Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore CSSICT9Q4MODULE1

CSSICT9Q4MODULE1

Published by ODY LAVARIAS, 2021-06-01 09:11:18

Description: CSSICT9Q4MODULE1

Search

Read the Text Version

9 COMPUTER SYSTEM SERVICING (CSS) Quarter 4 –Module 1 Maintaining Computer and Network Systems (MN)

Table of Contents Introductory Message........................................................................................................................... ii Lesson 1 ................................................................................................................................................ 2 Test the configured computer systems and networks ........................................................................ 2 Lesson 2 .............................................................................................................................................. 15 Maintain computer systems and network .................................................................................. 15 Lesson 3 .............................................................................................................................................. 26 Test Systems and Networks ................................................................................................................ 26 Introductory Message For the facilitator: Welcome to the Computer System Servicing – Grade 9 Alternative Delivery Mode (ADM) Module on Maintaining Computer and Network Systems (MN) This module was collaboratively designed, developed and reviewed by the TLE Department Head and ICT Teachers to assist the facilitator in helping the learners meet the standards set by the K to 12 Curriculum while overcoming their personal, social, and economic constraints in schooling. This learning resource hopes to engage the learners into guided and independent learning activities at their own pace and time. Furthermore, this also aims to help learners acquire the needed 21st century skills while taking into consideration their needs and circumstances. In addition to the material in the main text, you will also see this box in the body of the module: Notes to the teacher/facilitator This contains helpful tips or strategies that will help you in guiding the learners. As a facilitator you are expected to orient the learners on how to use this module. You also need to keep track of the learners' progress while allowing them to manage their own learning. Furthermore, you are expected to encourage and assist the learners as they do the tasks included in the module. ii

For the learner: Welcome to the Computer System Servicing 1 – Grade 9 Alternative Delivery Mode (ADM) Module on Maintaining Computer and Network Systems (MN) This module was designed to provide you with informative and meaningful opportunities for guided and independent learning at your own pace and time. You will be enabled to process the contents of the learning resource while being an active learner. This module has the following parts and corresponding icons: What I Need to Know This will give you an idea of the skills or What I Know competencies you are expected to learn in the module. What’s In What’s New This part includes an activity that aims to What is It check what you already know about the What’s More lesson to take. If you get all the answers correct (100%), you may decide to skip this What I Have Learned module. What I Can Do Assessment This is a brief drill or review to help you link the current lesson with the previous one. In this portion, the new lesson will be introduced to you in various ways such as a story, a song, a poem, a problem opener, an activity or a situation. This section provides a brief discussion of the lesson. This aims to help you discover and understand new concepts and skills. This comprises activities for independent practice to solidify your understanding and skills of the topic. You may check the answers to the exercises using the Answer Key at the end of the module. This includes questions or blank sentence/paragraph to be filled in to process what you learned from the lesson. This section provides an activity which will help you transfer your new knowledge or skill into real life situations or concerns. This is a task which aims to evaluate your level of mastery in achieving the learning competency. iii

Additional Activities In this portion, another activity will be given Answer Key to you to enrich your knowledge or skill of the lesson learned. This also tends retention of learned concepts. This contains answers to all activities in the module. References At the end of this module you will also find: This is a list of all sources used in developing this module. The following are some reminders in using this module: 1. Use the module with care. Do not put unnecessary mark/s on any part of the module. Use a separate sheet of paper in answering the exercises. 2. Don’t forget to answer What I Know before moving on to the other activities included in the module. 3. Read the instruction carefully before doing each task. 4. Observe honesty and integrity in doing the tasks and checking your answers. 5. Finish the task at hand before proceeding to the next. 6. Return this module to your teacher/facilitator once you are through with it. If you encounter any difficulty in answering the tasks in this module, do not hesitate to consult your teacher or facilitator. Always bear in mind that you are not alone. We hope that through this material, you will experience meaningful learning and gain deep understanding of the relevant competencies. You can do it! iv

What I need to know This module is designed and written to provide you the knowledge and skills that will help you maintaining computer and network systems. Those skills are essential for you to pass the National Certification II in Computer System Servicing. This will teach you to have a considerable knowledge and skills in Maintaining Computer and Network Systems (MN) essential to be successful in computer hardware servicing as one of the career options in ICT. The module is divided into 4 lessons with sub lessons namely: LESSON 1: LO 1. Test the configured computer systems and networks This lesson is designed to give you the proper procedures used to test computer systems and networks in accordance with the job requirements as prescribed by TESDA Training Regulations. At the end of this lesson you should be able to: • Follow OHS procedures in inspecting and testing configured computer systems and networks • Identify basic protocols in networking • Apply steps in assigning static IP Address • Enumerate steps in peer to peer sharing using two computers 1

What I Know Test I: True or False: 1. Observe good housekeeping in the area of the machines during and after maintenance. 2. Check interior covers for damage (loose, broken, or sharp edges) 3. Insulation on the power cord must be frayed or worn out 4. IP Address is a number that is used to identify a device on the network.. 5. Subnet Mask indicates the network portion of an IP address. 6. Ipconfig is a command used to find out the IP address of a certain network you are connected to. 7. Ping is a command prompt used to test the ability of the source computer to reach a specified destination computer 8. You can open command prompt by clicking on the windows button at the bottom left and tying <cmd>.. 9. Only Read means that if a person accesses the folder, they will only be able to view the files and not actually be able to write to the folder. 10. In selection of all options you have to turn on password protected sharing 2

Lesson Test the configured computer systems and networks 1 What’s In Review Activity 1: What internet cable used when connecting two network devices directly as shown in the picture below. What’s New Activity 2: Construct 1 sentence using the pictures below. 3

What is It A. General Safety Tips and Reminders  Observe good housekeeping in the area of the machines during and after maintenance.  Place removed covers and other parts in a safe place, away from all personnel, while you are servicing the machine. Safety Inspection Guide These steps will help you identify potentially unsafe conditions on electrical products:  Check exterior covers for damage (loose, broken, or sharp edges)  Power-off computer. Disconnect the power cord.  The power cord should be the appropriate type.  Insulation on the power cord must not be frayed or worn out.  Remove the cover.  Check for any obvious alteration. Use good judgment as to the safety of any alterations.  Check for worn out, frayed or pinched cables.  Check that the power-supply cover fasteners (screws or rivets) have not been removed or tampered with. B. Internet Protocol Now that you are equipped with the knowledge on the different cables used in networking, next is to design your network, which one of the key task is to settle on a peer-to-peer network or a client/server network. The more you understand about each of these protocols, the more you will understand how networks and the Internet work. 1. IP Address - is a number that is used to identify a device on the network. 2. Subnet Mask - indicates the network portion of an IP address. Like the IP address, the subnet mask is a dotted-decimal number. 3. Ipconfig is a command used to find out the IP address of a certain network you are connected to. 4

How to use the ipconfig command? 1) Click on Start Button, then type cmd (command prompt) on the search box. 2) A black screen will appear as shown in the figure below. 3) Type ipconfig and press enter. The figure below shows the IP configuration window using the ipconfig command. The information from this window will be useful because it shows the IP address, subnet mask and default gateway of a network you are connected to. C. Assigning a static IP Address Here are the procedures in assigning an IP Address on a windows base computer system: 1. Open the Control Panel’s Network Connections icon. 2. Open the icon representing your computer’s network connection. 3. Click the Properties button in the Status dialog box. 4. From the list of items, choose Internet Protocol (TCP/IP) 5

5. Click the Properties button. The Internet Protocol (TCP/IP) Properties dialog box appears. 6. Type the IP address for your computer. Enter the appropriate IP Address IP address section. 7. Type a subnet mask. The value used on a local network is commonly 255.255.255.0, but it can be different, such as 255.255.255.127. 8. Type the default gateway address. The default gateway is the router, so type the router’s address. Figure 54 shows an example of assigning an IP Address, Subnet mask and default gateway 6

