Css Module Uc 1
Css Module Uc 1
Css Module Uc 1
MODULE CONTENT
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able
to:
LO1. Assemble computer hardware
LO2. Prepare installer
LO3. Install operating system and drivers for peripherals/ devices
LO4. Install application software
LO5. Conduct testing and documentation
lOMoARcPSD|39031595
ASSESSMENT CRITERIA:
1. Unit assembly is planned and prepared to ensure OH&S policies
and procedures are followed in accordance with systems
requirements
2. Materials necessary to complete the work are identified and
obtained in accordance with established procedures and checked
against systems requirements
3. Tools, equipment and testing devices needed to carry out the
installation work are obtained in accordance with established
procedures and checked for correct operation and safety
4. Computer hardware is assembled in accordance with established
procedures and systems requirements
5. Basic-input-output-system (BIOS) configuration is performed in
accordance with hardware requirements Contents:
Learning Objective: after reading this information sheet, you must be able to:
1.) Explain the Occupational Health and Safety in your computer related
works including dealing with electrical components of a computer.
INTRODUCTION:
Occupational Safety and Health (OSH) also commonly referred to as
Occupational Health and Safety (OHS) or Workplace Health and Safety
(WHS) is an area concerned with the safety, health and welfare of people
engaged in work or employment. The goals of occupational safety and health
programs include to foster a safe and healthy work environment. OHS may also
protect co-workers, family members, employers, customers, and many others
who might be affected by the workplace environment. In the United States the
term occupational health and safety is referred to as occupational health and
occupational and non-occupational safety and includes safety for activities
outside of work.
Occupational Health and Safety can be important for moral, legal, and
financial reasons because Good OHS practices can also reduce worker injury
and illness related costs, including medical care, sick leave and disability
benefit costs.
What is OHS and why is it necessary?
3.) Never assume that power has been disconnected from a circuit. First,
check that it has been powered-off.
These steps will help you to identify potentially unsafe conditions of the
hardware components:
HAND TOOLS
Side Cutter Pliers – a tool used for
cutting or trimming of connecting
wires or terminal leads in the
circuit board
computer.
Volt-Ohms-Millimeter (VOM) -
A measuring instrument used
by technician for measuring:
current, voltage, resistance
Learning Objective: after reading this information sheet, you must be able to:
1.) Discuss and explain the Personal Protective Equipment in your computer
related works.
INTRODUCTION:
Personal protective equipment (PPE) refers to protective clothing, helmets,
goggles, or other garment designed to protect the wearer's body from injury by
blunt impacts, electrical hazards, heat, chemicals, and infection, for job-related
occupational safety and health purposes, and in sports, martial arts, combat,
etc.
and there is no question about that. Be sure to USE THEM on any designated
activity WHERE they are REQUIRED. They can protect you from a lot of harm.
Importance of Personal Protective Equipment‟s:
• The type of personal protective equipment (PPE) needed when using hand
tools depends on the nature of the task. At a minimum, eye protection
should always be worn.
• The use of hand protection may also be appropriate to provide protection
against cuts, abrasion, and repeated impact.
Eye and Face Protection –This will be used to avoid being exposed to a large
number of hazards that pose danger to their eyes and face. Then to ensure that
workers have appropriate eye or face protection if they are exposed to eye or
face hazards from flying particles, molten metal, liquid chemicals, acids or
caustic liquids, chemical gases or vapors, potentially infected material or
potentially harmful light radiation.
Foot and Leg Protection Used for possible foot or leg injuries from the Moist
floors, Non-grounded Power Extension cables and Power Surge that you might
get a serious injuries.
Body Protection – This is used to protect possible bodily injury in the work
place, workers must wear appropriate body protection while performing their
jobs. In addition to cuts and radiation and avoid some electrical charges leaks
that cannot be eliminated.
1. Safety Precautions
2. Preventive Maintenance
3. Protective Devices
4. Accident Reports
Safety precautions
Proper preparation is the key to a successful built. Before you begin, make sure
that you have the tool you will need, and secure a clear well-lit workplace.
Gather all the components you‟ll be using and unpack them at the same time.
Find a dry, well-ventilated place to do your work, you should choose an area
without carpets, because it tends to create static electricity. Always keep in
mind that personal protection is one of the traits of a good technician.
Preventive Maintenance
Types of Maintenance
Active
lOMoARcPSD|39031595
Passive
1. Anti-Static Devices
2. Power Surge Protector Devices
Anti-Static devices - These are the devices used to protect computer units
from electro static discharge.
A monitor, printer, or other device that lets you see what the computer
has accomplished.
computer‟s operating
system.
MICROPROCESSOR AND ITS PROCESSES
Peripherals Devices
Both these types of scanners use a CCD as the image sensor, whereas a drum
scanner uses a photomultiplier tube (PMT) as the image sensor.
Early scanners had parallel connections that could not go faster than 70
kilobytes/second. Professional models adopted the SCSI-II connection, which
was much faster (a few megabytes per second) albeit expensive, and frequently
requiring a dedicated expansion card to be put inside the host computer.
Recent economic models come equipped with USB connections. In its first
version, USB was capable of roughly 1 megabyte per second. Recent models use
USB 2.0 connections that can transfer about 40 megabytes per second,
eliminating the bottleneck.
Flatbed
Handhel d
image
Speakers
d. A computer speaker, also known as
multimedia speaker, is an external speaker
connected to a PC with built-in low power
amplifier for volume regulation. Basically, a
speaker is an electronic component that
converts electrical signal into actual sound.
Although PCs are originally released with an
external speaker capable of producing beeps
and tones it is still dependent on the external
speaker for quality sound output.
Parts and Functions of Computer System
Hardware
1. Casing - A computer case contains the framework to support a
computer‟s internal components while providing an enclosure for added
protection. The size and layout of a case is called a form factor. types
of cases
lOMoARcPSD|39031595
computer. It converts the 220v AC wall current into the 3.3v, 5v, or 12v
power that the system requires for operation.
Connectors
Most connectors today are keyed connectors. Keyed connectors are
designed to be inserted in only one direction. Each part of the connector
has a colored wire with a different voltage running through it. Note:
Different power supply form factors provide different power output connections,
depending on system requirements. AT form factors have been slowly phased out by
ATX form factor power supplies because of the different case sizes and advanced
features. ATXv12 was created to add power support for the motherboard by adding
another four-pin power connector.
The form factor of motherboards pertains to the board‟s size and shape. It
also describes the physical layout of the different components and devices
on the motherboard. Motherboards have various form factors:
Advanced Technology (AT)
Advanced Technology Extended (ATX)
Smaller footprint than Advanced Technology Extended (Mini-ATX)
Smaller footprint than Advanced Technology Extended (Micro-ATX)
Low-Profile Extended (LPX)
New Low-Profile Extended (NLX)
Balanced technology Extended (BTX)
An important set of components on the motherboard is the chip set.
The chip set is composed of various integrated circuits attached to the
motherboard that control how system hardware interacts with the CPU
and motherboard. The CPU is installed into a slot or socket on the
motherboard. The socket on the motherboard determines the type of
CPU that can be installed.
The chip set of a motherboard allows the CPU to communicate and
interact with the computer‟s other components and to exchange data
with system memory (RAM), hard-disk drives, video cards, and other
output devices. The chip set establishes how much memory can be
added to a motherboard. The chip set also determines the type of
connectors on the motherboard.
Most chip sets are divided into two distinct components, Northbridge
and Southbridge. What each component does varies from
manufacturer to manufacturer, but in general the Northbridge
controls access to the RAM, video card, and the speeds at which the
CPU can communicate with them. The video card is sometimes
integrated into the Northbridge. The Southbridge, in most cases,
allows the CPU to communicate with the hard drives, sound card, USB
ports, and other input/output (I/O) ports.
lOMoARcPSD|39031595
Parts of Motherboard
The CPU socket or slot is the connector that is the interface between the
motherboard and the processor. Most CPU sockets and processors in use
today are built around the pin grid array (PGA) architecture, in which the
pins on the underside of the processor are inserted into the socket,
usually with zero insertion force (ZIF). ZIF refers to the amount of force
needed to install a CPU into the motherboard socket or slot. Slot-based
processors are cartridge- shaped and fit into a slot that looks similar to
an expansion slot.
The CPU executes a program, which is a sequence of stored instructions.
Each model of processor has an instruction set, which it executes. The
CPU executes the program by processing each piece of data as directed by
the program and the instruction set. While the CPU is executing one step
of the program, the remaining instructions and the data are stored nearby
in a special memory called cache. Two major CPU architectures are
related to instruction sets:
Reduced Instruction Set Computer (RISC): Architectures
use a relatively small set of instructions, and RISC chips are
designed to execute these instructions very rapidly.
Complex Instruction Set Computer (CISC): Architectures
use a broad set of instructions, resulting in fewer steps per
operation.
Some CPUs incorporate hyper threading to enhance the CPU ‟s
performance. With hyper threading, the CPU has multiple pieces of code
being executed simultaneously on each pipeline. To an operating system,
a single CPU with hyper threading appears to be two CPUs.
A CPU‟s power is measured by its speed and the amount of data it can
process. A CPU‟s speed is rated in cycles per second. The speed of
current CPUs is measured in millions of cycles per second, called
megahertz (MHz), or billions of cycles per second, called gigahertz
(GHz). The amount of data that a CPU can process at the one time
depends on the size of the processor data bus. This is also called the CPU
bus or the front-side bus (FSB). The wider the processor data bus, the
more powerful the processor. Current processors have a 32-bit or 64bit
processor data bus.
Over clocking is a technique used to make a processor work at a faster
speed than its original specification. Over clocking is an unreliable way to
improve computer performance and can damage the CPU.
MMX is a set of multimedia instructions built into Intel processors. MMX-
enabled microprocessors can handle many common multimedia
operations that normally are handled by a separate sound or video card.
However, only software specially written to call MMX instructions can
take advantage of the MMX instruction set.
lOMoARcPSD|39031595
Case Fan
In addition to case fans, a heat sink draws heat away from the core of the
CPU. A fan on top of the heat sink moves the heat away from the CPU
lOMoARcPSD|39031595
Other components are also susceptible to heat damage and sometimes are
equipped with fans. Video adapter cards produce a great deal of heat system.
A metal plate is placed over the processor, and water is pumped over the top
to collect the heat that the CPU creates. The water is pumped to a radiator to
be cooled by the air and then is re-circulated.
Fans are dedicated to cooling the graphics-processing unit (GPU).
Computers with extremely fast CPUs and GPUs may use a water-cooling
6. ROM and RAM – ROM and RAM provide memory for a vast amount of
computer equipment. They come in different memory sizes and module
sizes and have different features.
ROM (Read only Memory) - chips are located on the motherboard.
ROM chips contain instructions that the CPU can access directly.
ROM stores basic instructions for booting the computer and loading
the operating system. ROM chips retain their contents even when
the computer is powered down. The contents cannot be erased,
changed, or rewritten by normal means.
lOMoARcPSD|39031595
Types of ROM
Programmable read-only memory (PROM): Information is
written to a PROM chip after it is manufactured. A PROM chip
cannot be erased or rewritten.
Erasable programmable read-only memory (EPROM):
Information is written to an EPROM chip after it is
manufactured. An EPROM chip can be erased with exposure to
UV light. Special equipment is required.
Electrically erasable programmable read-only memory
(EEPROM): Information is written to an EEPROM chip after it is
manufactured. EEPROM chips are also called flash ROMs. An
EEPROM chip can be erased and rewritten without removing the
chip from the computer
Types of RAM
Dynamic RAM (DRAM) is a memory chip that is used as main
memory. DRAM must be constantly refreshed with pulses of
electricity to maintain the data stored in the chip.
Static RAM (SRAM) is a memory chip that is used as cache
memory. SRAM is much faster than DRAM and does not have to
be refreshed as often.
Fast Page Mode (FPM) DRAM is memory that supports paging.
Paging enables faster access to the data than regular DRAM.
Most 486 and Pentium systems from 1995 and earlier use FPM
memory.
Extended Data out (EDO) RAM is memory that overlaps
consecutive data accesses. This speeds up the access time to
retrieve data from memory, because the CPU does not have to
wait for one data access cycle to end before another data access
cycle begins.
Synchronous DRAM (SDRAM) is DRAM that operates in
synchronization with the memory bus. The memory bus is the
data path between the CPU and the main memory.
lOMoARcPSD|39031595
Error Checking
Memory errors occur when the data is stored incorrectly in the RAM
chips. The computer uses different methods to detect and correct
lOMoARcPSD|39031595
7. Adapter Cards - Adapter cards are used to expand and customize the
computer‟s capability
NIC connects a computer to a network using a network cable.
Wireless NIC connects a computer to a network using radio
frequencies.
Sound adapter provides audio capability.
Video adapter provides graphic capability.
Modem adapter connects a computer to the
Internet using a phone line.
SCSI adapter connects SCSI devices, such as hard drives or
tape drives, to a computer.
RAID adapter connects multiple hard drives to a computer to
provide redundancy and to improve performance.
USB port connects a computer to peripheral devices.
Parallel port connects a computer to peripheral devices.
Serial port connects a computer to peripheral devices.
storage drives can connect to the computer using a USB port, a FireWire
port, or a SCSI port.
Common types of storage drives
Floppy drive - A floppy drive, or floppy disk drive, is a
storage device that uses removable 3.5-inch floppy disks.
These magnetic floppy disks can store 720 KB or 1.44 MB
of data. In a computer, the floppy drive is usually
configured as the A: drive. The floppy drive can be used to
boot the computer if it contains a bootable floppy disk. A
5.25-inch floppy drive is older technology and is seldom
used.
The floppy drive is slowly being replaced by cheaper, faster,
and larger-capacity storage such as writable CDs, DVDs, and
flash drive media.
Hard drive - A hard drive, or
harddisk drive, is a magnetic
storage device that is installed
inside the computer. The hard drive
is used as permanent storage for
data. In a computer, the hard drive
is usually configured as the C: drive
and
contains the operating system and applications. The hard
drive is usually configured as the first drive in the boot
sequence. The storage capacity of a hard drive is measured in
billions of bytes, or gigabytes (GB). The speed of a hard drive
is measured in revolutions per minute (rpm). Multiple hard
drives can be added to increase storage capacity.
Audio
An audio port connects audio devices to the computer. The
following audio ports are commonly used.
Line In connects to an external source, such as a stereo
system.
Microphone In connects to a microphone.
Line Out connects to speakers or headphones.
lOMoARcPSD|39031595
Video
A video port connects a monitor cable to a computer.
Several video port and connector types exist:
Video Graphics Array (VGA) has a three-row 15-pin
female connector and provides analog output to a monitor.
Digital Visual Interface (DVI) has a 24-pin female
connector or a 29-pin female connector and provides
compressed digital output to a monitor. DVI-I provides
both analog and digital signals. DVI-D provides digital
signals only.
High-Definition Multimedia Interface (HDMI) has a
19pin connector and provides digital video and digital
audio signals.
S-Video has a four-pin connector and provides analog
video signals.
Component/RGB has three shielded cables (red, green,
and blue) with RCA jacks and provides analog video
signals.
lOMoARcPSD|39031595
Matching Holes
lOMoARcPSD|39031595
Figure 1
• The motherboard has also several holes, as you can see on Figure 2
(we‟ve drawn red arrows to point you where the holes are located).
Figure 2
• You should lay down the motherboard on the metallic plate and check
which holes from the metallic plate match the holes on the motherboard,
as we show on Figure 3. As you can see by comparing Figures 1 and 2,
the metallic plate has more holes than needed. On the holes on the
metallic.
• Matching the holes on the metallic plate with the holes on the
lOMoARcPSD|39031595
motherboard.
Together with the case come a lot of small pieces. From these pieces you
will need screws and screw nuts to install the motherboard. For now,
take the screw nuts and install them on all the plate holes that matched a
hole on the motherboard. They can be easily installed by turning them
clock wise using your thumb and index finger.
lOMoARcPSD|39031595
Screw nuts, screws and washers that come with the case.
the nut and the motherboard and another between the motherboard and
the screw, like a sandwich where the motherboard is the stuffing.
• One of the most common mistakes while installing a motherboard is
using these washers on all holes. This cannot be done. The metalized
holes were metalized to make the proper grounding with the system case.
Actually, you probably won‟t find any non-metalized holes on
motherboards nowadays. And if you do, almost always they don‟t match
any hole on the chassis anyway. So, just leave these cartoon board
washers behind! Don‟t use them!
• Another very common – and dangerous-mistake is to use a foam sheet
(which is usually pink) that some motherboards come with between the
motherboard and the metallic plate. Some people believe that this foam
will prevent the motherboard form touching the metallic plate, avoiding a
short-circuit. This way thinking is completely wrong. First, if you install
all the nuts correctly and install a screw on all motherboard holes
possible, the motherboard will never touch the case ‟s metallic plate. In
second place, if you install this foam sheet you will simply cut the
motherboard ventilation, which will lead to an overheating condition. The
space between the motherboard and the metallic plate is used to dissipate
the heat generated by the motherboard and nothing should be put there.
• After these explanations, let‟s go ahead. On you see the motherboard
correctly installed to the case‟s metallic plate.
•
Motherboard correctly installed to the metallic plate.
You may think that the next step is to install the metallic plate back to
the case, now with the motherboard attached to it. But it is not. Before
doing that, we still need to do several things.
• To install the CPU, lift the lever on the socket straight up to 90 degree
position. There are some pins missing from two corners of the Athlon
processor while only one corner is missing pins on the Pentium 4. The
notched corners should match the notch corners of the socket.
• Install the computer processor (CPU) inot the socket, taking care not to
bend any pins.
• The CPU should just drop into the socket without any resistance. This
socket is called a Zero Insertion Force (ZIF) socket.
• Diagram A below displays the computer processor (CPU) and socket.
lOMoARcPSD|39031595
• Ensure that the CPU is sitting properly in the socket and then lock the
lever back down. (See Diagram B below). Diagram B also shows the ZIF
socket lever being lowered.
• Flip the lever over to lock heatsink in place and coonect the CPU
cooling FAN connectors.
lOMoARcPSD|39031595
CPU 775
Installatio
n
Procedure
• Use thumb to open the load plate. Be care not touch the contact
lOMoARcPSD|39031595
• Orientate CPU package to the socket make sure you match triangle
marker to pin 1 location
lOMoARcPSD|39031595
• Use the thumb & forefinger to hold the lifting tab of the cap.
• Lift the cap up and remove the cap completely from the socket.
• Slightly push down the load palate onto the tongue side and hook the
lever
• Fasten the cooling fan supporting base onto the CPU socket on the
motherboard
lOMoARcPSD|39031595
into the socket one way only. Firmly press the module is completely
seated in the socket. The ejector tabs at each of the socket will
automatically snap into the locked position. Repeat this procedure for any
additional modules you are installing.
Carefully press the memory into the slot until it is securely locked in
place with the clips. (See diagram A below).
Front panel connectors from the motherboard Wires from the case ‟s front
panel.
• Just install these wires to the connector with the same name on the
motherboard. On the wires we marked “polarity required” you will need to
match the positive (+) and negative (-) markings on the motherboard. The
white (or black) wire should be installed to the pin marked as negative (-)
on the board.
• Also, sometimes the connectors are colored, as it occurs in our example
on Figure 15, but the colors on the connectors rarely match the colors of
lOMoARcPSD|39031595
the wires. So, don‟t follow the color scheme from the motherboard for
installing the front panel wires.
motherboards will come with their own, and it‟s very easy to replace the
shield. Normally you just need to push in on the I/O shield until it pops
out and replace it with the new one. In some cases, you may need to pop
out a few covers that are still in the shield to accommodate your board.
Figure 1: I/O shield there are several plugs on the back of the motherboard.
Check/replace the I/O shield
lOMoARcPSD|39031595
Figure 2: I/O shield that came with our case from factory.
• In our case, the holes on the case didn‟t match the pattern of the plugs
available on our motherboard. So we needed to remove the finishing that
came with our case using a pliers and install a finishing that matched our
motherboard. Motherboards usually come with a case finishing that
match the pattern of its plugs. Cases usually come with a set of most
common finishing.
Figure 3: We had to remove the I/O shield that came with the case.
Master or single drive. If you are installing your Seagate hard drive as the only
drive in the system or if it will be the primary boot drive for the system, the
jumper should be set on pins 7 and 8.
lOMoARcPSD|39031595
Drive as slave. If you are installing the drive as an additional drive in your
system, the drive shold be set as slave by removing all jumpers. Remember to
confirm that the original drive is set to a mater position (if the limit capacity
jumper is required for your installation it will need to remain in place).
• When installing this computer internal drive, always use the screws
provided with the drive since other screws could be too long and damage
the internal components.
• Install hard drive in internal 3.5 inch drive bay and install all four
retaining screws securely to prevent vibration of drive. Check to see that
drive is secure.
lOMoARcPSD|39031595
• After securing hard drive, it is now time to connect your IDE cable to your
hard drive. This cable is indexed and can only fit one way into the drive
and the motherboard.
• The cable used to connect the hard drive is an 80-conductor cable. This
cable is distinguishable from the 40-conductor cable because the
80conductor cable uses very fine wires and the 40-conductor cable uses
relatively thick wires.
• If it is impossible to see where the cable is indexed, remember that the red
stripe on the IDE cable corresponds with Pin 1 on the IDE drive and Pin 1
is the closest to the drive‟s power connector.
• Connect the IDE cable into the Primary IDE channel connector on the
motherboard and the other end into the connector on the drive.
Finally, plug power cable to drive ensuring that it has the correct orientation.
(See diagram C below).
lOMoARcPSD|39031595
• Attach the SATA Power cable to the SATA hard drive and connect the
other end to the power supply.
lOMoARcPSD|39031595
• Here are some other Computer Internal Drives. The CD-ROM drive and
the DVD-ROM drive.
• Having installed the hard drive as „MASTER‟ on the primary IDE channel,
you should now install the DVD-ROM drive as „SLAVE ‟ on the same IDE
channel.
• Install your CD-ROM drive/DVD-ROM drive in an available 5.25 inch
drive bay and properly secure screws on both sides to prevent vibration.
Vibration can damage internal components of drives.
lOMoARcPSD|39031595
Connect the power cable from the power supply to the drive.
• Connect the remaining end of the primary IDE cable to the drive ensuring
that the red line on the cable aligns with Pin 1 on the drive connector.
lOMoARcPSD|39031595
• Align the clip of the ATX 20-24 pin connector with the notch in the plug
and firmly clip it in place. The motherboard recommended in this tutorial
is an Athlon motherboard and only uses the 20-pin connector.
• The Pentium 4 computer motherboard uses an extra small 4-pin 12V
connector for extra power needed by the CPU. It will, therefore, be
necessary to also attach that connector if you are building a Pentium 4
system.
Note: An incorrectly installed plug will „burn‟ your computer.
Remove the expansion slot cover from the computer case. (See diagram B
below).
lOMoARcPSD|39031595
Remove the expansion slot cover from the computer case. (See diagram A
below).
Secure the sound card to the computer case using a small screw. (See diagram
C below).
Finally, connect
the audio cable to the
DVDROM drive and
the sound card.
you have installed the internal components. You are now ready to install
the external peripherals.
• A Power
Connector – The power connector is a
3-prong male connector
which enables you to connect a power cable to the
computer Port
A to obtain power from an electrical outlet. (See
diagram above).
• B Power Supply Fan – The power supply fan
provides adequate ventilation for the power supply
by exhausting hot air from it.
• D Keyboard Port – The keyboard is one of the input devices that allows
you to enter instructions and information into a computer. The keyboard
is connected to Port D. This port is also known as the mini-DIN or PS/2
connector. The older computers came with a larger port known as a DIN
connector.
lOMoARcPSD|39031595
• • E USB Port –
(USB) Acronym for
Universal Serial Bus.
This port is an external
bus that supports data
transfer rates of up to
12 Mbps. This port can
connect up to 127
peripherals (such as
mice, modems,
keyboard, etc.) all at
once. It also enables
hot-swapping which is
being able to connect
G Serial Port (COM Port)– This port and disconnect
peripherals without
powering down the PC.
1. Safety procedures
2. Types of Operating System
3. Create and customize portable and bootable devices
Conditions
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
DISKPART
LIST DISK
SELECT DISK ? (the usb letter)
CLEAN
CREATE PARTITION PRIMARY
SELECT PARTITION 1
ACTIVE
FORMAT FS=NTFS
lOMoARcPSD|39031595
ASSIGN
EXIT
G:\>CD BOOT
G:BOOT:\>BOOTSECT /NT60 E:(the e: is your USB letter with a : )
3. Then it will say successfully updated NTFS file system boot code and
so on. Complete now copy the files from you install disk to the USB.
Add the ISO files and follow the instruction. Make sure the Flash Drive is
connected. All files in flash drive will be deleted.
ASSESSMENT CRITERIA:
1. Operating system (OS) is installed in accordance with established
installation procedures and to comply with end-user requirements
2. Peripherals/devices drivers are installed and configured in
accordance with manufacturer‟s instructions and/or OS
installation procedures.
3. OS and drivers updates/patches are accessed and installed in
accordance with manufacturer‟s recommendations and
requirements
4. On-going checks of the quality of the work are undertaken in
accordance with established procedures Contents:
1. Safety procedures
2. Installing Operating System
3. Installing peripherals, network devices and other I/O
devices
4. Updating peripherals, network devices and other I/O
devices Conditions
1. Hands-on
2. Direct observation
3. Practical demonstration
DHCP Server, file server, print server, Windows Media Server, IIS 7 web
server and Windows Server Virtualization virtual server. For Server Core
installations please see my “Installing Windows Server 2008 Core” article.
To use Windows Server 2008 you need to meet the following hardware
requirements:
Component Requirement
Upgrade notes:
I will not discuss the upgrade process in this article, but for your general
knowledge, the upgrade paths available for Windows Server 2008 shown in
the table below:
3. When prompted for an installation language and other regional options, make
your selection and press Next.
If you do not have the Product ID available right now, you can leave the box
empty, and click Next. You will need to provide the Product ID later, after the
server installation is over. Press No.
lOMoARcPSD|39031595
3. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own,
and therefore you will be prompted to select your correct version in the
next screen, assuming you are telling the truth and will provide the
correct ID to prove your selection later on.
4. If you did provide the right Product ID, select the Full version of the
right Windows version you‟re prompted, and click Next.
lOMoARcPSD|39031595
5. Read and accept the license terms by clicking to select the checkbox and
pressing Next.
6. In the “Which type of installation do you want?” window, click the only
available option –Custom (Advanced).
lOMoARcPSD|39031595
7. In the “Where do you want to install Windows?”, if you ‟re installing the
server on a regular IDE hard disk, click to select the first disk, usually
Disk 0, and click Next.
8. The installation now begins, and you can go and have lunch. Copying
the setup files from the DVD to the hard drive only takes about one
lOMoARcPSD|39031595
The installation process will reboot your computer, so, if in step #10
you inserted a floppy disk (either real or virtual), make sure you
remove it before going to lunch, as you‟ll find the server hanged
without the ability to boot (you can bypass this by configuring the
server to boot from a CD/DVD and then from the hard disk in the
booting order on the server‟s BIOS)
9. Then the server reboots you‟ll be prompted with the new Windows
Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.
lOMoARcPSD|39031595
14. The default Administrator is blank, so just type Administrator and press
Enter.
lOMoARcPSD|39031595
11. You will be prompted to change the user‟s password. You have no
choice but to press Ok.
12. In the password changing dialog box, leave the default password
blank (duh, read step #15…), and enter a new, complex, atleast-
7characters-long new password twice. A password like “topsecret” is not
valid (it‟s not complex), but one like “T0pSecreT!” sure is. Make sure
you remember it.
lOMoARcPSD|39031595
13. Someone thought it would be cool to nag you once more, so now
you‟ll be prompted to accept the fact that the password had been
changed. Press Ok
lOMoARcPSD|39031595
18. Finally, the desktop appears and that‟s it, you‟re logged on and can
begin working. You will be greeted by an assistant for the initial server
configuration, and after performing some initial configuration tasks, you will
be able to start working.
Next, for the initial configuration tasks please follow my other Windows
Server 2008 articles found on the Related Windows Server 2008 Articles
section below.
Make USB installer using DVD or ISO and save it to your USB flash drive
lOMoARcPSD|39031595
using RUFUS
In partitioning the hard disk select manual partition and make two
partition10% for SWAP files and 60% for EXT4 partitionunder
SYSTEM FILES. Click next.
lOMoARcPSD|39031595
Installing services
Follow the Onscreen procedures
Use your name as user and use Css2015
as your password in
“root” use and “your name”
lOMoARcPSD|39031595
Conditions
1. Hands-on
2. Direct observation
3. Practical demonstration
lOMoARcPSD|39031595
This should be located in the lower left hand corner of the web site. Clicking
this button begins the process.
After you click the "Install Now" button, the required files will automatically
download to your computer. This may take a while.
When the Welcome to the InstallShield Wizard window opens, click the "Next"
button.
lOMoARcPSD|39031595
Introduction
Downloading/Installation
Once you have downloaded it locate the file that you just downloaded. The icon
should appear like the image below:
Click next.
You will get another window with the ReadMe File, just click Next, again.
Now you get the beloved Legal Agreement, just click I agree, and then click
Next to continue. You will now see an image similar to the one below:
lOMoARcPSD|39031595
Now if you selected "Minimal" you won't see "skins" here. After reviewing this
for a second and confirming that what you have on your screen is similar to
mine, click the Next button. (Note: the "Free Space" will vary from computer to
computer. Since I have about 170 Gigabytes free that is why my Free Space is
so large.)
lOMoARcPSD|39031595
After pressing Next, you will get the above message. Basically if you select Yes
it will do a quick scan of your hard drive upon boot-up. This scan will start
before you log-in into Windows. I recommend you select No, because even
though this scan will only happen once, this scan can take quiet a while.
It took almost an hour for my hard drive.
If you have Microsoft Anti-Spyware, or other similar program installed you may
be prompted with a similar message. Click the Allow button to allow this
change to take affect.
lOMoARcPSD|39031595
Now you have to restart your machine. I highly advise you to select Restart
and then click Finish.
After you restart you will get a message about Avast! it will give you the general
"Hello and Thank you for choosing our Product." Also after you restart you will
notice 2 new icons in the bottom right corner of the screen.
The icon with the I is for the "Virus Recovery Database" (VRDB). What this does
is virtually makes copies of the program you have installed and if one of them
gets infected with a virus this will replace the files infected so the program
function like before. The A is the On-Access Protection.
Very Important - after restarting, right click on the A in the taskbar and select
Updating, the highlight Program.
lOMoARcPSD|39031595
You will get this popup after its done updating. If Avast! had to download
anything for your computer you may get a message asking you to restart.
Configuring
Now right click on the A in taskbar and click Start Avast! AntiVirus.
Click Program Registration and you will be taken to their website. Fill out the
form and then check you e-mail. Once you get an e-mail from them (usualy
lOMoARcPSD|39031595
about 1 minute after submitting the form) copy and paste the serial they
provided into the highlighted box. Then click ok.
Now you will see this screen. Click the little hard drive like icon in the top right
corner, below the X.
Click each icon on the right once until the options in the center read:
Now click on the A on the middle left side and adjust the Resident Protection
from Standard to High.
I recomend changing the default slide from Normal to High, depending on how
fast your system is.
What makes Avast! unique is that it scans many parts of the system. It scans
Instant Messenging, Internet Mail, Network Shield, Outlook/Exchange, P2P
Shield, Standard Shield and Web Shield. So regardless of what you do on the
computer you will be protected no matter what.
Scheduling a Scan
To schedule a scan:
(from: http://forum.avast.com/index.php?board=2;action=display;threadid
=3796)
• Go to Start > Programs > Accessories > System Tools > Scheduled
Tasks
• In the wizard that appears click Next - a list of programs will appear
• On the next screen give the task a name of your choice and choose how
often you want it to run and click on Next
• On the next screen choose the appropriate scheduling options and click
on Next
• On the next screen enter the user name and password for the Windows
user you want the task to run as, then click on Next
• On the next screen check the box for the option "Open advanced
properties for this task when I click Finish" , and then clickFinish
• On the next screen, in the "Run" field you will see the path for the
ashQuick.exe program. After the closing quote enter a space and type in
the path(s) that
you want scanned. Multiple paths must be separated by a space and any
paths that include a space in the path name must be in quotes. Here are
a couple of examples:
• Click OK
• In the Scheduled Tasks window, from the menu, click on Advanced and
choose "Start Using Task Scheduler"
• To test your newly created task, from the Scheduled Tasks window,
rightclick on the task's icon and choose "Run" from the popup menu. If
the scan doesn't begin correctly you'll get an error message. The problem
is most likely in the scan path (missing quotes or something like that.)
2nd Step: Update and Install all missing Drivers or install other application
programs. Click Update all or Install specific drivers
3rd Step: Check and review the status list of all successfully installed Drivers.
lOMoARcPSD|39031595
Note: After this installation process, restart the Computer System to take effect
those processes.
• Step 1: Insert the Microsoft Office 2007 Enterprise CD. If the Setup
Wizard does not automatically begin, then click Start > Run > D:\
setup.exe
• Step 2: Enter the Product Key from the back of the CD jacket. Note: This
is a unique code. Please keep in a safe place! Click Continue.
• Step 3: Check the box "I accept the terms of this agreement" and click
the Continue button.
lOMoARcPSD|39031595
• Step 4a: Click the radio button for "Keep all previous versions."
lOMoARcPSD|39031595
• Click the Installation Options tab, left-click the first drop down box and
click Run all from My Computer
Step 7: The first time you launch any Office program, you will be
prompted to activate the software. As long as you have an active Internet
connection, choose the default option and click Next.
lOMoARcPSD|39031595
• Click the check check box to accept the license agreement and click
Continue button.
lOMoARcPSD|39031595
ASSESSMENT CRITERIA:
lOMoARcPSD|39031595
Contents:
1. Safety procedures
2. Testing Procedures
3. Testing Stress
Conditions
1. Hands-on
2. Direct observation
3. Practical demonstration
lOMoARcPSD|39031595
After you Build Your Own Cheap Computer, you need to make a comprehensive
Post Assembly Check. You should check the following: