meljun cortes trainers methodology 1 chs ncii example complete lyceum

Upload: meljun-cortes-mbampa

Post on 06-Jul-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    1/198

     TRAINERS METHODOLOGY 1

    Information and Communication Technology

    UNIT OF COMPETENCY :CONFIGURE COMPUTER SYSTEMS

      AND NETWORKS

    MODULE TITLE :CONFIGURING COMPUTER SYSTEMS

     AND NETWORKS

    Computer HardwareServicing NC II

    ConfigureComputer Systemsand Networks

    Date Developed:

     May 2014

    Document No.

    Checked by:

    QCLBSDC Page i of viiDeveloped by:

    MELJUN P. CORTES Revision #__

    COMPUTER HARDWARESERVICING NC II

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    2/198

    Plan

     Training

    Session

    Computer HardwareServicing NC II

    ConfigureComputer Systemsand Networks

    Date Developed:

     May 2014

    Document No.

    Checked by:

    QCLBSDC Page ii of viiDeveloped by:

    MELJUN P. CORTES Revision #__

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    3/198

    Data Gathering Instrument for Trainee’s Characteristics

    Please answer the following instrument according to the

    characteristics described below. Encircle the letter of your choice that bestdescribes you as a learner. Blank spaces are provided for some data thatneed your response.

    Characteristics of learners

    Language, literacyand numeracy(LL&N)

     Average grade in:

    English

    a.95 and above b.90 to 94

    c.85 to 89

    d.80 to 84

    a.75 to 79

     Average grade in:

    Math

    a.95 and above b.90 to 94

    c.85 to 89

    d.80 to 84

    e.75 to 79

    Cultural andlanguage

     background

    Ethnicity/culture:

    a.Ifugao

     b.Igorot

    c.Ibanag

    d.Gaddang

    e.Muslim

    f.Ibaloy

    g.Others( please specify)Tagalog

    Education &generalknowledge

    Highest Educational Attainment:a.High School Level

     b.High School Graduate

    c.College Level

    d.College Graduate

    e.with units in Master’s degree

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 3 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    4/198

    Characteristics of learners

    f.Masteral Graduate

    g.With units in Doctoral Level

    h.Doctoral Graduate

    Sex a.Male

     b.Female

     Age Your age: __48___

    Physical ability 1.Disabilities(if any) none2.Existing Health Conditions (Existing illness ifany)

    a.None b.Asthmac.Heart diseased.Anemiae.Hypertensionf.Diabetesg.Others(please specify) none

    Previous

    experience withthe topic

    CHS Certificates

    a.CHS NC II Graduate b.CHS NC II Certifiedc.CHS Trainer / Lecturerd.CHS Lead Trainer/ Resource PersonNumber of years as a competency trainer 13

    Previous learningexperience

    List down trainings related to CHSa.LabSim for Networking & Troubleshooting b.Consumer Electronics Servicingc. Electronics Computer Technician

     d. Others (please specify ) ______________

     Training Levelcompleted

    National Certificates acquired and NC levela.Instrumentation & Control Servicing NC II b.Computer Hardware Servicing NC IIc.Consumer Electronics Servicing NC IId.Others (please specify) _____________

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 4 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    5/198

    Characteristics of learners

    Special courses Other courses related to CHS

    a. BS in Computer Science b.Master in Business Administration

    c.92 units of BS Electrical Engineering

    d.Others(please specify) Registered MasterElectrician ( RME )

    Learning styles a.Visual - The visual learner takes mentalpictures of information given, so in order for

    this kind of learner to retain information, oralor written, presentations of new informationmust contain diagrams and drawings,preferably in color. The visual learner can'tconcentrate with a lot of activity around himand will focus better and learn faster in a quietstudy environment.

     b.Kinesthetic - described as the students in theclassroom, who have problems sitting still and

     who often bounce their legs while tapping theirfingers on the desks. They are often referred toas hyperactive students with concentrationissues.

    c.Auditory- a learner who has the ability toremember speeches and lectures in detail buthas a hard time with written text. Having toread long texts is pointless and will not beretained by the auditory learner unless it is

    read aloud.d.Activist - Learns by having a go

    e.Reflector - Learns most from activities wherethey can watch, listen and then review whathas happened.

    f.Theorist - Learns most when ideas are linked

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 5 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    6/198

    Characteristics of learners

    to existing theories and concepts.

    g.Pragmatist - Learns most from learningactivities that are directly relevant totheirsituation.

    Other needs a.Financially challenged b.Working studentc.Solo parentd.Others(please specify)___________________________

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 6 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    7/198

    COMPUTER HARDWARE SERVICING NC II

    SELF-ASSESSMENT CHECK

    INSTRUCTIONS: This Self-Check Instrument will give the trainer necessarydata or information which is essential in planning trainingsessions. Please check the appropriate box of your answerto the questions below.

    CORE COMPETENCIES

    CAN I…?  YES NO

    1.INSTALL COMPUTER SYSTEMS AND NETWORKS

    1.1 Plan and prepare for installation √

    1.2 Install equipment / device / system √

    1.3 Conduct test √

    2. DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEMS

     2.1 Plan and prepare for diagnosis of faults of computersystems

     √

      2.2 Diagnose faults of computer systems √

    2.3 Rectify/correct defects in computer systems andnetworks

     √

    2.4 Test systems and networks √

    3.CONFIGURE COMPUTER SYSTEMS AND NETWORKS

    3.1 Plan and prepare for configuration √

    3.2 Configure computer systems and networks √

    3.3 Inspect and test configured computer systems andnetworks  √

    4.MAINTAIN COMPUTER SYSTEMS AND NETWORKS

    4.1 Plan and prepare for maintenance √

    4.2 Maintain computer systems and networks √

     4.3 Inspect and test the computer systems and networks √

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 7 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    8/198

    FORM 1.1 SELF-ASSESSMENT CHECK

    INSTRUCTIONS: This Self-Assessment Check Instrument will give thetrainer necessary data or information which is essential in

    planning training sessions. Please check the appropriate box of your answer to the questions below.

    CORE COMPETENCIES

    CAN I…?  YES NO

    5.  

    6.  

    7.

    8.

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 8 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    9/198

    CORE COMPETENCIES

    CAN I…?  YES NO

    9.

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 9 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    10/198

    Evidence of Current Competencies acquired related to Job/Occupation

    Current

    competencies Proof/Evidence Means of validating

     ● Install Computer Systems and Networks

    Plan andprepare forinstallation

     Training Certificates

    Certificate of Employment

     TOR

    Pictures

     Video

    Submitted requiredcertificate

     Authenticate certificate

    Investigate

     Third party testimony

    Oral Questioning

     Written Examination

    Practical Demonstration

    Investigate pictures

     Testimonial

    Submitted result ofdiagnostic assessment

     Watch Video

    Investigate video

    Oral Questioning

     ● Diagnose Computer systems and Networks

    Plan andprepare fordiagnosis offaults ofcomputersystems

     Training certificate

    Certificate of Employment

     TOR

    Submitted requiredcertificate

     Authenticate certificate

    Investigate

     Third Party Testimony

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 10 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    11/198

    Pictures

     Video

    Report from CBT Facilitator

    Oral Questioning

    Investigate pictures

     Testimonial

    Submitted result ofdiagnostic assessment

     Watch Video

    Investigate video

     Third Party Testimony

    Oral Questioning

    Practical Demonstration

     ● Configure Computer Systems and Networks

    Plan andprepare forconfiguration

     Training certificate

    Certificate of Employment

     TOR

    Pictures

    Submitted requiredcertificate

     Authenticate certificate

    Investigate

     Third Party Testimony

    Report from CBT FacilitatorOral Questioning

     Investigate pictures

     Testimonial

    Submitted result ofdiagnostic assessment

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 11 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    12/198

     Video Watch Video

    Investigate video

     Third Party Testimony

    Oral Questioning

    Practical Demonstration

     ● Maintain Computer Systems and Networks

    Plan andprepare formaintenance

     Training certificateCertificate of Employment

     TOR

    Pictures

     Video

    Submitted requiredcertificate

     Authenticate certificate

    Investigate

     Third Party Testimony

    Report from CBT Facilitator

    Oral Questioning

    Investigate pictures

     Testimonial

    Submitted result ofdiagnostic assessment

     Watch Video

    Investigate video Third Party Testimony

    Oral Questioning

    Practical Demonstration

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 12 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    13/198

    Evidences/Proof of Current Competencies(Sample)

    Form 1.2: Evidence of Current Competencies acquired related to

    Job/Occupation

    Currentcompetencies

    Proof/Evidence Means of validating

     

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 13 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    14/198

    Summary of Current Competencies Versus Required Competencies

    Required Units ofCompetency/LearningOutcomes based on CBC

    CurrentCompetencies

     TrainingGaps/Requirements

    1. INSTALL COMPUTER SYSTEMS AND NETWORKS

    1.1Plan and prepare forinstallation

    1.1 Plan and preparefor installation

    1.2 Install equipment /device / system

    1.2. Install equipment/ device / system

    1.3 Conduct test 1.3 Conduct test

    2. DIAGNOSE AND TROUBLESHOOT COMPUTER SYSTEMS

    2.1 Plan and prepare fordiagnosis of faults of

    2.1.Plan and preparefor diagnosis of

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 14 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    15/198

    computer systems faults of computersystems

    2.2 Diagnose faults of

    computer systems

    2.2.Diagnose faults of

    computer systems2.3 Rectify/correct defects

    in computer systemsand networks

    2.3.Rectify/correctdefects incomputer systemsand networks

    2.4 Test systems andnetworks

    2.4.Test systems andnetworks

    3.CONFIGURE COMPUTER SYSTEMS AND NETWORKS

    3.1 Plan and prepare forconfiguration

    3.1.Plan and preparefor configuration

    3.2 Configure computer

    systems and networks

    3.2.Configure

    computer systems andnetworks

    3.3 Inspect and testconfigured computersystems and networks

    3.3.Inspect and testconfiguredcomputer systemsand networks

    4.MAINTAIN COMPUTER SYSTEMS AND NETWORKS

    4.1 Plan and prepare formaintenance

    4.1. Plan and preparefor maintenance

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 15 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    16/198

    4.2 Maintain computersystems andnetworks

    4.2.Maintaincomputer systemsand networks

    4.3 Inspect and test thecomputer systemsand networks

    4.3. Inspect and testthe computersystems andnetworks

    Identifying Training Gaps

    From the accomplished Self-Assessment Check (Form 1.1) and the

    evidences of current competencies (Form 1.2), the Trainer will be able toidentify what the training needs of the prospective trainee are.

    Form 1.3 Summary of Current Competencies Versus RequiredCompetencies (Sample)

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 16 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    17/198

    Required Units ofCompetency/LearningOutcomes based on CBC

    CurrentCompetencies

     TrainingGaps/Requirements

    1.

    Required Units ofCompetency/LearningOutcomes based on CBC

    CurrentCompetencies

     TrainingGaps/Requirements

    2.

    3.

    4.

     Training Needs

     Training Needs Module Title/Module of

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 17 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    18/198

    (Learning Outcomes) Instruction

    Install equipment / device / system 1.INSTALLING COMPUTERSYSTEMS AND NETWORKSConduct test

    Diagnose faults of computer systems 2.DIAGNOSING AND TROUBLESHOOTING

    COMPUTER SYSTEMS

    Rectify/correct defects in computersystems and networks

    Configure computer systems andnetworks

    3.CONFIGURING COMPUTERSYSTEMS AND NETWORKS

    Inspect and test configuredcomputer systems and networks

    Maintain computer systems andnetworks

    5.MAINTAINING COMPUTERSYSTEMS AND NETWORKS

    Inspect and test the computersystems and networks

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 18 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    19/198

    Using Form No.1.4, convert the Training Gaps into a Training Needs/Requirements. Refer to the CBC in identifying the Module Title or Unit of

    Competency of the training needs identified.

    Form No. 1.4: Training Needs (Sample)

     Training Needs

    (Learning Outcomes)

    Module Title/Module ofInstruction

    1.

    2.

    3.

    4.

    8.

    ComputerHardware Servicing

    NC II

    ConfigureComputer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 19 of viiDeveloped by:

     Jesus N. Abalo, MBARevision# __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    20/198

    SESSION PLAN

    Sector : Information and Communication Technology (ICT)

    Qualification Title : Computer Hardware Servicing NC 11 

    Unit of Competency : Configure Computer Systems and Networks 

    Module Title :  Configuring Computer Systems and Networks

    Learning Outcomes:

    LO1. Plan and prepare for configuration

      LO2. Configure computer systems and networks

    LO3. Inspect and test configured computer systems and networks

    B. INTRODUCTION

     This module covers the knowledge, skills and attitudes needed to configure computer systems and networksand required to provide as Computer Technician. It reflects the role as technical support provider and SystemNetwork Administrator.

    B. LEARNING ACTIVITIES

    LO 1: Plan and Prepare for configuration (30 Hrs)

    LearningContent

    Methods Presentation Practice Feedback Resources Time

    1.Inspecting work

    • Modular/Self-

    •Read information3.1-1 on

    • Answer

    self check 3.1-1

    ●Compare toModel Answer to

    ●InformationSheet 3.1-1

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 20Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    21/198

    instructionsaccording to

     jobrequirements.

    pacedlearning

     ActiveLecture

    Inspecting workinstructionsaccording to jobrequirements

     ● Participate in thegroup discussion onInspecting workinstructionsaccording to jobrequirements

    onInspectingthe workinstructionsaccordingto job

    Self check 3.1-1

    ●Have thetrainer evaluatethe answer

    ●Self-Check 3.1-1Self-Check 3.1-1●Model Answer toSelf-check 3.1-1

    4

    2.Planning andpreparing ofstandardoperatingprocedures

    ●Modular/ Self-pacedlearning

    ● ActiveLecture

     ● Read InformationSheet 3.1-2 onPlanning andpreparing of standardoperating procedures

    ●Participate in the

    group discussion onPlanning andpreparing of standardoperating procedures

    ● AnswerSelf-check3.1-2on Planningandpreparingstandard

    operatingprocedures.

     ● Compare toModel answer toSelf-check 3.1-2

    ●Have the

    trainer evaluatethe answer

     ● InformationSheet 3.1-2 ● Self-check 3.1-2

    ● Model answer

    to Self-check3.1-2 ● Power pointpresentation

    ●Questionnaire

    4

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 21Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    22/198

    3.OccupationalHealth andSafety

    ●Modular/ Self-pacedlearning

    ● ActiveLecture

    ●Demonstration

     ● Read InformationSheet 3.1-3 onOccupational Healthand Safety

     ● Participate in thegroup discussion onOccupational Healthand safety

    ●Observe thedemonstration onOccupational Healthand Safety

     ●  AnswerSelf-check3.1-3 onOHS

    ●Perform TaskSheet3.1-3

     ● Compare toModel Answer toself-check3.1-3

    ●Have thetrainer evaluatethe answer

     ● Evaluate theperformance

     based on theperformancecriteria

    checklist●Have thetrainer evaluatethe performance

     ● InformationSheet 3.1-3 ● Self-check 3.1-3

     ● Model answerto Self-check3.1-3 ● Power pointpresentation ● Questionnaire

     ● Task Sheet 3.1-3 ● PerformanceCriteriachecklist

    6

     

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 22Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    23/198

    4.ConfigureComputerSystems andNetworks

    ●Modular/ Self-pacedlearning

    ●Demonstration

    ●Read Informationsheet 3.1-4 onConfigure Computer

    ●Observe thedemonstration onConfigureComputer SystemsandNetworks

    ● AnswerSelf-check3.1-4 onconfigurecomputersystems andnetworks

    ●Perform TaskSheet3.1-

     ● Compare toModel Answer toself-check3.1-4

    ●Evaluate theperformance

     based on theperformancecriteriachecklist

    ●Have thetrainer evaluatethe performance

     ● InformationSheet 3.1-4 ● Self-check 3.1-4

    ● Task Sheet 3.1-4 ● PerformanceCriteriachecklist

    12

    5.Procedures inusing thetools andequipment

    ●Modular/Self-pacedlearning

     ● Read Informationsheet 3.1-5 onprocedures in usingthe tools andequipment

    ● AnswerSelf-check3.1-5 onproceduresin using the

     ● Compare toModel Answer toself-check3.1-5

     ● InformationSheet 3.1-5 ● Self-check3.1-5

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 23Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    24/198

     ● Lecture

    ●Demonstration

     ● Participate in thegroup discussion inusing the tools andequipment

    ●Observe thedemonstration onProcedures in usingthe tools andequipment

    tools andequipment

    ●Perform TaskSheet3.1-5

    ●Have thetrainer evaluatethe answer

    ●Evaluate theperformance

     based on theperformancecriteriachecklist

    ●Have thetrainer evaluate

    the performance

     ● Model answerto Self-check3.1-5 ● Power pointpresentation

     ● Questionnaire

     ● Task Sheet 3.1-5

     ● PerformanceCriteriachecklist

     4

    LO 2: Configure computer systems and networks ( 38 hrs)

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 24Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    25/198

    1.Occupational Healthand Safety

     ● Modular/Self-pacedlearning

     ● Lecture

    ●Demonstration

     ● Read InformationSheet 3.2-1 onOccupationalHealth and Safety

     ● Participate in thegroup discussion on

    OccupationalHealth and Safety

    ●Observe thedemonstration onOccupationalHealth and Safety

    ● AnswerSelf-check3.2-1 onOccupationalHeath &safety.

    ●Perform Task Sheet3.2-1

    ●Compare toModel Answer toself-check 3.2-1

    ●Have the trainerevaluate theanswer

    ●Evaluate theperformance

     based on theperformanceHave the trainer●

    evaluate theperformance

    criteria checklist

     ● InformationSheet 3.2-1 ● Self-check3.2-1

     ● Modelanswer to

    Self-check3.2-1 ● Power pointpresentation

    ●Questionnaire

     ● Task Sheet3.2-1 ●Performanc

    e Criteriachecklist

    8

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 25Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    26/198

    2. TestingNormalFunction ofsystemsandNetworks

     ● Modular/Self-pacedlearning

    ●Demonstration

     ● Read InformationSheet 3.2-2 on

     Testing NormalFunctions ofsystems andNetworks

    ●Observe thedemonstration ontesting normalfunctions ofsystems andnetworks

    ● AnswerSelf-check3.2-2 ontestingnormalfunction ofsystems and

    networks

    ●Perform Task Sheet3.2-2

    ●Compare toModel Answer toself-check 3.2-2

    ●Evaluate theperformance

     based on theperformancecriteria checklist

    ●Have the trainerevaluate theperformance

     ● InformationSheet 3.2-1 ● Self-check3.2-1 ● Modelanswer to

     Self-check3.2-

    1

     ● Task Sheet3.2-2 ● PerformanceCriteriachecklist

    8

    3.Procedures

    in checkingthe faults orproblems

     ● Modular/

    Self-pacedlearning

     ● Read Information

    Sheet 3.2-3 onProcedures inchecking the faultsor problems

    ● Answer

    Self-check3.2-3 onprocedures incheckingfaults or

    ●Compare to

    Model Answer toself-check 3.2-3

     ● Information

    Sheet 3.2-3 ● Self-check3.2-3

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 26Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    27/198

     ● Lecture

    ●Demonstration

     ● Participate in thegroup discussion onprocedures inchecking the faultsor problems

    ●Observe thedemonstration onProcedures inchecking the faultsor problems

    problems

     

    ●Perform Task Sheet3.2-3

    ●Have the trainerevaluate theanswer

    ●Evaluate theperformance

     based on theperformancecriteria checklist

    ●Have the trainerevaluate theperformance

     ● Modelanswer to Self-check3.2-3 ● Power pointpresentation●Questionnair

    e

     ● Task Sheet3.2-3 ●Performance Criteriachecklist

    12

    4.Procedures

    in configureSystems andNetworks

    ●Modular/

    Self-pacedlearning

     ● Read Information

    Sheet 3.2-3 onProcedures inConfigure Systemsand Networks

    ● Answer

    Self-check3.2-4 onprocedures inconfiguresystems and

    ●Compare to

    Model Answer toself-check 3.2-4

     ● Information

    Sheet 3.2-4 ● Self-check3.2-4 ● Modelanswer to

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 27Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    28/198

    ●Demonstration

    ●Observe thedemonstration onProcedures inConfigure Systems

    and Networks

    networks

    ●Perform Task Sheet3.2-4

    ●Evaluate theperformance

     based on theperformancecriteriachecklist

    ●Have the trainerevaluate theperformance

    Self-check3.2-4

     ● Task Sheet3.2-4 ● PerformanceCriteria

    checklist

    10

    LO 3.Inspect and test configured computer systems and networks ( 32 hrs.)

    1.Occupational Health andsafety

    ●Modular/Self-pacedlearning

    ●Demonstration

    ●Refer toInformation Sheet3.3-1 onOccupationalHealth and Safety

    ●Observe thedemonstration onOccupational

    ● AnswerSelf-check3.3-1 onoccupationalhealth and

    safety●Perform

     Task Sheet3.3-1

    ●Compare toModel Answer toself-check 3.3-1

    ●Evaluate theperformance

     based on the

     ● InformationSheet 3.3-1 ● Self-check3.3-1

     ● Task Sheet3.3-1

     ● Performance

    10

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 28Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    29/198

    Health and Safety performancecriteria checklist

    ●Have the trainerevaluate theperformance

    Criteriachecklist

    2.Inspection of

    systems

    ●Modular/

    Self-pacedlearning

    ●Demonstration

    ●Refer to

    Information Sheet3.3-2 on Inspectingof systems

    ●Observe thedemonstration onInspecting ofsystems

    ● Answer

    Self-check3.3-2 oninspection ofsystems

    ●Perform Task Sheet3.3-2

    ●Compare to

    Model Answer toself-check 3.3-2

    ●Evaluate theperformance

     based on theperformancecriteria checklist

    ●Have the trainerevaluate theperformance

     ● Information

    Sheet 3.3-2 ● Self-check3.3-2 ● Modelanswer toSelf-check3.3-2

     ● Task Sheet3.3-2 ● PerformanceCriteriachecklist

    12

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 29Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    30/198

    3.Makingdocuments andReport

    ●Modular/Self-pacedlearning

    ●Demonstration

     ● Read InformationSheet 3.3-3 onMaking documentsand reports

    ●Observe theInstructor

     ● Answer Self-check 3.3-3 onmakingdocuments andreport

    ●Perform TaskSheet 3.3-3

    ●Compare toModel Answer toself-check 3.3-3

    ●Evaluate theperformance based on theperformancecriteria checklist

    ●Have the trainerevaluate theperformance

     ● InformationSheet 3.3-3 ● Self-check3.3-3 ● Model answerto Self-check3.3-3

     ● Task Sheet3.3-3 ● PerformanceCriteriachecklist

    10

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 30Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    31/198

    C.ASSESSMENT PLAN

    1. Tools, materials and equipment needed.

      Tools Materials & Supplies Equipment PPE

      Set of Pliers OHS P0licies / Manuals 1 Server/Peripherals Anti-static wrist Strap

      Set of Screwdrivers Wires & cables/ OSSoftware 1 !es"top P#

    2. Venue of Assessment :  Institutional Assessment/ Practical Work Area3. Type of Assessment : Written, Oral uestionin! an" #emonstration

    $. Type of %&i"ence :'or Written Test

      ▪ Inspecting work instructions according to job requirements

      ▪ Planning and preparing of standard operating procedures  ▪ Procedures in using the tools and equipment  ▪ Occupational Health and safety  ▪ Procedures in checking the faults and problems  ▪ Procedures in configure systems and networks  ▪ Making documents and reports

      'or #emonstration on

      $ Plannin% and preparin% of standard operatin% procedures

      ▪ Occupational Health and Safety

      ▪ Procedures in using the tools and equipment  ▪ Configuring systems and networks  ▪ Testing normal functions of systems and networks  ▪ Procedures in checking the faults and problems  ▪ Procedures in configure systems and networks  ▪ Inspection of systems and networks with manuals

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 31Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    32/198

    D.TEACHER’S SELF-REFLECTION OF THE SESSION

     At the end of the session , evaluate the result of the performance of the trainees, if the result is not good thenask the trainees what are the problems they encountered? What part is difficult for them to perform? So thatthe trainees can suggest what intervention the trainer can do to help them better understand and guide them

    to improve their efficiency and effectiveness in their performance.

    Other trainees have to practice more on how to terminate UTP cable to RJ-45 effectively. The methods workedsuccessfully and effectively to the trainees even if most of them were high school graduate.

    Computer Hardware ServicingNC II

    Configure Computer Systemsand Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC Page 32Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    33/198

    COMPETENCY-BASEDLEARNING MATERIAL

    Sector:

    Information and Communication TechnologyQualification:

    Computer Hardware Servicing NC-IIUnit of Competency:

    Configure Computer Systems and NetworksModule Title:

    Configuring Computer Systems andNetworks

    L Y C E U M O F A L A B A N G

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 33Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    34/198

    Km 30 National Road, Tunasan Muntinlupa City

    HOW TO USE THIS COMPETENCY-BASED LEARNING

    MATERIAL Welcome to the Module“Configuring Computer Hardware a”. This

    module contains training materials and activities for you to complete.

     The unit of competency “Configure Computer Systems andNetworks” contains knowledge, skills and attitudes required for aComputerHardware Servicing NC IIcourse.

     You are required to go through a series of learning activities in orderto complete each of the learning outcomes of the module. In each learningoutcome there areInformation Sheets, Operation Sheets, and ActivitySheets. Follow these activities on your own and answer the Self-Check atthe end of each learning activity.

    If you have questions, don’t hesitate to ask your trainer for assistance.

    Remember to:

    • Read information sheets and complete the self-check. Suggestedreferences are included to supplement the materials provided in thismodule.

    • Perform the Task Sheets and Job Sheets until you are confident that your outputs conform to the Performance Criteria Checklist thatfollows the sheets.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 34Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    35/198

    Module ContentModule Content

    Learning Outcome Summary

    Learning Experiences

    Information Sheet

    Self Check

    Self Check Answer Key

    Operation/Task/Job Sheet

    Performance Criteria Checklist

    References/Further Reading

    • Submit outputs of the Task Sheet and Job Sheets to your facilitatorfor evaluation and recording in the Accomplishment Chart. Outputsshall serve as your portfolio during the Institutional Competency

    Evaluation. When you feel confident that you have had sufficientpractice, ask your trainer to evaluate you. The results of yourassessment will be recorded in your Progress Chart and

     Accomplishment Chart.

    Recognition of Prior Learning (RPL)

     You may already have some of the knowledge and skills covered in thismodule because you have:

    • Been working for some time• Already have completed training in this area.

     You need to complete this module before you perform the module onMaintain and Repair Computer Systems and Networks .

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 35Developed by:

     Jesus N. Abalo, MBARevision # __

      -

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    36/198

    Module Content

    Module Content

    Module Content

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 36Developed by:

     Jesus N. Abalo, MBARevision # __

    List of Competencies

    Front Page

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    37/198

    Computer Hardware Servicing NC II

    COMPETENCY-BASED LEARNING MATERIALS

    List of Competencies

    No. Unit of Competency Module Title Code

    CORE COMPETENCIES

    1.Install computersystems and networks

    Installing computer systemsand networks ELC724318

    2.Diagnose andtroubleshoot computersystems

    Diagnosing andtroubleshooting computersystem

    ELC724319

    3.Configure computer

    systems and networks

    Configuring computer

    systems and networks

    ELC724320

    4.Maintain computersystems and networks

    Maintaining computersystems and networks

    ELC724321

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 37Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    38/198

    MODULE CONTENT

    UNIT OF COMPETENCY : Configure Computer Systems and Networks

    MODULE TITLE : Configuring Computer Systems and Networks

    MODULE DESCRIPTOR : This unit covers the knowledge, skills andattitudes needed to configure computer systemsand networks

    NOMINAL DURATION :100 hours

    LEARNING OUTCOMES :

    Upon completion of this module the students/ trainees MUST be able to:

    1. Plan and prepare for configuration

    2. Configure computer systems and networks

    3. Inspect and test configured computer systems and networks

     ASSESSMENT CRITERIA:

    • Configured computer systems and networks identified from the Job/Service Order or instructions.

    • Planned and prepared job requirements.• Followed OHS policies and procedures of job requirements.• Checked computer systems and networks configuration with specifiedrequirements.

    • Checked necessary tools, equipment materials• Appropriate Personal Protective Equipment are used and OHS policiesand procedures followed

    • Normal function of systems and networks checked in accordance withmanufacturer’s instructions

    • Fault or problem in the systems and networks diagnosed in line withthe standard operating procedures.

    • Computer systems and networks are checked to ensure safe operation.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 38Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    39/198

    • Final inspections are undertaken to ensure that the configurationdone on the systems and networks conforms with the manufacture’sinstruction/manual

    Computer systems and networks configured in line with the standardoperating procedures.• Report is prepared and completed according to company requirements.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 39Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    40/198

    CONDITIONS:

    Students/trainees must be provided with the following:

    • OH & S policies and procedures- OH & S policies- manuals

    • Computer systems and networks- 1 Server- Peripherals- 1 Desktop Computers

    • Materials- Wires and Cables

    - Appropriate Software- Computer Storage Media

    • Tools- Pliers- Philips screw driver

    • Equipment/testing devices- Computer

    • Personal protective equipment  Anti-static wrist wrap

     ASSESSMENT METHODS:

    • Hands-on application• Direct observation• Practical Demonstration /oral questioning

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 40Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    41/198

    LEARNING OUTCOME NO. 2.

    CONFIGURE COMPUTER SYSTEMS AND NETWORKS

    Contents:

    1.Occupational Health and Safety

    2. Testing normal function of systems and networks

    3. Procedures in checking the faults or problems

    4. Procedures in configure computer systems and networks

     Assessment Criteria

    1.Appropriate Personal Protective Equipment are used and OHS policiesand procedures followed

    2. Normal function of systems and networks checked in accordance withmanufacturer’s instructions.

    3. Fault or problem in the systems and networks diagnosed in line withthe standard operating procedures

    4. Computer systems and networks configured in line with the standardoperating procedures.

    Conditions

     The students /trainees must be provided with the following:

    • OH & S policies and procedures- OH & S policies- Manuals

    • Computer systems and networks- 1 Server

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 41Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    42/198

    - Peripherals- 1 Desktop Computers

    • Materials- Wires and Cables- Appropriate Software- Computer Storage Media

    • Tools- Pliers- Philips screw driver

    • Equipment/testing devices- Computer

    • Personal protective equipment

      Anti-static wrist wrap

     Assessment Method:

    • Hands-on application• Direct observation• Practical Demonstration /oral questioning

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 42Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    43/198

    Learning Experiences

    Learning Outcome 2

    CONFIGURE COMPUTER SYSTEMS AND NETWORKS 

    Learning Activities Special Instructions

    1. Read information 3.2-1 on OccupationalHealth and Safety 

    ●If you think that you are nowknowledgeable on the content ofthe information sheet, answer selfcheck provided in the module.

    ● Watch power point presentation onOccupational Health and Safety

    ● Watch power point presentation onOccupational Health and Safety

    • If you got almost 100% correctanswer in this self-check3.2-1, youcan now move to the next task. Ifnot review the information sheet

    and go over the self-check again.

    • Let your trainer evaluate youroutput based on theperformance criteria checklist ,3.2-1. If you got 100% correctanswer in this task, you cannow move on to the next task.

    If not review the informationsheet and go over the taskagain.

    ●If you think that you are nowknowledgeable on the content of

    2. Answer self check 3.2-1

    Compare answers with

    answer key 3.2-13.Observe the demonstration on

    Occupational Health and Safety

    4.Perform Task Sheet 3.2-1

    5.Have the trainer evaluate theperformance

    6.Evaluate the performance based onthe performance criteria checklist

    7.Read Information sheet 3.2-2 on Testing normal function of systemsand networks

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 43Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    44/198

    the information sheet, answer selfcheck provided in the module.

    •  The output of your practice ofthis Learning Outcome are thefollowing:

     ►  To know and follow theoccupational health and safety

    in configuring computersystems and networks

     ► To test the normal function ofsystems and networks

     ► To check faults or problems

     ► To configure computer systemsand networks

    8. Answer Self check 3.2-2

    Compare to Model Answer to SelfCheck 3.2-2

    9. Observe the demonstration on Testing normal function of systemsand networks

    10.Perform Task Sheet 3.2-2

    11.Have the trainer evaluate theperformance

    12. Evaluate the performance based onthe performance criteria checklist

    13.Read Information sheet 3.2-3 onProcedures in checking the faults or

    problems14. Answer Self check 3.2-3

    15.Compare to Model Answer to SelfCheck 3.2-3

    16. Watch Power Point Presentation onProcedures in checking the faults orproblems

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 44Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    45/198

    17.Observe the demonstration onProcedures in checking the faults orproblems

    18.Perform Task Sheet 3.2-3   ●Let your trainer check your outputin your operation sheet 3.2-3 If yougot 100% correct answers in thistask, you can now move on to thenext task. If not review theinformation sheet and go over thetask again.

    19.Have the trainer evaluate the

    performance20.Evaluate the performance based on

    the performance criteria checklist

    21.Read Information Sheet 3.2-4 onProcedures in Configure Computersystems and Networks

    22. Answer Self Check 3.2-4

    Compare to Model Answer to SelfCheck 3.2-4

    23. Watch Video on Procedures inConfigure Computer systems andNetworks

    24.Perform Task Sheet 3.2-4  After doing all activities of this

    25.Have the trainer evaluate theperformance

    LO, you are ready to proceed to

    the LO on Maintaining

    Computer Systems and26.Evaluate the performance based on

    Performance criteria checklistNetworks.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 45Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    46/198

    Information Sheet 3.2-1

    OHS Policies and Procedures

    Learning Objectives:

     After reading this INFORMATION SHEET, YOU MUST be able to:

    1.Identify the OHS policies and procedures;

    2.Familiarize OHS policies and procedures;

    3.Apply OHS policies and procedures;

    4.Appreciate the OHS policies and procedures

    Occupational health and safety (OHS) refers to the legislation, policies,procedures and activities that aim to protect the health, safety and welfare of allpeople at the workplace.

    Every worker has a right to healthy and safe work and to a workenvironment that enables them to live a socially and economically productive life.Safety practices should be learned early and always adhered to when working withany electrical device including personal computers and peripherals.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 46Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    47/198

    Personal safety while working with PC’s

    Here are some safety precautions to take before working with any computerhardware tasks:

    • Before doing anything, listen to your trainer’s instruction to preventaccidents or any unwanted events that may occur on your workplace.

    • Do not work on computer when you are wet because you might getelectrocuted.

    • Do not remove internal devices of the computer when it is turned on.

    • Be sure not to mix electronic components and water.

    • Avoid playing or running while inside the workplace.

    • Always wear personal protective equipment (PPE) like coverall, shoes withrubber sole, anti-static wrist strap, etc.

    • Ask for assistance from your trainer when it comes on dealing withcomputer devices.

    • Apply safety measure when handling tools and equipment to avoidcertain damages.

      The trainee is further expected to maintain good health, to be neat in personalappearance and to practice safe working habits at all time with appropriateequipment.

    Personal Protective Equipment

     You must wear/use something in order to protect yourself againstunexpected harm that may arise while performing certain tasks. Different jobsused different gadgets or suits to prevent unexpected harmful events that may hurtus. The equipment below may be used as PPE:

    Goggles – is used to prevent tiny particles from enteringour eyes. A form of protective eyewear used to protectthe area surrounding the eye to prevent particulatesfrom striking the eyes.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 47Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    48/198

    Coverall/apron- is worn by a person to prevent his body or clothesfrom any types of dirt.

    Gloves – are used in handling object without hurting yourhands. Protects and comfort hands against cold or heat,damage by friction, abrasion or chemicals, and disease; orin turn to provide a guard for what a bare hand should nottouch.

    Coverall with Dust mask  – is used to cover the mouth and nosefrom tiny particles when cleaning computer peripherals.

     The mask forms a sealed cover over the nose and mouth, butmay also cover the eyes and other vulnerable soft tissues of theface.

    Shoes with rubber sole and rubber mat  – are used to avoid usform slippery.

     Anti-static wrist strap / ESD Wrist Strap-Itabsorbs the static electricity of the material when

     being hold by the hands. An antistatic used to safelyground a person working on very sensitive electronicequipment, to prevent the buildup of static electricityon their body, which can result in Electro-StaticDischarge (ESD). It is used in the electronic industry

     by workers working on electronic devices which can bedamaged by ESD, and also sometime by people around explosives, toprevent electric sparks which set off an explosion.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 48Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    49/198

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 49Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    50/198

    Self- Check 3.2-1

    INSTRUCTION :Read the following questions and answer it on the Answer

    Sheet.

    1.Give at least 5 safety precautions when working on a computer.

    2.What does ESD mean?

    3.What tool do you use to prevent ESD or electrostatic discharge?

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 50Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    51/198

     ANSWER KEY 3.2-1

    1.Give at least 5 safety precautions when working on a computer.

     Answer:

    •  Do not work on computer when you are wet because you might getelectrocuted.

    • Do not remove internal devices of the computer when it is turned on.

    • Be sure not to mix electronic components and water.

    • Avoid playing or running while inside the workplace.

    • Always wear personal protective equipment (PPE) like coverall, shoes withrubber sole, anti-static wrist strap, etc.

    2.What does ESD mean?

     Answer:

      ● Electrostatic Discharge

    3.What tool do you use to prevent ESD or electrostatic discharge?

     Answer

      ● Anti-static Wrist Strap

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 51Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    52/198

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 52Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    53/198

    Information Sheet 3.2-2

     Testing Normal Function of Systems and Networks

    Learning Objectives:

     After reading this INFORMATION SHEET, YOU MUST be able to:

    1.Check normal function of systems and networks in accordance withmanufacturer’s instructions.

    Modern-day PCs are more reliable than ever before, but that doesn’t mean they’re infallible. Equipmentfailures will still happen, however rarely, and even the beefiest of computer components aren’t worth their weight in silicon if they aren’t dependable. Thankfully,the hot and heavy world of stress testing can help toidentify critical faults before your PC crashes out in

    the middle of a critical operation.

     Whenever you buy or build a PC, swap out a major component, or overclocka piece of hardware, it’s a good idea to stress-test ( or “burn in “) the freshgear, which is not the same as benchmarking your rig.

     Why stress-test? Simple: To ensure the reliability and stability of yoursystem. Even if a computer boots up and performs well under normalusage, fickle hardware can cause woes when you step up to heftier tasks,such as gaming or video editing. Stress-testing software places yourcomponents under an intense workload to simulate a worse-case scenario; Ifa component crashes, hangs, or otherwise fails a dedicated stress-test, thereis a good chance that it won’t be reliable under a heavy everyday loads. It’s best to uncover unstable components sooner rather than later, while they’restill under warranty.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 53Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    54/198

    Running stress-test can also let you know if you need additional cooling in your computer. If a graphics card or overclocked CPU consistently overheatsand shuts down during a stress test, it’s time to dump the stock cooler, add

    a few case fans, and possibly even consider liquid cooling.

     All that said, the actual process of stress testing isn’t terribly complicated,though it can be time consuming.

    Laying the groundwork.

    Here’s a look at HWMonitor and SpeedFan’s interfaces side-by-side.

    Before you start torturing your PC, you’re going to need a way to keep tabson its screaming. CPUID’s HWMonitor software does exactly that, providing you with a real-time glimpse of your components’ temperatures, voltages,and fan speeds. Speed fan does the same, though its interface isn’t quite aspolished as HWmonitors.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 54Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    55/198

     You’ll want to have at least one of the two programs open during stress tests. While many components will automatically shut down if they overheat, notall will, and you want to pull the plug on you testing if your hardware hits

    dangerous heat levels. You can fry your components if a worst-case scenariooccurs and you’re not paying attention. If you see CPU temperature startingto creep north 70 degrees Celsius, or graphics card temperatures around105̊C stop the test and add more cooling to your computer. You’ll also wantto halt your testing if temperatures continuously hover around those marksfor an extended period of time.

    Before you start your testing, I recommend closing any nonessentialprograms and diving into your system’s Power setting to prevent it fromgoing to sleep. You don’t want your computer to doze off while you’re busy

     burning it in. if you use a screensaver, disable that too.

     Testing the CPU with Prime95

    If you stress-test only a single component, stress-test your CPU. T’s thatimportant- and it’s frequently the culprit behind an unstable system.

    Prime 95 includes three different “ torture “ tests.

     While a handful of programs are available that can stress your CPU to itslimits, Prime95 has become thede factostandard. Ostensibly, designed to

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 55Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    56/198

    findMersenne prime numbers, the software absolutely hammers yourprocessor, to the point that the developers now include a dedicated “ Torture Test “ mode for peole who are interested in system stability than complex

    mathematics.

    Open the program, then head to options > Torture Test to bring up a list ofoptions. Many people use theBlend Test. Blend stresses both the CPU andRAM; if no errors pop up after four hours or so, you can consider it stablefor normal use. Alternatively, theSmall FFT andLarge FFT torture tests layoff the RAM a bit to subject the CPU to as much respective stress and heatas possible.

    If you have the time ( an adequate cooling ), feel free to “ Torture” your PC with Prime95 for juch, much longer, particularly if you plan to use yourcomputer for folding @home-type projects, which can consume a ton of CPUresources for extended periods. Prime95 sometimes catches CPU errors evebafter half a day of testing. If your rig can run Prime95’s Small FFT test for afull 24 hours without issue, the CPU is as solid as a rock and ready to fold.

    IntelBurn test is a nonofficial, user-friendly version of Intel’s brutal Linpack benchmark.

     Want a second opinion? Different programs test CPUs in different ways.Hardcore types also hold IntelBurnTest OCCT-two other CPU- stressingprograms in high regard. Both hit your processor- hard and ramptemperatures up very rapidly, however, so keep a close eye on your system-monitoring software when you start the.

    No matter what testing program you choose, run it for at least four hours; afull overnight run is preferable. Personally, I like to stress-test new PCsusing Prime95’s Blend and Small FFT tests for at least twelve hours a piece,

    and I sometimes follow it up with an hour-long,High or Very High stresslevel IntelBurnTest run.

     Testing the RAM

     When it comes to seriously testing RAM, only one option is worthconsidering : Memtest 86 +. This tried-and-true diagnostic software has been around seemingly forever, and while it definitely looks its age-

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 56Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    57/198

    Memtest86+ rocks an ugly BIOS-esque interface- the program is just aseffective now as it always has been.

     A bad memory module (RAM) can cause unpredictable behavior in a Windows system, including the dreaded blue screen of death. If you suspectthat your RAM may be faulty, you can run a memory test to confirm that you have a bad memory module.

    Laptop and desktop PC makers occasionally provide preinstalled utilitiesthat sometimes include a memory test. Feel free to try out these utilities,especially if your computer is under warranty and you want to make a warranty claim. Manufacturers will often require you to run their supportutilities first, before agreeing to replace hardware or more forward with a

    trouble ticket.

     We are going to use a widely-used memory testing application calledmemtest ( memtest86+). Reputable memory makers like, Corsair, PatriotMemory, Crucial, and others, recommend memtest to test their memoryproducts.

    1.Get memtest

     To use memtest, you have to download it and crearte the bootable mediafirst. You’ll need to decide whether you want to download the ISO image fileand create a CD/DVD or if you want to download the auto-installer for USBkeys to create a bootable USB flash drive.2.Create memtest bootable media

    If you want to create a memtest CD or DVD, unzip the download ISO anduse your favorite ISO-burning program to create the disc. In windows 7,simply right-click on the ISO file and select “ Burn disc image’, then follow

    the directions to create the disc.

    If you want to create a bootable memtest USB flash drive, run the auto-installer and follow the directions to create the drive. Just make sure that you use a blank flash drive; rthe installer will erase all the files on the drive.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 57Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    58/198

     

    3.Run memtest

     To run memtest, start your computer with the bootable media inserted andthe test will begin automatically. If you’re having problems booting themedia, make sure that the boot order in your system’s BIOS is set to bootthe optical driver or USB flash drive ahead of your hard drive.

    If you have more than one memory module, we recommend that you test onemodule at a time, using the same DIMM slot on your motherboard. This willhelp you isolate the problem module.

     The eight different tests in memtest can take several hours to complete,depending on the size of the RAM. A successful test will complete withoutany errors. A failed test will report errors in the error column and you’ll seelots of red blocks.

    If your RAM fails memtest, that should be enough for most companies toapprove a replacement. Keep in mind, however, that a failed memtest can

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 58Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    59/198

    also be an imdication of problems with your processor, motherboard, ormisconfigured RAM.

     Testing the Video card and Power Supply Unit . If you’re a gamer, stress testing your graphics card is a no-brainer,especially since graphics cards tend to fail under heavier loads- you know,like the other ones generated by top-end games. Another bonus: Graphictorture tests usually coax underpowered or faulty power supplies into givingup the ghost, so you’re stressing two birds with one stone.

    Benchmarking tools abound, but FurMark was designed specially to give

     your GPU a stress- nducing workout and punishes graphics cards muchharder than the average game. This bad boy uses real-time rendering offury objects undulating in front of groovy backgrounds to push yourgraphics card to its limits, complete with antialiasing and resolution options.Stick to the standard burn-in test, but keep an eye on HWMonitor and/soSpeedfan- FurMark gets your GPU very hot, very quickly. You won’t need torun FurMark for long. If your graphics card is going to crash or start tossingout funky visual artifacts, it will do so within 15 to 30 minutes.

     Test Network Connection with Ping and PathPing

     Pingis a tool that helps to verify IP-level

    connectivity;PathPing is a tool that detectspacket loss over multiple-hop trips. Whentroubleshooting , the ping command isused to send an ICMP Echo Request to atarget host name or IP address. Use Ping whenever you want to verify that a hostcomputer can send IP packets to adestination host. You cam also use the Ping

    tool to isolate network hardware problems and incompatible configurations.If you callipconfig/all and receive a response, there is no need to ping theloopback address anf your own IP address- IPconfig has already done so inorder to generate the report. 

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 59Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    60/198

    It is best to verify that a route exists between the local computer and anetwork host by first using ping and the IP address of the network host to which you want to connect. The command syntax is:

     ping

    Perform the following steps when using Ping:

    1.Ping the loopback address to verify that TCP/IP is installed andconfigured correctly on the local computer.ping 192.168.0.1If the loopback step fails, the IP stack is not responding. This might be

     because the TCP drivers are corrupted, the network adapter might not be working, or another service is interfering with IP.

    2.Ping the IP address of the local computer to verify that it was added tothe network correctly. Note that if the routing table is correct, thissimply forwards the packet to the loopback address of 192.168.0.1ping 

    3.Ping the IP address of the default gateway to verify that the defaultgateway is functioning and that you can communicate with a localhost on the local network.ping 

    4.Ping the IP address of a remote host to verify that you cancommunicate through a router.

      ping 

    5.Ping the host name of a remote host to verify that you can resolve aremote host name.ping 

    6.Run a PathPing analysis to a remote host to verify that the routers onthe way to the destination are operating correctly.pathping 

    If your local address is returned as 169.254.y.z, you have been assigned anIP address by the Automatic Private IP addressing ( APIPA ) feature of

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 60Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    61/198

     Windows 2000. This means that the local DHCP server is not configuredproperly or cannot be reached from your computer, and an IP address has been assigned automatically with a subnet mask of 255.255.0.0. Enable or

    correct the DHCP server, restart the local computer, and see if thenetworking problem persists.

    If your local address is returned as 0.0.0.0, the Microsoft MediaSensesoftware override started because the network adapter detects that it is notconnected to a network. To correct this problem, turn off MediaSense bymaking sure that the network adapter and network cable are connected to ahub. If the connection is solid, reinstall the network adapter’s drivers or anew network adapter.

    Ping uses host name resolution to resolve a computer name to an IPaddress, so if pinging by address succeeds, but fails by name, then theproblem lies in host name resolution, not network connectivity. For moreinformation about troubleshooting host name resolution, see “ Unable toReach a Host or NetBIOS Name” .

    If you cannot use Ping successfully at any point, check the following:

    ● The local computer’s IP address is valid and appears correctly in theIP

    address tabof the Internet Protocol ( TCP/IP ) Properties dialog box or when using the Ipconfig tool.

     ●  A default gateway is configured and the link between the host and thedefault gatway is operational. For troubleshooting purposes, makesure that only one default fateway is configured. While it is possible toconfigure more than one default gateway, gateways beyond the first areonly used if the IP stack determines that the original gateway is notfunctioning. Since the point of troubleshooting is to determine the

    status of the first configured gateway, delete all others to simplify yourtroubleshooting.

    Important:

    If the remote system being pinged is across a high-delay link such as asatellite link, responses might take longer to be returned. The –w (wait)

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 61Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    62/198

    switch can be used to specify a longer time-out. The following exampleshows a set of two pings, each 1450 bytes in size, that wait two seconds( 2000 milliseconds) for a response before timing out.

    C:\> ping –w 2000 –n 2 –l 1450 172.16.48.10

    Pinging 172.16.48.10 with 1450 bytes of data:

    Reply from 172.16.48.10: bytes = 1450 time = 1452 ms TTL =32

    Reply from 172.16.48.10: bytes= 1450 time =1452 ms TTL =32

    Ping statistics for 172.16.48.10:

    Packets: Sent= 2, Received = 2, Loss = 0 ( 0% Loss ),

     Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 10ms, Average = 1664ms

    Clear ARP Cache

    If you can ping both the loopback address and your own IP address, the nextstep is to clear out the ARP cache and reload it. This can be done by usingthe ARP utility, first to display the cache entries witharp-aor arp-g.Deletethe entries witharp-d < IP address>.

     Verify Default Gateway 

    Next, look at the default gateway. The gateway address must be on the samenetwork as the local host; if not, no messages from the host computer can beforwarded to any location outside the local network. Next, check to makesure that the default gateway address is correct as entered. Finally, check to

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 62Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    63/198

    see that the default gateway is a router, not just a host, and that it isenabled to forward IP datagrams.

    Ping Remote Host

    If the default gateway responds correctly, ping a remote host to remove thatnetwork-to-network communications are operating as expected. If this fails,use Tracert to examine the path to the destination. For IP routers that are Windows NT or Windows 2000 computers. Use the route utility or theRouting and Remote access administrative toiol on those computers toexamine the IP routing table. For IP routes that are not Windows NT or Windows 2000 computers, use the appropriate utility or facility to examinethe IP routing table.

    Four error messages are commonly returned by Ping duringtroubleshooting. They are:

    ► TTL Expired in Transit The number of hops required to reach the destination exceeds the TTL set by sending host to forward the packets. The default TTL value for ICMP

    Echo requests sent by Ping is 32. In some cases, this is not enough totravel the required number of links to a destination. You can increase the TTL using the –i switch, up to a maximum of 255 links.

     If increasing the TTL value fails to resolve the problem, the packets are being forwarded in a routing loop, a circular path among routers. Use Tracert to track down the source of the routing loop, which appears as arepeated series of the same IP addresses in the Tracert report. Next,make an appropriate change to the routing tables, or inform the

    administrator of a remote router of the problem.

    ►Destination Host Unreachable  This message indicates one of two problems: either the local system hasno route to the desired destination, or a remote router reports that it hasno route to the destination. The trwo problems can be distinguished bythe form of the message. If the message is simply “Destination HostUnreachable”, then there is no route from the local system, and the

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 63Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    64/198

    packets to be sent were never put on the wire. Use the route utility tocheck the local routing table.

    If the message is “ Reply from <IP address

    >:n Destination HostUnreachable”, then the routing problem occurred at a remote router, whose address is indicated by the “” field. Use theappropriate utility or facility to check the IP routing table of the routerassigned the IP address of .If you ping using an IP address, retry it with a host name to ensure thatthe IP address you tried is correct.

    ►Request Timed Out  This message indicates that no Echo Reply messages were received within the default time of 1 second. This can be due to many differentcauses; the most common include network congestion, failure of the ARPrequest, packet filtering, routing error, or a silent discard. Most often, itmeans that a route back to the sending host has failed. This might be because the destination host does not know the route back to the ost’ssending host, or one of the intermediary, routers does not know the route back, or even that the destination host’s default gateway does not knowthe route back.

     

    Check the routing table of the destination host to see whatever it has aroute to the sending host before checking tables at the routers.

    If the remote routing tables are correct and contain a valid route back tothe sending host, to see if the ARP cache lacks the proper address, usethearp-acommand to print the contents of the ARP cache. Also, checkthe subnet mask to be sure that a remote address has not beeninterpreted as local.

    Next, use Tracert to follow the route to the destination. While Tracertdoes not record the address of the last hop or the path that the packetfollowed on the return path, it might show that the packet made it to thedestination. If this is the case, the problem is probably a routing issue onthe return path. If the trace doesn’t quite reach the destination, it might be because the target host is protected by a firewall. When a firewallprotects the destination, ICMP packet filtering prevents the ping packets

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 64Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    65/198

     —or any other ICMP messages—from crossing the firewall and reachingtheir destination.

     To check for network congestion, simply increase the allowed latency bysetting a higher wait time with the –w s witch, such as 5000 millisecond. Try to ping the destination again. If the request still times out, congestionis not the problem; an address resolution problem or routing error is amore likely issue.

     ►Unknown Host This error message indicates that the requested host name cannot beresolved to its IP address; check that the name is entered correctly amdthat DNS servers can resolve it.

      Self-Check 3.2-2

    INSTRUCTION: Read the following questions and answer it on theanswer sheet

    1.Why do we need to test a computer?

    2.How to test a RAM?

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 65Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    66/198

    3.How to test a CPU?

     Answer Key 3.2-2

    1.Why do we need to test a computer?

     Answer: (Answer may vary)

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 66Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    67/198

     To find faults and problems and to see if the computer is stableproperly working.

    2.How to test a RAM?

     Answer:

    1.Get memtest2.Create memtest bootable madia3.Run memtest

     

    3.How to test a CPU?

     Answer:

    1.get a CPU stress application (like Prime95, intelburn,orthos)2. run test (for at least”4hrs”)

    If your computer crashes and the test fails your CPU is not stable andmay need replacement.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 67Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    68/198

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 68Developed by:

     Jesus N. Abalo, MBARevision # __

     TASK SHEET 3.2-2

     Title :  Test Normal Function of System and Networks

    Performance Objective: Given the necessary tools & equipment,computer systems, materials, you should be ableto test the normal function of systems andnetworks.

    Supplies/Materials : Paper

      : Pen

      : Manual

    Equipment : Computer units

     

    Steps/Procedure:

    1.Obtain a computer unit from the computer lab and set up a

     workstation2. Run a RAM Test

    3.Run a CPU Test

    4. Run a Network connection test

     Assessment Method:

    ● Demonstration / Oral questioning

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    69/198

    Performance Criteria Checklist

    CRITERIA

    Did you…. YES NO

    1.Check the RAM specifications correctly? 

    2.Check if the Network peripherals are properly usedaccording to industry standard?

    3.Check if the Network Connection test successfullyrun and correct?

    4.Check the RAM test successfully run and correct?

    5.Check if the CPU test successfully run andcorrect?

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 69Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    70/198

    Information Sheet 3.2-3Procedures in checking Faults or Problems

    Learning Objectives:

     After reading this INFORMATION SHEET, YOU MUST be able to:

    1.Diagnose fault problem in the systems and networks in line with thestandard operating procedures.

    Procedures in checking faults or problems in the system:

    Many people are faced with everyday computer problems that are easy tofix, but are unable to diagnose the actual problem. While there are manyproblems a computer will be faced with, this information sheet will tell you where to look for common problems.

     Step 1:Check the POST. POST stands for Power On Self Test This is generally the first or second thing that appears on a computer afterturning on the power. This appears before the operating system begins toload. The POST will display any problems found with hardware that makesthe computer unable to boot, POST may also display problems with

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 70Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    71/198

    hardware that allow the computer to boot but not operate at its full capacityduring operation.

    Step 2:Notice the load time of the OS (operating system).

     A longer than usual load time may indicate seek error (or other errors) in thehard drive.

    Step 3:Notice any the graphics problems once the OS loaded

    Reduce graphics may indicate driver failures or hardware failures withgraphics card.

    Step 4:Perform an auditory test

     An auditory test is an unorthodox, but still effective way of judging how harda computer is working. With the computer on and running, play anu decentlength audio file ( usually above 30 secs.). If the audio is choppy or slow, itusually means that the processor is working at an elevated level, or there isnot enough RAM to run all programs loading. Changing the startup sound isa great way to apply this test. Another issue associated with choppy sound is PIO ( ProgrammedInput/Output )mode. This affects how the drive reads and writes, and cansometimes repair choppy audio.

    Step 5.Check any new installed Hardware

    Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing problem, orhave a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, Clicking the system icon, clicking theHardware tab, and clicking on Device Manager. Use this to check andarrange the properties of hardware.

    Step 6. Check any newly installed software

    Software may require more resources than the system can provide. Chancesare that if a problem begins after software starts, the software is causing it,

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 71Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    72/198

    if the problem appears directly upon start up, it may be caused by softwarethat starts automatically on boot.

    Step 7.Check RAM and CPU consumption

     A common problem is a choppy or sluggish system. If a system is choppy itis practice to see if a program is consuming more resources than thecomputer can provide. An easy way to check this is to use the Task Manager,right click on the task bar select task Manager, and click the Process Tab. The CPU column contains a number that indicates the percentage of CPUthe process is consuming. The Mem Usage column indicates how muchmemory a process is consuming.

    Step 8. Listen to the computer

    If the hard drive is scratching or making loud noises, shut off the computerand have a professional diagnose the hard drive. Listen to the CPU fan, thiscomes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity.

    Step 9.Run a virus and malware scan 

    Performance problem can be caused by malware on the computer. Runninga virus scan can unearth any problems. Use a commonly updated virusscanner ( such as Norton Antivirus or Avast Antivirus) and a commonlyupdated malware scanner ( such as Spybot Search & Destroy )

    Step 10.Check for the problem in safe mode  As a latch ditch effort, check the problem in the safe mode. To enter safemode, tap F8 repeatedly during POST ( this works on most systems ). If theproblem persists in safe mode, it is a fair bet that the operating system itselfit to blame.

    Procedures in checking faults or problems in the network:

     There are a couple of basic commands to diagnose a network problem thatevery network admin needs to know.

    Computer HardwareServicing NC II

    Configure ComputerSystems and Networks

    Date Developed: May 2014

    Document No.Checked by: QCLBSDC

    Page 72Developed by:

     Jesus N. Abalo, MBARevision # __

  • 8/17/2019 MELJUN CORTES Trainers Methodology 1 Chs Ncii Example Complete Lyceum

    73/198

     You have an issue with a c