9. Type the address for the preferred DNS server. The address should be obtained from your Internet Service Protocol. It is used to help your computer find web pages and other addresses on the internet. 10.Type the address for the alternate DNS server. The alternate Domain Name System (DNS) server’s IP address is something that your ISP provides. 11.Click OK to confirm the settings. 12.Close all other open dialog boxes and windows 4. The Ping is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. Using the Ping Command is one of your most important tools in troubleshooting Internet problems. It shows you whether the Domain Name Server is working, whether the computer you are trying to talk to is reachable, and how long it takes to get there. It does this at a very low level — only the most basic Internet functions have to be up and running. 1) Click on Start Button, then type cmd (command prompt) on the search box. 2) A black screen will appear as shown in the figure below. 3) Type ping followed by the IP address you desire to verify. The figure below shows the screen of the ping command and its output 7

D. Rolling Out Your Network • Run and test network cables • Setting up a peer-to-peer network, (two computers) • Plug in and cable the Network Interface Cards (NICs – these connect the network to the LAN). Steps in Peer to Peer Network Sharing Step 1: Navigate to the Desktop 8

Open command prompt [1] and then use the command <cd Desktop> to change into the desktop directory. This step is simply for convenience so that it is easier to find the folder you're going to be working with . [1] You can open command prompt by clicking on the windows button at the bottom left and tying <cmd>. Step 2: Create Your Folder Use the command <md *folder name*> [2]. Make sure that it is visible on your desktop. [2] The command md allows you to create a new folder. After tying md press space and type the name of the folder you want to create. If the folder has more than one word in the name make sure to put the name in quotation marks. 9

Step 3: Navigate to the Folder and Open the Properties Open the file explorer and go under the Desktop section. Left-click then right-click on the folder. The left-click highlights the folder, and the right- click opens a menu of options. Once the menu of options pops up click on the properties. When you open the properties window go to the sharing section Step 4: Choose Who You Want to Share With. Type <Everyone> and click add [3]. Once you're done with that click share and then go to the advanced sharing. [3] The default setting for the folder is set to only read. This means that if a person accesses the folder they will only be able to view the files and not actually be able to write to the folder. 10

Step 5: Sharing the Folder Press the box that lets you share the folder and then go into the permissions section. Step 6: Permissions Make sure to give full control to the people that have access to the shared folder. Click Apply then click OK. Once you press OK you'll be back at the advanced sharing page. Press Apply and OK on that page too. 11

Step 7: Open Control Panel Navigate into the control panel and click on the Network and Internet section. Step 8: Network and Sharing Navigate into the Network and Sharing section. 12

Step 9: Advanced Sharing Navigate to the advanced sharing settings. Step 10: Choose Home and Work / Public There are many settings that need to be changed in both of the options. 13

Step 11: Select All Options There are going to be many options, the ones you need for the sharing to work are pretty common sense like making sure that your device is allowed to be discovered. And turn off password protected sharing. Step 12: Go Into Network Go onto another computer and open the file explorer. Go into the Network section found on the left hand side at the bottom 14

Step 13: Find the Device Find the original device that the file was shared from. Step 14: Find the Folder That Was Shared Once you click on the device you will find all the files that were shared from it. You can tell that the folder is shared over the network because it has the green crossroads looking thing under its name What’s More Activity 3. Task: Give 5 safety measures inside the computer laboratory No. of Safety Measures Points 5 5 4 4 3 3 2 2 1 1 0 0 15

What I Have Learned Activity 4. Fill in the blanks. Using the 1.____________is one of your most important tools in troubleshooting 2.__________ problems because it shows you whether the _3._________________ is working, whether the computer you are trying to talk to is 4.__________, and 5.__________ it takes to get there What I Can Do Activity 5: With the help of any member of the family try to do the Assigning Static IP address using 192.168.28. Enumerate the steps applied (20 pts) Assessment Test I: True or False: 1. Observe good housekeeping in the area of the machines during and after maintenance. 2. Check interior covers for damage (loose, broken, or sharp edges) 3. Insulation on the power cord must be frayed or worn out 4. IP Address is a number that is used to identify a device on the network.. 5. Subnet Mask indicates the network portion of an IP address. 6. Ipconfig is a command used to find out the IP address of a certain network you are connected to. 7. Ping is a command prompt used to test the ability of the source computer to reach a specified destination computer 16

8. You can open command prompt by clicking on the windows button at the bottom left and tying <cmd>.. 9. Only Read means that if a person accesses the folder they will only be able to view the files and not actually be able to write to the folder. 10. In selection of all options you have to turn on password protected sharing Additional Activities Activity 6: Interview a computer technician to give steps they practice/apply in a peer to peer network sharing ( 20 pts) 17

What I need to know LESSON 2: Maintain computer systems and network This lesson is intended to develop your skills in the Replacing different Components Upgrading Your Computer Components. The lesson under Lesson 2 with sub objectives as follows: • Identify faulty computer systems • Perform repair and replacement of faulty computer systems • Identify networks errors What I Know I. Fill in the blanks: Write the correct answer on your answer sheet. _________1. When replacing computer parts you should check if it is _____________ with your unit. _________2. In replacing computer parts, focus on the ____________ of the components that matches your computer unit. _________3. Check if the unit you are trying to repair or upgrade is ________ or branded units. _________4. ___________ drives are commonly replaced with DVD ROM and DVD writers. _________5. Small capacity hard drives are replaced with faster and ______ capacity hard drives.. _________6. Upgrading the computer’s memory or RAM _____________ the performance of the computer _________7. Installing a modem enables your computer to __________ to the internet. _________8. _____________ Automatically analyzes the empty disk space on the hard disk and defrag all scattered files _________9. Close all unwanted __________ at the Windows start up and this increase the windows loading time and speed _________10. Increasing the memory in the system will result to ____________ speed of your computer _________11. Delete all the files and folders from the recycle bin and you will get the space of ________ for reusability. _________12. Clear off your installation space and make sure you’re working in a ____________ environment _________13. For instructions about opening your specific system, consult its ______________. _________14. ____________ is the most vital component of computer network. _________15. Sometimes we see “__________________” icon in our working computers or either we see a HTTP 504 web server error cod 18

Lesson Maintain computer systems and networks 2 What’s In In Lesson 1 we learned the network protocols in networking like assigning IP Address, Sub net mask and steps in peer to peer network. This lesson will guide you to maintain computer system and network What’s New Activity 1 : Describe what the man is doing. Write one word that best described with the activity. Clue: start with letter R What is It A. Replacing different Components When replacing computer parts and peripherals, you need to consider the following factors: 1. Compatibility of the component or part 2. Consider the component specification 3. Components form factor 19

Compatibility of the Component When replacing computer parts, you should check if it is compatible with your unit. Double check on your computer manual if the component you are replacing is compatible or not with the unit because this may lead to system crash. Component Specification This focuses on the specification of the component. Check if the voltage rating, current rating, memory size and frequency matches your computer unit. Form factor The components’ manufacturer should be considered. Check if the unit you are trying to repair or upgrade is generic or branded units. Branded units have their own set of components compatible only to their units, while genetic types can be used only to generic type of units. List of Components Commonly Replaced in a Computer System 1. Memory 2. Video Cards (also referred to as a graphics accelerator) 3. Network Interface Card 4. Hard disk drive 5. Motherboard 6. Processor 7. CMOS Battery 8. CD/DVD Drive 9. Sound card A. Upgrading Your Computer Components To upgrade means to change some parts with faster and better performing ones. These parts may even cost less and more powerful. Commonly Upgraded Computer Parts 1. Monitors- replace old CRT monitors to new LCD or LED monitors. 2. Optical drives- old CD-ROMs drives are commonly replaced with DVDROM and DVD writers. 3. Hard Drives- small capacity hard drives are replaced with faster and high capacity hard drives. 4. Keyboards and mouse- keyboards and mouse are commonly replaced with optical mouse and wireless keyboards. 20

5. RAM (Random Access Memory)- upgrading the computer’s memory or RAM speeds up the performance of the computer 6. Video cards- upgrade computer’s graphics card to improve the computer performance in terms of graphics and games. 7. Processors- replacing the processors increase the data processing speed. 8. Modem- installing a modem enables your computer to connect to the internet. How to Speed up the Computer 1. Defragmenter utility: Automatically analyzes the empty disk space on the hard disk and defrag all scattered files 2. Shutdown Unnecessary programs: Close all unwanted programs at the Windows start up and this will automatically increase the windows loading time and speed of the computer will also be increased. 3. Increased memory: Increasing the memory in the system will result to exceptional speed of your computer. 4. Disk Cleanup: You can delete unwanted programs and files from your computer and this will be helpful in increasing the speed. 5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you will get the space of C drive for reusability. 21

6. Memory Upgrade To make your computer faster, you can upgrade its memory. Here are the steps in upgrading your computer’s memory Me in a Desktop Computer Upgrade Desktop Memory - 10 easy steps to install memory in a desktop computer to Install Memory in a Desktop Computer Step 1 - Gathering Supplies Clear off your installation space and make sure you’re working in a static- safe environment. Remove any plastic bags or papers from your workspace. Then, you’ll need the following items: • Your desktop computer • Crucial® desktop memory • Screwdriver • Owner’s manual Step 2 - Shut Down Your Desktop Computer Because your files, documents, and data are on your storage drive, not your Random-Access Memory (RAM), they remain unaffected during this process. Step 3 - Unplug the Power Cable Step 4 - Hold the Power Button for Five Seconds Step 5 - Open the Case For instructions about opening your specific system, consult its owner’s manual. You can also take pictures as you work through the process to see where cables or screws are attached to make it easier to put back together. Step 6 - Ground Yourself! Touch an unpainted metal surface – this is an extra safeguard that protects your computer memory and components from static damage during the installation process. 22

Step 7 - Remove Existing Memory Modules Press down on the clips on the sides of each module, the clip mechanism will push the memory module up. You can then pull the module completely out. Step 8 - Install Memory Holding the modules along the edges, align the notches on the module with the ridge in the slot, then apply even pressure and firmly press the module in. It usually takes about 30 pounds of pressure to fully install the module. Step 9 - Close the Computer Case Step 10 - Plug the Power Cable in Your Memory is now Installed! Boot up and enjoy a more responsive computer that’s now better equipped to run memory-intensive apps. B. Basic Network Errors If your network connection is not configured properly or suffers a technical failure, you will often see some common network issues and some steps to come up with those issues. 1. Duplicate IP Address Sometimes, more than one PC is trying to use same IP address by manual confirmation mistake, this can cause network issue with the parent network of computer or also it can intermittent network communications. Solution: – Always try to find and assign a unique IP address for your PC or every computer system. 2. NIC got damaged or not placed well NIC (Network Interface Card) is the most vital component of computer network is responsible for creating a temporary connection of your computer to a computer network. 23

Solution: – For NIC issue check your NIC to find whether it is good or damaged or installed properly or not. And you can also do ping the computers and analyses the problem and change the settings according to your problems or requirements. 3. No Network Access Issue Sometimes we see “No Network Access” icon in our working computers or either we see a HTTP 504 web server error code. Solution: – To solve this problem, check each and every component and wires are connected properly and if not then connect it properly or reset all the connections. You can also check the Hub or Router settings and if anything, wrong is there just correct it or else you can restart the whole setup or connection. 4. Check Firewall Restrictions or Settings Sometimes, Firewall will restrict and disallow the network access or file sharing between the computers in your network. That’s due to firewall restrictions which encounters no network issue or deny the network communication. Firewalls are responsible to protect your PC from threats or malware which can be come into your PC over internet or other network sources. 24

Solution: – Change your computer’s firewall settings and enable it for accessing network sharing and services. Then you’ll be able to connect, share and receive files, data or other media files from your networking system. 5. Slow Internet or Network Speed You noticed some glitches in speed like slow internet or data transmission over the network then most of time usually people thought that they’ve excesses the data limit. This is also true but sometimes, it causes due to improper planning of network which causes the slower internet speed or data transmission over the network. Solution: – Make sure that all the peripherals are connected and working properly. Use file compression technologies to reduce the burden of bulky files on network. Find and analyze the users to allocate network bandwidth according to the user’s needs to avoid excessive use of bandwidth or network space. And check your network card, is it updated or working properly or not, if anything is wrong then correct or replace it for a smoother networking performance. 6. Regular drops of network You have noticed regular network connection failures or drops in network connections. Some physical damage of cables or wrong setup of network peripherals might be responsible for this. 25

Solution: – Check and identify the faulty areas, and if you see any cut or noise in cables then cut or replace it. Check to ensure the correct setup of routers, hubs and other network peripherals, and if anything is wrong there just correct it for a smooth networking experience. What’s More Activity 2: Enumeration: Give what are asked for 1-5 Components Commonly Replaced in a Computer System 6-10 How to speed up your computer What I Have Learned Activity 3: Write the solution to the following network error: (10 pts) 1. Regular drops of network 2. Slow Internet or Network Speed 3. Duplicate IP Address 4. NIC got damaged or not placed well 5. No Network Access Issue What I Can Do Activity 4: Draw or cut pictures 5 computer components that need to upgrade (10 pts) 26

Assessment I. Fill in the blanks: Write the correct answer on your answer sheet. _________1. When replacing computer parts you should check if it is _____________ with your unit. _________2. In replacing computer parts, focus on the ____________ of the components that matches your computer unit. _________3. Check if the unit you are trying to repair or upgrade is ________ or branded units. _________4. ___________ drives are commonly replaced with DVD ROM and DVD writers. _________5. Small capacity hard drives are replaced with faster and ______ capacity hard drives.. _________6. Upgrading the computer’s memory or RAM _____________ the performance of the computer _________7. Installing a modem enables your computer to __________ to the internet. _________8. _____________ Automatically analyzes the empty disk space on the hard disk and defrag all scattered files _________9. Close all unwanted __________ at the Windows start up and this increase the windows loading time and speed _________10. Increasing the memory in the system will result to ____________ speed of your computer _________11. Delete all the files and folders from the recycle bin and you will get the space of ________ for reusability. _________12. Clear off your installation space and make sure you’re working in a ____________ environment _________13. For instructions about opening your specific system, consult its ______________. _________14. ____________ is the most vital component of computer network. _________15. Sometimes we see “__________________” icon in our working computers or either we see a HTTP 504 web server error code Additional Activities Activity 5 : Give at least 5 steps in upgrading your computer’s memory (5 points) 27

What I Need to Know LESSON 3: Test Systems and Networks This lesson is intended to develop your skills using a basic common testing procedures that may help determine what is wrong with the system and help you to acquire at least the basic knowledge of the said field. The lesson has sub objectives as follows: • Discuss the different ways on testing computer system. • Instruct / Assist to fill up sample accomplishment report form. • Familiarize the learners with the different error beep codes. What I Know True or False: Write True if the statement is correct and False if is wrong _____ 1. The best way to find out what's wrong is to take a proactive approach. ________ 2. Hardware, Software and Firmware are the three major components of computer system. ________ 3. Monitor power cable is under I/O ports and devices group ________ 4. Testing your power supply is check your fuse and power cord. ________ 5 Run registry scanners to check the OS registry configuration ________ 6. Check for spyware updates is testing your application software ________ 7. When a PC is first switched off it performs a special diagnostic test called a POST. ________ 8. When the POST has been completed successfully, the PC will make a short beep to let the user know everything is as it should be. ________ 9. Replace video card is the solution for error message with indicator of 7 beeps. ________10. Reset RAM is done when there is two short beeps and non fatal error message. 28

Lesson Test Systems and Networks 3 What’s In Last lesson we learned how to maintain our computer through upgrading its components and how to give solutions to networks errors What’s New Activity 1: Based on the 3 pictures what is the common word that follows . BLOOD ______ DRUG _______ SWAB _____ What is It Testing Computer System Is your PC healthy? Don't be too sure. Think back to when you heard a kerklunk sound coming from the hard drive. Or maybe you remember the last time your Internet connection was down. The best way to find out what's wrong is to take a proactive approach: Check under your PC's hood with the following mostly free diagnostic tools, and see if anything is amiss--before disaster strikes. Three Major Components of Computer System: • Hardware • Software • Firmware A. Test Your Hardware 29

Checking your computer hardware and its peripherals 1. Computer Monitor and its peripherals • Monitor and interface cables • Video card • Monitor power cable 2. Keyboard and Mouse • Keyboard connector • Mouse Connector 3. I/O port and devices • Connection between the I/O port and the peripheral device • A faulty cable between the I/O port and the peripheral device • A faulty peripheral device • Incorrect settings in the System Setup program • Incorrect settings in the system's configuration files • Faulty I/O port logic on the system board 4. Power supply • Power cord • Fuse B. Testing Your Software Check the different software installed in the computer. 1. Operating system • Run live updates for your operating systems to get the latest patches and protection for your OS. • Run registry scanners to check the OS registry configuration 30

2. Application Software • Check for live updates 3. Anti-virus software • Run anti-virus program • Check for virus signature updates • Check for spyware updates C. Test Your Firmware Firmware- is a combination of hardware and software integrated on a chip. To test the firmware Check for the correct configuration, you can accomplish this by configuring the BIOS in the computer 31

Sample Accomplishment Report Form Status Task to be accomplished Hardware component testing Working properly Not working properly Software testing Status Working properly Not Working properly Error Beep codes When a PC is first switched on or reset it performs a special diagnostic test called a POST (Power-On Self Test), to check all components in the PC, the POST program sends out a signal to each device initializing each device's built-in self test procedure. 32

The POST test is a two stage process: 1. First, it will check all the basic components including among other things the system clock, the processor, RAM, the keyboard controller and the Video. 2. After the video has been tested the BIOS will then indicate any errors encountered by displaying either a numeric code or a text message on the screen. When a device fails the first part of the POST, the BIOS will send a series of beeps from the PC's speaker (internal) to inform the PC user that there is a problem these beeps are coded allowing the user to diagnose the trouble some component. When the POST has been completed successfully, the PC will make a short beep to let the user know everything is as it should be. Three (3) major brands of BIOS chip 1. AWARD BIOS 2. Phoenix BIOS 3. AMI BIOS Each type of BIOS chip has it own error code AMI BIOS ERROR BEEP CODES Indicator Error message Solution 1 Beep Memory refresh failure Check memory Memory parity error Check memory 2 Beeps Memory read/write Check memory error 3 Beeps Motherboard timer not Replace motherboard functioning Processor Replace processor error 4Beeps Gate A20/keyboard Replace motherboard controller failure Replace processor 5Beeps Processor exception Replace video card interrupt Replace BIOS 6 Beeps Display memory chip/Motherboard read/write failure Replace BIOS 7 Beeps ROM checksum error chip/Motherboard 8 Beeps CMOS shutdown 9 Beeps read/write error Bad Replace cache memory 10 Beeps cache memory 33

Phoenix BIOS ERROR BEEP CODES Phoenix BIOS beep codes are a series of beeps separated by a pause, for example: beep --- beep beep --- beep --- beep beep would be 1-2-1-2 Indicator Error message Solution 1-1-4-1 Cache error Check cache memory 1-2-2-3 BIOS ROM Checksum Check BIOS ROM 1-3-1-1 DRAM test rate Check DRAM 1-3-1-3 Keyboard controller Check keyboard Test controller RAM failure Check memory 1-3-4-1 Check memory RAM failure data bits of Check memory 1-3-4-3 low memory bus 1-4-1-1 RAM failure data bits of Check ROM 2-1-2-3 high memory bus ROM copyright notice Test for unexpected interrupt AWARD BIOS ERROR BEEP CODES Indicator Error message Solution Replace video card One long beep and two Video error short beeps Reset RAM, Check other components. Two short beeps Non-fatal error 34

What’s More Activity 2: Directions: Write your answer on your notebook. 1. Give the functions of each component. a. Memory b. Video card c. NIC d. Motherboard e. HDD 2. Factors to consider when replacing a component. a. _____________________ b. _____________________ c. ____________________ What I Have Learned Activity 3 Direction: Give what are asked for. A. 5 computer components to be replaced and upgrade B. 4 groups of computer hardwares and peripherals to be tested C. 3 groups of softwares to be tested D. 3 major brands of BIOS chip 35

What I Can Do Activity 4 : Directions: Answer the following questions and place your answers on your answer sheet. 1. What does the acronym POST stand for? 2. Identify the following error codes: • 1-2-2-3 • 1-3-4-1 • 2-1-2-3 • 1-1-4-1 • 1-3-1-1 Assessment True or False: Write True if the statement is correct and False if is wrong . ________ 1. The best way to find out what's wrong is to take a proactive approach. ________ 2. Hardware, Software and Firmware are the three major components of computer system. ________ 3. Monitor power cable is under I/O ports and devices group ________ 4. Testing your power supply is check your fuse and power cord. ________ 5 Run registry scanners to check the OS registry configuration ________ 6. Check for spyware updates is testing your application software ________ 7. When a PC is first switched off it performs a special diagnostic test called a POST. ________ 8. When the POST has been completed successfully, the PC will make a short beep to let the user know everything is as it should be. ________ 9. Replace video card is the solution for error message with indicator of 7 beeps. ________10. Reset RAM is done when there is two short beeps and non fatal error message. 36

Additional Activities Activity 5: Fill up the Sample Accomplishment Report Form, in testing your hardwares, softwares, application and antivirus of your available gadgets at home (10 points) 37

38 ADDITIONAL WHAT I ACTIVITIES CAN DO Points be Points be given based given on your based on answers your answers ACTIVITY 6 ACTIVITY 5 WHAT I WHAT’S REVIEW ACTIVITY Test I HAVE MORE 1Crossover 1. True LEARNED Points be 2. False Points be given Activity 2 3. False given based based on What’s New 4. True on your your Answer may vary 5. True answers answers 6. True 7. True 8. True 9. True 10. False ACTIVITY 3 ACTIVITY 4 ACTIVITY 1 Answer Key LESSON 1 What I Know/Assessment Test

39 ADDITIONAL WHAT I WHAT I WHAT’S WHAT’S 1. True ACTIVITIES CAN DO HAVE MORE NEW 2. True Points be Points be LEARNED 3. False given based given Points be SOLUTION 4. True on your based on given 5. True answers your based on 6. False answers your 7. False answers 8. True 9. True 10. True Points be given based on your answers ACTIVITY 1 ACTIVITY 2 ACTIVITY 3 ACTIVITY 4 ACTIVITY 5 LESSON 3 WHAT I KNOW/ ASSESSMENT TEST ADDITIO ADDITI WHAT I WHAT I WHAT’S WHAT I KNOW/WHAT’ NAL ONAL CAN DO HAVE MORE ASSESSMENT TEST ACTIVITY 1S NEW ACTIVITI ACTIVIT Points be LEARN Points ES IES given ED be given 1. compatibleELECTR Points be Points based on Points based 2. specificationICUTE given be given your be on your 3. genericD bd answers given answers 4. old CD ROMs bd 5. high ACTIVITY 5 ACTIVITY6 ACTIVITY 4 ACTIVITY 2 ACTIVITY 3 6. speed up 7. connect 8. defragmenter 9. program 10. exceptional 11. C drive 12. static safe 13. owner’s manual 14. NIC 15. No network access LESSON 2

References https://www.instructables.com/Peer-to-Peer-Network-Sharing/ https://www.google.com/search?q=checking+cables&source=lnms&tbm=isch&sa=X&ved=2 ahU KEwjglIGqxPrvAhXNE4gKHW4tC0AQ_AUoAXoECAEQAw&biw=1280&bih=610 google.com/search?q=replace&sxsrf=ALeKk00uv2cZPUEiQ7qSGL0AMVAB43OCvg:16193561 12890&source=lnms&tbm=isch&sa=X&ved=2 crucial.com/articles/about-memory/how-to-upgrade-desktop-memory http://www.shoutech.in/common-networking-problems-and-solutions/ https://www.google.com/search?q=testing&sxsrf=ALeKk019_aPLUh8EzPWtgObsC0tnaqUEu A:1619683296106&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjs6oy8_qLwAhXDBKYKHZXeDWQQ DVD TLE G10@ Letran Module, Learning Module Grade 9 & 10 TERESITA C. ISIP [email protected] fb: Teresita Isip LIMAY NATIONAL HIGH SCHOO 40


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook