS policies and procedures;
3.Apply OHS policies and procedures;
4.Appreciate the OHS policies and procedures
Occupational health and safety (OHS) refers to the legislation, policies,procedures and activities that aim to protect the health, safety and welfare of allpeople at the workplace.
Every worker has a right to healthy and safe work and to a workenvironment that enables them to live a socially and economically productive life.Safety practices should be learned early and always adhered to when working withany electrical device including personal computers and peripherals.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 46Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
47/198
Personal safety while working with PC’s
Here are some safety precautions to take before working with any computerhardware tasks:
• Before doing anything, listen to your trainer’s instruction to preventaccidents or any unwanted events that may occur on your workplace.
• Do not work on computer when you are wet because you might getelectrocuted.
• Do not remove internal devices of the computer when it is turned on.
• Be sure not to mix electronic components and water.
• Avoid playing or running while inside the workplace.
• Always wear personal protective equipment (PPE) like coverall, shoes withrubber sole, anti-static wrist strap, etc.
• Ask for assistance from your trainer when it comes on dealing withcomputer devices.
• Apply safety measure when handling tools and equipment to avoidcertain damages.
The trainee is further expected to maintain good health, to be neat in personalappearance and to practice safe working habits at all time with appropriateequipment.
Personal Protective Equipment
You must wear/use something in order to protect yourself againstunexpected harm that may arise while performing certain tasks. Different jobsused different gadgets or suits to prevent unexpected harmful events that may hurtus. The equipment below may be used as PPE:
Goggles – is used to prevent tiny particles from enteringour eyes. A form of protective eyewear used to protectthe area surrounding the eye to prevent particulatesfrom striking the eyes.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 47Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
48/198
Coverall/apron- is worn by a person to prevent his body or clothesfrom any types of dirt.
Gloves – are used in handling object without hurting yourhands. Protects and comfort hands against cold or heat,damage by friction, abrasion or chemicals, and disease; orin turn to provide a guard for what a bare hand should nottouch.
Coverall with Dust mask – is used to cover the mouth and nosefrom tiny particles when cleaning computer peripherals.
The mask forms a sealed cover over the nose and mouth, butmay also cover the eyes and other vulnerable soft tissues of theface.
Shoes with rubber sole and rubber mat – are used to avoid usform slippery.
Anti-static wrist strap / ESD Wrist Strap-Itabsorbs the static electricity of the material when
being hold by the hands. An antistatic used to safelyground a person working on very sensitive electronicequipment, to prevent the buildup of static electricityon their body, which can result in Electro-StaticDischarge (ESD). It is used in the electronic industry
by workers working on electronic devices which can bedamaged by ESD, and also sometime by people around explosives, toprevent electric sparks which set off an explosion.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 48Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
49/198
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 49Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
50/198
Self- Check 3.2-1
INSTRUCTION :Read the following questions and answer it on the Answer
Sheet.
1.Give at least 5 safety precautions when working on a computer.
2.What does ESD mean?
3.What tool do you use to prevent ESD or electrostatic discharge?
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 50Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
51/198
ANSWER KEY 3.2-1
1.Give at least 5 safety precautions when working on a computer.
Answer:
• Do not work on computer when you are wet because you might getelectrocuted.
• Do not remove internal devices of the computer when it is turned on.
• Be sure not to mix electronic components and water.
• Avoid playing or running while inside the workplace.
• Always wear personal protective equipment (PPE) like coverall, shoes withrubber sole, anti-static wrist strap, etc.
2.What does ESD mean?
Answer:
● Electrostatic Discharge
3.What tool do you use to prevent ESD or electrostatic discharge?
Answer
● Anti-static Wrist Strap
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 51Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
52/198
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 52Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
53/198
Information Sheet 3.2-2
Testing Normal Function of Systems and Networks
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1.Check normal function of systems and networks in accordance withmanufacturer’s instructions.
Modern-day PCs are more reliable than ever before, but that doesn’t mean they’re infallible. Equipmentfailures will still happen, however rarely, and even the beefiest of computer components aren’t worth their weight in silicon if they aren’t dependable. Thankfully,the hot and heavy world of stress testing can help toidentify critical faults before your PC crashes out in
the middle of a critical operation.
Whenever you buy or build a PC, swap out a major component, or overclocka piece of hardware, it’s a good idea to stress-test ( or “burn in “) the freshgear, which is not the same as benchmarking your rig.
Why stress-test? Simple: To ensure the reliability and stability of yoursystem. Even if a computer boots up and performs well under normalusage, fickle hardware can cause woes when you step up to heftier tasks,such as gaming or video editing. Stress-testing software places yourcomponents under an intense workload to simulate a worse-case scenario; Ifa component crashes, hangs, or otherwise fails a dedicated stress-test, thereis a good chance that it won’t be reliable under a heavy everyday loads. It’s best to uncover unstable components sooner rather than later, while they’restill under warranty.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 53Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
54/198
Running stress-test can also let you know if you need additional cooling in your computer. If a graphics card or overclocked CPU consistently overheatsand shuts down during a stress test, it’s time to dump the stock cooler, add
a few case fans, and possibly even consider liquid cooling.
All that said, the actual process of stress testing isn’t terribly complicated,though it can be time consuming.
Laying the groundwork.
Here’s a look at HWMonitor and SpeedFan’s interfaces side-by-side.
Before you start torturing your PC, you’re going to need a way to keep tabson its screaming. CPUID’s HWMonitor software does exactly that, providing you with a real-time glimpse of your components’ temperatures, voltages,and fan speeds. Speed fan does the same, though its interface isn’t quite aspolished as HWmonitors.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 54Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
55/198
You’ll want to have at least one of the two programs open during stress tests. While many components will automatically shut down if they overheat, notall will, and you want to pull the plug on you testing if your hardware hits
dangerous heat levels. You can fry your components if a worst-case scenariooccurs and you’re not paying attention. If you see CPU temperature startingto creep north 70 degrees Celsius, or graphics card temperatures around105̊C stop the test and add more cooling to your computer. You’ll also wantto halt your testing if temperatures continuously hover around those marksfor an extended period of time.
Before you start your testing, I recommend closing any nonessentialprograms and diving into your system’s Power setting to prevent it fromgoing to sleep. You don’t want your computer to doze off while you’re busy
burning it in. if you use a screensaver, disable that too.
Testing the CPU with Prime95
If you stress-test only a single component, stress-test your CPU. T’s thatimportant- and it’s frequently the culprit behind an unstable system.
Prime 95 includes three different “ torture “ tests.
While a handful of programs are available that can stress your CPU to itslimits, Prime95 has become thede factostandard. Ostensibly, designed to
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 55Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
56/198
findMersenne prime numbers, the software absolutely hammers yourprocessor, to the point that the developers now include a dedicated “ Torture Test “ mode for peole who are interested in system stability than complex
mathematics.
Open the program, then head to options > Torture Test to bring up a list ofoptions. Many people use theBlend Test. Blend stresses both the CPU andRAM; if no errors pop up after four hours or so, you can consider it stablefor normal use. Alternatively, theSmall FFT andLarge FFT torture tests layoff the RAM a bit to subject the CPU to as much respective stress and heatas possible.
If you have the time ( an adequate cooling ), feel free to “ Torture” your PC with Prime95 for juch, much longer, particularly if you plan to use yourcomputer for folding @home-type projects, which can consume a ton of CPUresources for extended periods. Prime95 sometimes catches CPU errors evebafter half a day of testing. If your rig can run Prime95’s Small FFT test for afull 24 hours without issue, the CPU is as solid as a rock and ready to fold.
IntelBurn test is a nonofficial, user-friendly version of Intel’s brutal Linpack benchmark.
Want a second opinion? Different programs test CPUs in different ways.Hardcore types also hold IntelBurnTest OCCT-two other CPU- stressingprograms in high regard. Both hit your processor- hard and ramptemperatures up very rapidly, however, so keep a close eye on your system-monitoring software when you start the.
No matter what testing program you choose, run it for at least four hours; afull overnight run is preferable. Personally, I like to stress-test new PCsusing Prime95’s Blend and Small FFT tests for at least twelve hours a piece,
and I sometimes follow it up with an hour-long,High or Very High stresslevel IntelBurnTest run.
Testing the RAM
When it comes to seriously testing RAM, only one option is worthconsidering : Memtest 86 +. This tried-and-true diagnostic software has been around seemingly forever, and while it definitely looks its age-
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 56Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
57/198
Memtest86+ rocks an ugly BIOS-esque interface- the program is just aseffective now as it always has been.
A bad memory module (RAM) can cause unpredictable behavior in a Windows system, including the dreaded blue screen of death. If you suspectthat your RAM may be faulty, you can run a memory test to confirm that you have a bad memory module.
Laptop and desktop PC makers occasionally provide preinstalled utilitiesthat sometimes include a memory test. Feel free to try out these utilities,especially if your computer is under warranty and you want to make a warranty claim. Manufacturers will often require you to run their supportutilities first, before agreeing to replace hardware or more forward with a
trouble ticket.
We are going to use a widely-used memory testing application calledmemtest ( memtest86+). Reputable memory makers like, Corsair, PatriotMemory, Crucial, and others, recommend memtest to test their memoryproducts.
1.Get memtest
To use memtest, you have to download it and crearte the bootable mediafirst. You’ll need to decide whether you want to download the ISO image fileand create a CD/DVD or if you want to download the auto-installer for USBkeys to create a bootable USB flash drive.2.Create memtest bootable media
If you want to create a memtest CD or DVD, unzip the download ISO anduse your favorite ISO-burning program to create the disc. In windows 7,simply right-click on the ISO file and select “ Burn disc image’, then follow
the directions to create the disc.
If you want to create a bootable memtest USB flash drive, run the auto-installer and follow the directions to create the drive. Just make sure that you use a blank flash drive; rthe installer will erase all the files on the drive.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 57Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
58/198
3.Run memtest
To run memtest, start your computer with the bootable media inserted andthe test will begin automatically. If you’re having problems booting themedia, make sure that the boot order in your system’s BIOS is set to bootthe optical driver or USB flash drive ahead of your hard drive.
If you have more than one memory module, we recommend that you test onemodule at a time, using the same DIMM slot on your motherboard. This willhelp you isolate the problem module.
The eight different tests in memtest can take several hours to complete,depending on the size of the RAM. A successful test will complete withoutany errors. A failed test will report errors in the error column and you’ll seelots of red blocks.
If your RAM fails memtest, that should be enough for most companies toapprove a replacement. Keep in mind, however, that a failed memtest can
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 58Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
59/198
also be an imdication of problems with your processor, motherboard, ormisconfigured RAM.
Testing the Video card and Power Supply Unit . If you’re a gamer, stress testing your graphics card is a no-brainer,especially since graphics cards tend to fail under heavier loads- you know,like the other ones generated by top-end games. Another bonus: Graphictorture tests usually coax underpowered or faulty power supplies into givingup the ghost, so you’re stressing two birds with one stone.
Benchmarking tools abound, but FurMark was designed specially to give
your GPU a stress- nducing workout and punishes graphics cards muchharder than the average game. This bad boy uses real-time rendering offury objects undulating in front of groovy backgrounds to push yourgraphics card to its limits, complete with antialiasing and resolution options.Stick to the standard burn-in test, but keep an eye on HWMonitor and/soSpeedfan- FurMark gets your GPU very hot, very quickly. You won’t need torun FurMark for long. If your graphics card is going to crash or start tossingout funky visual artifacts, it will do so within 15 to 30 minutes.
Test Network Connection with Ping and PathPing
Pingis a tool that helps to verify IP-level
connectivity;PathPing is a tool that detectspacket loss over multiple-hop trips. Whentroubleshooting , the ping command isused to send an ICMP Echo Request to atarget host name or IP address. Use Ping whenever you want to verify that a hostcomputer can send IP packets to adestination host. You cam also use the Ping
tool to isolate network hardware problems and incompatible configurations.If you callipconfig/all and receive a response, there is no need to ping theloopback address anf your own IP address- IPconfig has already done so inorder to generate the report.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 59Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
60/198
It is best to verify that a route exists between the local computer and anetwork host by first using ping and the IP address of the network host to which you want to connect. The command syntax is:
ping
Perform the following steps when using Ping:
1.Ping the loopback address to verify that TCP/IP is installed andconfigured correctly on the local computer.ping 192.168.0.1If the loopback step fails, the IP stack is not responding. This might be
because the TCP drivers are corrupted, the network adapter might not be working, or another service is interfering with IP.
2.Ping the IP address of the local computer to verify that it was added tothe network correctly. Note that if the routing table is correct, thissimply forwards the packet to the loopback address of 192.168.0.1ping
3.Ping the IP address of the default gateway to verify that the defaultgateway is functioning and that you can communicate with a localhost on the local network.ping
4.Ping the IP address of a remote host to verify that you cancommunicate through a router.
ping
5.Ping the host name of a remote host to verify that you can resolve aremote host name.ping
6.Run a PathPing analysis to a remote host to verify that the routers onthe way to the destination are operating correctly.pathping
If your local address is returned as 169.254.y.z, you have been assigned anIP address by the Automatic Private IP addressing ( APIPA ) feature of
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 60Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
61/198
Windows 2000. This means that the local DHCP server is not configuredproperly or cannot be reached from your computer, and an IP address has been assigned automatically with a subnet mask of 255.255.0.0. Enable or
correct the DHCP server, restart the local computer, and see if thenetworking problem persists.
If your local address is returned as 0.0.0.0, the Microsoft MediaSensesoftware override started because the network adapter detects that it is notconnected to a network. To correct this problem, turn off MediaSense bymaking sure that the network adapter and network cable are connected to ahub. If the connection is solid, reinstall the network adapter’s drivers or anew network adapter.
Ping uses host name resolution to resolve a computer name to an IPaddress, so if pinging by address succeeds, but fails by name, then theproblem lies in host name resolution, not network connectivity. For moreinformation about troubleshooting host name resolution, see “ Unable toReach a Host or NetBIOS Name” .
If you cannot use Ping successfully at any point, check the following:
● The local computer’s IP address is valid and appears correctly in theIP
address tabof the Internet Protocol ( TCP/IP ) Properties dialog box or when using the Ipconfig tool.
● A default gateway is configured and the link between the host and thedefault gatway is operational. For troubleshooting purposes, makesure that only one default fateway is configured. While it is possible toconfigure more than one default gateway, gateways beyond the first areonly used if the IP stack determines that the original gateway is notfunctioning. Since the point of troubleshooting is to determine the
status of the first configured gateway, delete all others to simplify yourtroubleshooting.
Important:
If the remote system being pinged is across a high-delay link such as asatellite link, responses might take longer to be returned. The –w (wait)
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 61Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
62/198
switch can be used to specify a longer time-out. The following exampleshows a set of two pings, each 1450 bytes in size, that wait two seconds( 2000 milliseconds) for a response before timing out.
C:\> ping –w 2000 –n 2 –l 1450 172.16.48.10
Pinging 172.16.48.10 with 1450 bytes of data:
Reply from 172.16.48.10: bytes = 1450 time = 1452 ms TTL =32
Reply from 172.16.48.10: bytes= 1450 time =1452 ms TTL =32
Ping statistics for 172.16.48.10:
Packets: Sent= 2, Received = 2, Loss = 0 ( 0% Loss ),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 10ms, Average = 1664ms
Clear ARP Cache
If you can ping both the loopback address and your own IP address, the nextstep is to clear out the ARP cache and reload it. This can be done by usingthe ARP utility, first to display the cache entries witharp-aor arp-g.Deletethe entries witharp-d < IP address>.
Verify Default Gateway
Next, look at the default gateway. The gateway address must be on the samenetwork as the local host; if not, no messages from the host computer can beforwarded to any location outside the local network. Next, check to makesure that the default gateway address is correct as entered. Finally, check to
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 62Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
63/198
see that the default gateway is a router, not just a host, and that it isenabled to forward IP datagrams.
Ping Remote Host
If the default gateway responds correctly, ping a remote host to remove thatnetwork-to-network communications are operating as expected. If this fails,use Tracert to examine the path to the destination. For IP routers that are Windows NT or Windows 2000 computers. Use the route utility or theRouting and Remote access administrative toiol on those computers toexamine the IP routing table. For IP routes that are not Windows NT or Windows 2000 computers, use the appropriate utility or facility to examinethe IP routing table.
Four error messages are commonly returned by Ping duringtroubleshooting. They are:
► TTL Expired in Transit The number of hops required to reach the destination exceeds the TTL set by sending host to forward the packets. The default TTL value for ICMP
Echo requests sent by Ping is 32. In some cases, this is not enough totravel the required number of links to a destination. You can increase the TTL using the –i switch, up to a maximum of 255 links.
If increasing the TTL value fails to resolve the problem, the packets are being forwarded in a routing loop, a circular path among routers. Use Tracert to track down the source of the routing loop, which appears as arepeated series of the same IP addresses in the Tracert report. Next,make an appropriate change to the routing tables, or inform the
administrator of a remote router of the problem.
►Destination Host Unreachable This message indicates one of two problems: either the local system hasno route to the desired destination, or a remote router reports that it hasno route to the destination. The trwo problems can be distinguished bythe form of the message. If the message is simply “Destination HostUnreachable”, then there is no route from the local system, and the
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 63Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
64/198
packets to be sent were never put on the wire. Use the route utility tocheck the local routing table.
If the message is “ Reply from <IP address
>:n Destination HostUnreachable”, then the routing problem occurred at a remote router, whose address is indicated by the “” field. Use theappropriate utility or facility to check the IP routing table of the routerassigned the IP address of .If you ping using an IP address, retry it with a host name to ensure thatthe IP address you tried is correct.
►Request Timed Out This message indicates that no Echo Reply messages were received within the default time of 1 second. This can be due to many differentcauses; the most common include network congestion, failure of the ARPrequest, packet filtering, routing error, or a silent discard. Most often, itmeans that a route back to the sending host has failed. This might be because the destination host does not know the route back to the ost’ssending host, or one of the intermediary, routers does not know the route back, or even that the destination host’s default gateway does not knowthe route back.
Check the routing table of the destination host to see whatever it has aroute to the sending host before checking tables at the routers.
If the remote routing tables are correct and contain a valid route back tothe sending host, to see if the ARP cache lacks the proper address, usethearp-acommand to print the contents of the ARP cache. Also, checkthe subnet mask to be sure that a remote address has not beeninterpreted as local.
Next, use Tracert to follow the route to the destination. While Tracertdoes not record the address of the last hop or the path that the packetfollowed on the return path, it might show that the packet made it to thedestination. If this is the case, the problem is probably a routing issue onthe return path. If the trace doesn’t quite reach the destination, it might be because the target host is protected by a firewall. When a firewallprotects the destination, ICMP packet filtering prevents the ping packets
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 64Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
65/198
—or any other ICMP messages—from crossing the firewall and reachingtheir destination.
To check for network congestion, simply increase the allowed latency bysetting a higher wait time with the –w s witch, such as 5000 millisecond. Try to ping the destination again. If the request still times out, congestionis not the problem; an address resolution problem or routing error is amore likely issue.
►Unknown Host This error message indicates that the requested host name cannot beresolved to its IP address; check that the name is entered correctly amdthat DNS servers can resolve it.
Self-Check 3.2-2
INSTRUCTION: Read the following questions and answer it on theanswer sheet
1.Why do we need to test a computer?
2.How to test a RAM?
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 65Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
66/198
3.How to test a CPU?
Answer Key 3.2-2
1.Why do we need to test a computer?
Answer: (Answer may vary)
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 66Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
67/198
To find faults and problems and to see if the computer is stableproperly working.
2.How to test a RAM?
Answer:
1.Get memtest2.Create memtest bootable madia3.Run memtest
3.How to test a CPU?
Answer:
1.get a CPU stress application (like Prime95, intelburn,orthos)2. run test (for at least”4hrs”)
If your computer crashes and the test fails your CPU is not stable andmay need replacement.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 67Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
68/198
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 68Developed by:
Jesus N. Abalo, MBARevision # __
TASK SHEET 3.2-2
Title : Test Normal Function of System and Networks
Performance Objective: Given the necessary tools & equipment,computer systems, materials, you should be ableto test the normal function of systems andnetworks.
Supplies/Materials : Paper
: Pen
: Manual
Equipment : Computer units
Steps/Procedure:
1.Obtain a computer unit from the computer lab and set up a
workstation2. Run a RAM Test
3.Run a CPU Test
4. Run a Network connection test
Assessment Method:
● Demonstration / Oral questioning
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
69/198
Performance Criteria Checklist
CRITERIA
Did you…. YES NO
1.Check the RAM specifications correctly?
2.Check if the Network peripherals are properly usedaccording to industry standard?
3.Check if the Network Connection test successfullyrun and correct?
4.Check the RAM test successfully run and correct?
5.Check if the CPU test successfully run andcorrect?
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 69Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
70/198
Information Sheet 3.2-3Procedures in checking Faults or Problems
Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1.Diagnose fault problem in the systems and networks in line with thestandard operating procedures.
Procedures in checking faults or problems in the system:
Many people are faced with everyday computer problems that are easy tofix, but are unable to diagnose the actual problem. While there are manyproblems a computer will be faced with, this information sheet will tell you where to look for common problems.
Step 1:Check the POST. POST stands for Power On Self Test This is generally the first or second thing that appears on a computer afterturning on the power. This appears before the operating system begins toload. The POST will display any problems found with hardware that makesthe computer unable to boot, POST may also display problems with
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 70Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
71/198
hardware that allow the computer to boot but not operate at its full capacityduring operation.
Step 2:Notice the load time of the OS (operating system).
A longer than usual load time may indicate seek error (or other errors) in thehard drive.
Step 3:Notice any the graphics problems once the OS loaded
Reduce graphics may indicate driver failures or hardware failures withgraphics card.
Step 4:Perform an auditory test
An auditory test is an unorthodox, but still effective way of judging how harda computer is working. With the computer on and running, play anu decentlength audio file ( usually above 30 secs.). If the audio is choppy or slow, itusually means that the processor is working at an elevated level, or there isnot enough RAM to run all programs loading. Changing the startup sound isa great way to apply this test. Another issue associated with choppy sound is PIO ( ProgrammedInput/Output )mode. This affects how the drive reads and writes, and cansometimes repair choppy audio.
Step 5.Check any new installed Hardware
Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing problem, orhave a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, Clicking the system icon, clicking theHardware tab, and clicking on Device Manager. Use this to check andarrange the properties of hardware.
Step 6. Check any newly installed software
Software may require more resources than the system can provide. Chancesare that if a problem begins after software starts, the software is causing it,
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 71Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
72/198
if the problem appears directly upon start up, it may be caused by softwarethat starts automatically on boot.
Step 7.Check RAM and CPU consumption
A common problem is a choppy or sluggish system. If a system is choppy itis practice to see if a program is consuming more resources than thecomputer can provide. An easy way to check this is to use the Task Manager,right click on the task bar select task Manager, and click the Process Tab. The CPU column contains a number that indicates the percentage of CPUthe process is consuming. The Mem Usage column indicates how muchmemory a process is consuming.
Step 8. Listen to the computer
If the hard drive is scratching or making loud noises, shut off the computerand have a professional diagnose the hard drive. Listen to the CPU fan, thiscomes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity.
Step 9.Run a virus and malware scan
Performance problem can be caused by malware on the computer. Runninga virus scan can unearth any problems. Use a commonly updated virusscanner ( such as Norton Antivirus or Avast Antivirus) and a commonlyupdated malware scanner ( such as Spybot Search & Destroy )
Step 10.Check for the problem in safe mode As a latch ditch effort, check the problem in the safe mode. To enter safemode, tap F8 repeatedly during POST ( this works on most systems ). If theproblem persists in safe mode, it is a fair bet that the operating system itselfit to blame.
Procedures in checking faults or problems in the network:
There are a couple of basic commands to diagnose a network problem thatevery network admin needs to know.
Computer HardwareServicing NC II
Configure ComputerSystems and Networks
Date Developed: May 2014
Document No.Checked by: QCLBSDC
Page 72Developed by:
Jesus N. Abalo, MBARevision # __
8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum
73/198
You have an issue with a c
Top Related