Connecting Hardware Peripherals
Connecting Hardware Peripherals
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level I
Learning Guide
Unit of Competence: Connect Hardware Peripherals
Module Title: Connecting Hardware Peripherals
LG Code: ICT ITS1 M01 0710
TTLM Code: ICT ITS1 TTLM1 0511
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Learning Activities
Strengths
Weaknesses
Such lists can run to hundreds of pages. It is virtually impossible to read such documents as a
whole and have a coherent understanding of the system.
Such requirements lists abstract all the requirements and so there is little context
This abstraction makes it impossible to see how the requirements fit or work together.
This abstraction makes it difficult to prioritize requirements properly; while a list does make
it easy to prioritize each individual item, removing one item out of context can render an
entire use case or business requirement useless.
These lists create a false sense of mutual understanding between the stakeholders and
developers.
These contract style lists give the stakeholders a false sense of security that the developers
must achieve certain things. However, due to the nature of these lists, they inevitably miss out
crucial requirements which are identified later in the process. Developers can use these
discovered requirements to renegotiate the terms and conditions in their favour.
These requirements lists are no help in system design, since they do not lend themselves to
application.
Recommended approaches for the specification of software requirements are described by IEEE
830-1998. This standard describes possible structures, desirable contents, and qualities of a
software requirements specification.
Types of Requirements
Requirements are categorized in several ways. The following are common categorizations of
requirements that relate to technical management:
Customer Requirements
Architectural Requirements
Architectural requirements explain what has to be done by identifying the necessary system
architecture of a system.
Structural Requirements
Structural requirements explain what has to be done by identifying the necessary structure of
a system.
Behavioral Requirements
Behavioral requirements explain what has to be done by identifying the necessary behavior of
a system.
Functional Requirements
Functional requirements explain what has to be done by identifying the necessary task, action
or activity that must be accomplished. Functional requirements analysis will be used as the
toplevel functions for functional analysis.[1]
Non-functional Requirements
Non-functional requirements are requirements that specify criteria that can be used to judge
the operation of a system, rather than specific behaviors.
Performance Requirements
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.
a.
b.
c.
Note: Satisfactory rating – 13 points above / Unsatisfactory - below 13 pointsYou can ask you
teacher for the copy of the correct answers
System requirements
To be used efficiently, all computer software needs certain hardware components or other software
resources to be present on a computer. These pre-requisites are known as (computer) system
requirements and are often used as a guideline as opposed to an absolute rule. Most software
defines two sets of system requirements: minimum and recommended. With increasing demand for
higher processing power and resources in newer versions of software, system requirements tend to
increase over time. Industry analysts suggest that this trend plays a bigger part in driving upgrades to
existing computer systems than technological advancements.
Recommended system requirements are often suggested by software vendors for optimal
performance of software. Although not a necessity, this set of requirements is often sought after by
power users who expect to gain a better experience of software usability. Recommended System
Requirements do not promise best possible performance of the software and are treated as more of a
guideline than a rule. Almost always a better system is available, or will be in future, to provide better
performance. Also, exceeding by far these requirements does not guarantee to the user that
everything will run with absolute smoothness and look its best. More often than not, games are a bit
disappointing in this respect, presenting issues that may or may not be corrected with future
modifications.
Hardware requirements
The most common set of requirements defined by any operating system or software application is the
physical computer resources, also known as hardware, A hardware requirements list is often
accompanied by a hardware compatibility list (HCL), especially in case of operating systems. An HCL
lists tested, compatible, and sometimes incompatible hardware devices for a particular operating
system or application. The following sub-sections discuss the various aspects of hardware
requirements.
TTLM Development Manual Date: 05-2011 Page 8
of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
Architecture
All computer operating systems are designed for a particular computer architecture. Most software
applications are limited to particular operating systems running on particular architectures. Although
architecture-independent operating systems and applications exist, most need to be recompiled to
run on a new architecture. See also a list of common operating systems and their supporting
architectures.
Processing power
The power of the central processing unit (CPU) is a fundamental system requirement for any
software. Most software running on x86 architecture define processing power as the model and
the clock speed of the CPU. Many other features of a CPU that influence its speed and power,
like bus speed, cache, and MIPS are often ignored. This definition of power is often erroneous,
as AMD Athlon and Intel Pentium CPUs at similar clock speed often have different throughput
speeds. Intel Pentium CPUs have enjoyed a considerable degree of popularity, and are often
mentioned in this category.
Memory
All software, when run, resides in the random access memory (RAM) of a computer. Memory
requirements are defined after considering demands of the application, operating system, supporting
software and files, and other running processes. Optimal performance of other unrelated software
running on a multi-tasking computer system is also considered when defining this requirement.
Secondary storage
Hard-disk requirements vary, depending on the size of software installation, temporary files created
and maintained while installing or running the software, and possible use of swap space (if RAM is
insufficient).
Display adapter
Software requiring a better than average computer graphics display, like graphics editors and high-
end games, often define high-end display adapters in the system requirements.
Peripherals
Some software applications need to make extensive and/or special use of someperipherals,
demanding the higher performance or functionality of such peripherals. Such peripherals include CD-
ROM drives, keyboards, pointing devices, network devices, etc.
Software requirements
Platform
In computing, a platform describes some sort of framework, either in hardware orsoftware, which
allows software to run. Typical platforms include a computer'sarchitecture, operating system,
or programming languages and their runtimelibraries.
Operating system is one of the first requirements mentioned when defining system requirements
(software). Software may not be compatible with different versions of same line of operating systems,
although some measure of backward compatibility is often maintained. For example, most software
designed for Microsoft Windows XPdoes not run on Microsoft Windows 98, although the converse is
not always true. Similarly, software designed using newer features of Linux Kernel v2.6 generally
does not run or compile properly (or at all) on Linux distributions using Kernel v2.2 or v2.4.
Web browser
Most web applications and software depending heavily on Internet technologies make use of the
default browser installed on system. Microsoft Internet Explorer is a frequent choice of software
running on Microsoft Windows, which makes use of ActiveX controls, despite their vulnerabilities.
Other requirements
Some software also has other requirements for proper performance. Internet connection (type and
speed) and resolution of the display screen are notable examples.
Examples
Following are a few examples of system requirement definitions for popular PC games and trend of
ever increasing resource needs:
Windows 95 or NT or superior
TTLM Development Manual Date: 05-2011 Page
10 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
Pentium processor at 90 MHz or higher
16 MB RAM
80 MB available in the hard disk
CD-ROM, 2x or higher
DirectX 3.0 or higher
Spider-Man (2002) needed:
3D Hardware Accelerator
Windows 98/2000/NT/XP
Pentium III processor at 500 MHz or higher
128 MB RAM
1.5 GB available in the hard disk
DirectX 8.1
Doom 3 (2004) needed:
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.
1 System Requirements(5pts)
b.
c.
Note: Satisfactory rating – 18 points above / Unsatisfactory - below 18 pointsYou can ask you
teacher for the copy of the correct answers
Instructions: You are required to perform the following individually with the presence of your
teacher.
You are required to evaluate and recommend system requirements / hardware and system
requirements of an Internet Café having 20 computers. List down all possible requirements
needed for this business.
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics –
Computer Peripherals
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Learning Activities
Computer Peripherals
Computer peripherals are add-on hardware to the computer to expand its abilities or improve its
performance. By adding memory, computers are able to perform a lot better, or by adding video
cards, the computers graphics create more detail. These are just some of the peripherals, although
there is a lot more you can put on your PC, some of them may not be compatible.
Compatibility maybe an issue to some of the peripherals and may even cause the worst outcome –
the PC refuses to boot or the PC refuses to recognise the peripheral being added. The easiest way to
solve that would be figuring out where it started and you can start from there.
Narrow down the problem and re-check the connections – specially the cards you just added-in.
Checking the wires and screws make a difference. And everytime you install a new add-on card, and
it suppose to be plug-and-play but it is not, maybe because you made a mistake in the installation
process. Do not panic. Go through the whole process again and then try ones more. If still nothing is
solve then maybe there might be a compatibility problem.
Technically, every piece of hardware inside your PC requires a driver to communicate and function
with the operating system, the software applications, and other hardware components in your
computer. Software drivers basically translate messages from and to the hardware in question and
the operating system, allowing your computer system to work as a whole— theoretically. Generally,
though appearances may be deceiving, any computer system is actually made up of a bunch of
specialized pieces that do not communicate the low level language of other peripherals and,
therefore, needs a great deal of translation to be able to talk and work effectively with them.
These facts may not solve all the hardware problems you may run into, however, they should solve a
good number of them. The important thing to remember when trying to do any troubleshooting job, is
Common Peripherals:
Storage
Input
Input device
Output
Output device
Display device
Graphical output device
Computer display
A device such as keyboards, printers, or even your computer monitors are known as Peripheral
Devices. Peripheral devices connect to the system unit through the ports on the computer.
Computer data storage, often called storage or memory, refers to computer components
and recording media that retain digital data. Data storage is one of the core functions and
fundamental components of computers.
Many different forms of storage, based on various natural phenomena, have been invented. So far,
no practical universal storage medium exists, and all forms of storage have some drawbacks.
Therefore a computer system usually contains several kinds of storage, each with an individual
purpose.
A digital computer represents data using the binary numeral system. Text, numbers, pictures, audio,
and nearly any other form of information can be converted into a string of bits, or binary digits, each of
which has a value of 1 or 0. The most common unit of storage is the byte, equal to 8 bits. A piece of
information can be handled by any computer whose storage space is large enough to
accommodate the binary representation of the piece of information, or simply data. For example,
using eight million bits, or about one megabyte, a typical computer could store a short novel.
Traditionally the most important part of every computer is the central processing unit (CPU, or simply
a processor), because it actually operates on data, performs any calculations, and controls all the
other components. The CPU consists of two (2) main parts: Control Unit and Arithmetic Logic
Unit (ALU). The former controls the flow of data between the CPU and memory whilst the latter is
used for performing arithmetic and logical operations on data.
Without a significant amount of memory, a computer would merely be able to perform fixed
operations and immediately output the result. It would have to be reconfigured to change its behavior.
This is acceptable for devices such as desk calculators or simple digital signal processors. Von
Neumann machines differ in having a memory in which they store their operating instructions and
data. Such computers are more versatile in that they do not need to have their hardware reconfigured
for each new program, but can simply be reprogrammed with new in-memory instructions; they also
tend to be simpler to design, in that a relatively simple processor may keep statebetween successive
computations to build up complex procedural results. Most modern computers are von Neumann
machines.
In practice, almost all computers use a variety of memory types, organized in a storage
hierarchy around the CPU, as a trade-off between performance and cost. Generally, the lower a
storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the
CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also
guided by cost per bit.
Hierarchy of storage
Primary storage
Primary storage (or main memory or internal memory), often referred to simply as memory,
is the only one directly accessible to the CPU. The CPU continuously reads instructions stored
there and executes them as required. Any data actively operated on is also stored there in
uniform manner.
Historically, early computers used delay lines, Williams tubes, or rotating magnetic drums as
primary storage. By 1954, those unreliable methods were mostly replaced by magnetic core
memory. Core memory remained dominant until the 1970s, when advances in integrated
circuit technology allowed semiconductor memory to become economically competitive.
This led to modern random-access memory (RAM). It is small-sized, light, but quite expensive at
the same time. (The particular types of RAM used for primary storage are also volatile, i.e. they
lose the information when not powered).
As shown in the diagram, traditionally there are two more sub-layers of the primary storage,
besides main large-capacity RAM:
Processor registers are located inside the processor. Each register typically holds a word of
data (often 32 or 64 bits). CPU instructions instruct the arithmetic and logic unit to perform
various calculations or other operations on this data (or with the help of it). Registers are the
fastest of all forms of computer data storage.
Processor cache is an intermediate stage between ultra-fast registers and much slower main
memory. It's introduced solely to increase performance of the computer. Most actively used
information in the main memory is just duplicated in the cache memory, which is faster, but of
much lesser capacity. On the other hand it is much slower, but much larger than processor
registers. Multi-level hierarchical cache setup is also commonly used—primary cache being
smallest, fastest and located inside the processor; secondary cache being somewhat larger
and slower.
Main memory is directly or indirectly connected to the central processing unit via a memory bus.
It is actually two buses (not on the diagram): an address bus and a data bus. The CPU firstly
sends a number through an address bus, a number called memory address, that indicates the
TTLM Development Manual Date: 05-2011 Page
19 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
desired location of data. Then it reads or writes the data itself using the data bus. Additionally,
a memory management unit (MMU) is a small device between CPU and RAM recalculating the
actual memory address, for example to provide an abstraction of virtual memory or other tasks.
As the RAM types used for primary storage are volatile (cleared at start up), a computer
containing only such storage would not have a source to read instructions from, in order to start
the computer. Hence, non-volatile primary storage containing a small startup program (BIOS) is
used tobootstrap the computer, that is, to read a larger program from non-
volatile secondary storage to RAM and start to execute it. A non-volatile technology used for this
purpose is called ROM, for read-only memory (the terminology may be somewhat confusing as
most ROM types are also capable of random access).
Many types of "ROM" are not literally read only, as updates are possible; however it is slow and
memory must be erased in large portions before it can be re-written. Some embedded
systems run programs directly from ROM (or similar), because such programs are rarely
changed. Standard computers do not store non-rudimentary programs in ROM, rather use large
capacities of secondary storage, which is non-volatile as well, and not as costly.
Recently, primary storage and secondary storage in some uses refer to what was historically
called, respectively, secondary storage and tertiary storage.[2]
Secondary storage
In modern computers, hard disk drives are usually used as secondary storage. The time taken to
access a given byte of information stored on a hard disk is typically a few thousandths of a
second, or milliseconds. By contrast, the time taken to access a given byte of information stored
in random access memory is measured in billionths of a second, or nanoseconds. This illustrates
the significant access-time difference which distinguishes solid-state memory from rotating
magnetic storage devices: hard disks are typically about a million times slower than memory.
Rotating optical storage devices, such as CD and DVD drives, have even longer access times.
With disk drives, once the disk read/write head reaches the proper placement and the data of
interest rotates under it, subsequent data on the track are very fast to access. As a result, in
order to hide the initial seek time and rotational latency, data is transferred to and from disks in
large contiguous blocks.
When data reside on disk, block access to hide latency offers a ray of hope in designing
efficient external memory algorithms. Sequential or block access on disks is orders of magnitude
faster than random access, and many sophisticated paradigms have been developed to design
efficient algorithms based upon sequential and block access . Another way to reduce the I/O
bottleneck is to use multiple disks in parallel in order to increase the bandwidth between primary
and secondary memory.
Some other examples of secondary storage technologies are: flash memory (e.g. USB flash
drives or keys), floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks,
and Iomega Zip drives.
The secondary storage is often formatted according to a file system format, which provides the
abstraction necessary to organize data into files and directories, providing also additional
information (called metadata) describing the owner of a certain file, the access time, the access
permissions, and other information.
Most computer operating systems use the concept of virtual memory, allowing utilization of more
primary storage capacity than is physically available in the system. As the primary memory fills
up, the system moves the least-used chunks (pages) to secondary storage devices (to a swap
file or page file), retrieving them later when they are needed. As more of these retrievals from
slower secondary storage are necessary, the more the overall system performance is degraded.
Tertiary storage
When a computer needs to read information from the tertiary storage, it will first consult a
catalog database to determine which tape or disc contains the information. Next, the computer
will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has
finished reading the information, the robotic arm will return the medium to its place in the library.
Off-line storage
Off-line storage is computer data storage on a medium or a device that is not under the control
of a processing unit. The medium is recorded, usually in a secondary or tertiary storage device,
and then physically removed or disconnected. It must be inserted or connected by a human
operator before a computer can access it again. Unlike tertiary storage, it cannot be accessed
without human interaction.
Off-line storage is used to transfer information, since the detached medium can be easily
physically transported. Additionally, in case a disaster, for example a fire, destroys the original
data, a medium in a remote location will probably be unaffected, enabling disaster recovery. Off-
line storage increases general information security, since it is physically inaccessible from a
computer, and data confidentiality or integrity cannot be affected by computer-based attack
techniques. Also, if the information stored for archival purposes is accessed seldom or never, off-
line storage is less expensive than tertiary storage.
In modern personal computers, most secondary and tertiary storage media are also used for off-
line storage. Optical discs and flash memory devices are most popular, and to much lesser
TTLM Development Manual Date: 05-2011 Page
22 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
extent removable hard disk drives. In enterprise uses, magnetic tape is predominant. Older
examples are floppy disks, Zip disks, or punched cards.
Characteristics of storage
Storage devices that reduce fan usage, automatically shut-down during inactivity, and
low power hard drives can reduce energy consumption 90 percent.
2.5 inch hard disk drives often consume less power than larger ones. Low
capacity solid-state drives have no moving parts and consume less power than hard
disks. Also, memory may use more power than hard disks.
Input device
In computing, an input device is any peripheral (piece of computer hardware equipment) used to
provide data and control signals to an information processing system such as a computer or
other information appliance. Input and output devices make up the hardware interface between a
computer and a scanner or 6DOF controller.
Many input devices can be classified according to:
Keyboards
Pointing devices
A computer mouse
A pointing device is any human interface device that allows a user to input spatial data to a
computer. In the case of mice and touch screens, this is usually achieved by detecting movement
across a physical surface. Analog devices, such as 3D mice, joysticks, or pointing sticks, function by
reporting their angle of deflection. Movements of the pointing device are echoed on the screen by
movements of the cursor, creating a simple, intuitive way to navigate a computer's GUI.
Some devices allow many continuous degrees of freedom as input. These can be used as pointing
devices, but are generally used in ways that don't involve pointing to a location in space, such as the
control of a camera angle while in 3D applications. These kinds of devices are typically used
in CAVEs, where input that registers 6DOF is required.
Composite devices
Game controller
Gamepad (or joypad)
Paddle (game controller)
Wii Remote
Video input devices are used to digitize images or video from the outside world into the computer.
The information can be stored in a multitude of formats depending on the user's requirement.
digital camera
Webcam
Image scanner
Fingerprint scanner
Barcode reader
3D scanner
Laser rangefinder
Medical Imaging
Computed tomography
Magnetic resonance imaging
Positron emission tomography
Medical ultrasonography
Audio input devices
Microphone
MIDI keyboard or other digital musical instrument
Output Device
An output device is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system (such as a computer) to the
outside world.
In computing, input/output, or I/O, refers to the communication between an information processing
system (such as a computer), and the outside world. Inputs are the signals or data sent to the
system, and outputs are the signals or data sent by the system to the outside.
Speakers
Headphones
Screen (Monitor)
Printer
Display device
Common applications for electronic visual displays are television sets or computer monitors.
Example diagram of 14-segment display. Note unbroken top and bottom segments in
comparison with a sixteen-segment display.
Electronic alphanumeric displays may use LEDs, LCDs, or vacuum fluorescent
display devices. The LED variant is typically manufactured in single or dual character
packages, allowing the system designer to choose the number of characters suiting the
application.
Sixteen segment display
Sixteen-segment displays were originally designed to
display alphanumeric characters (Latin letters and Arabic digits). Later they
[2] [3]
were used to display Thai numerals and Persian characters.
Fourteen and sixteen-segment displays were used to
produce alphanumeric characters on calculators and other embedded
systems. Applications today include displays fitted to telephone Caller ID units, gymnasium
equipment, VCRs, car stereos, microwave ovens, slot machines, and DVD players.
Such displays were very common on pinball machines for displaying the score and other
information, before the widespread use of dot-matrix display panels.
Applications
Full-area 2-dimensional displays are used in, for example:
Television sets
Computer monitors
Head-mounted display
Underlying technologies
Underlying technologies for full-area 2-dimensional displays include:
Three dimensional
Swept-volume display
Varifocal mirror display
TTLM Development Manual Date: 05-2011 Page
35 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
Emissive volume display
Laser display
Holographic display
Examples:
Monochrome CRT
1922 Monochrome cathode ray tube:
Color CRT
1954 Color cathode ray tube
Light-emitting diode
Eggcrate display
1968 Eggcrate display
Pin screen
Pin screen:
Electronic paper
Electroluminescent display
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask
your teacher. (2pts each)
1. What is the
definition of
TTLM Development Manual Date: 05-2011 Page
39 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
a
Peripheral?
2. What does a
typical
computer
system
consist of?
3. How many
peripherals
can you see
on the
computer in
front of you?
Name them.
22. What is
a
Primary
Storage
23. What is
a
Seconda
ry
Storage
24. What is
a
Tertiary
Storage
2. Look at your computer at home. Make a list of all the INPUT and OUTPUT devices that are
connected to it.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
3. For each of the following devices, list one thing you would consider when deciding to buy it.
a. Monitor: _________________________________________________________
b. Printer: _________________________________________________________
c. Modem: _________________________________________________________
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Verify the timeframe schedule for installation with the client in accordance with the
organization requirements.
Remove old peripherals and or replacing with minimum disruption to clients taking into
account environmental considerations and OHS standards.
Connect new peripherals with minimum disruption to clients and taking into account the
operating system procedures
Configure the computer to accept new peripherals
Learning Activities
Peripheral Devices
Peripheral devices are the devices that are attached to the computer’s system unit. They can be
divided into either:
input
output
communication, or
storage devices.
Examples of peripheral devices include:
monitors
printers
scanners
speakers
headphones
digital cameras
video cameras
joy sticks
USB flash drives
Zip drives
MP3 players
microphones
external modems
data projectors
web cams.
Monitor
Keyboard
Mouse
A printer is a device that allows you to obtain hard copies of the data you have created on your
computer system. Printers are classified by:
1 their quality
2 the speed of printing — pages per minute
3 the print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better. There are
different types of printers due to the different methods of transferring ink to paper. Two common types
for the home and office are inkjet and laser.
SCANNER
A scanner is a device that captures text or
illustrations on paper and converts the
information into a form the computer can use.
One of the most common kinds of scanners is
called a flatbed scanner. It has a glass surface on
which you lay paper, magazines, or other
documents that you want to scan. Sometimes
scanners can be manufactured so that they are
combined with a printer thus can also be used as
a photocopier and fax machine.
Web cam
Digital camera
Digital cameras store images digitally onto a storage device, either a memory card or a floppy disk,
rather than recording them on film. Once a picture has been taken, it can be downloaded to a
computer system, and then manipulated or printed.
Data projector
A device that projects whatever is on the computer’s display onto a big screen. A data projector is a
useful aid for presentations or it can also be used for DVD playback onto a large screen
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask
your teacher.
Below are pictures of the most common connections you will see on the back of any computer. You
need to know what each of these does. Match the name of each cable with the correct picture.
2
USB CABLE - Most PC's now
have these fast and versatile ports
on the front and back. They can
be used for portable storage
devices, digital cameras,
scanners, video cameras, printers,
keyboards and mice - just about
everything!
The system development life cycle is a methodology that computer consultants often follow to help
them properly investigate the client’s information technology needs. The first three stages of the
system development life cycle are:
1 planning
2 analysing
3 designing.
Planning
This stage involves identifying the client’s current technology and taking into account any limitations.
During the planning phase it is necessary to find out information including:
system specifications
connections available
budget constraints
available timeframe
availability of physical space.
A feasibility study can be performed to provide a preliminary report to the client about benefits,
costs and impact to the organisation. Additionally, a project request form allows a client to
document their initial request.
System specifications
Connections available
The majority of external peripheral devices connect to the back of the computer’s system unit with
cables. The computer’s system unit has a variety of ports available for use by different peripheral
device cables. A port is a socket that is used to connect the cables from peripheral devices to the
computer.
Serial port
Serial ports can be used to connect a mouse, keyboard or external modem. They send data one bit at
a time and are good for sending information over long distances.
Parallel port
This port is used to send of lot of data over a short distance. Printers often use parallel ports.
Firewire port
This is a more recent port, 33 times faster than a USB port. It is typically used for video cameras and
often need the installation of an internal adapter card.
The keyboard, mouse and monitor can also have their own designated ports.
Budget constraints
While planning the connection of hardware peripheral devices, it is important to be aware of the
client’s available budget. A client needs to determine whether the benefits that will be gained from the
peripheral device justify the financial outlay. Factors including the organisation’s size, the necessity of
the peripheral device to the organisation, number of people requiring the device, will all contribute to
the organisation’s allocation of a budget. Costs will sometimes prohibit an organisation from
proceeding with the purchase of equipment.
Another cost to consider is ongoing maintenance. A laser printer, for example, may initially be more
expensive to purchase than an inkjet printer. However when you consider that some inkjet cartridges
can cost nearly as much as an inkjet printer, it may be more practical to choose a laser printer, where
toner costs are more reasonable.
Available timeframe
The time available to complete a task also needs to be considered when identifying client
requirements. If, for example, a peripheral device is needed urgently, it will be necessary to quickly
find out which suppliers can immediately provide the peripheral equipment.
Before considering acquiring any peripheral device, planning needs to be done to work out where and
how the peripheral will reside. The following questions need to be considered:
What physical space is available to accommodate the device?
Are power points in a near proximity if the device needs them?
TTLM Development Manual Date: 05-2011 Page
53 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
If a peripheral does not have access to a suitable power source, problems may occur including
the overloading of power boards and power leads causing dangerous obstructions to users of
the equipment.
Will the installation of the device mean other equipment needs to be relocated?
Could the device cause disruption or impact on the safety of users?
Feasibility study
A feasibility study can be carried out to show the client benefits, approximate costs of the new
equipment and the impact on the organisation. Several hardware devices can also be recommended
to the client. The aim of the feasibility study is to recognise the best solution under the circumstances
by identifying the effects of this solution on the organisation.
After undertaking a feasibility study, it may be discovered that a simple solution is possible. Take the
example of an organisation that would like to update their monitors so that they can have better
screen resolution. Changing the monitors’ internal settings could be a very simple solution to obtain
an improved resolution.
A feasibility study can also reveal that a client’s peripheral requirements are not achievable. The
requirements may exceed budget, or the requested peripheral devices may not be compatible with
the current computer system. The results of a feasibility study can determine whether or not an
organisation proceeds with the purchase and installation of the peripheral devices.
An initial request for hardware peripheral devices can be documented using a project request form.
This form documents information from both the client and the computer consultant in order to
document preliminary requirements.
Typical information requested on a project request form includes:
project title
date received
completion date
project number
description of problem
objectives
anticipated benefits
person requesting
constraints.
Request Date:
Required Completion Date
Request information:
Department / Division:
Telephone:
Email Address:
Project Title:
Project information
In the analysis phase, the client’s requirements are investigated in more depth. It is important to try to
gain as much information from the client as possible, in order to obtain an accurate understanding of
the situation. Detailed client requirements, such as:
specific features of the device required
the number of people who will need to use device
support expectations
training requirements
can all be obtained during this phase.
Interviews, questionnaires, checklists and observations are some methods that consultants use to
gather information. If a device is to be used by a large group of users, a questionnaire or checklist
could be constructed to find out what features are required by the majority of users. Interviewing
users can provide a better way of finding out specific information.
Interviews
A well-prepared interview can help provide you with valuable information about your client
requirements. Information that has been collected during the planning stage can also give you some
useful background information when preparing questions.
Questions asked of a client may be specific or open ended. Specific questions generally mean that
the client will give either a yes/no response or a specific answer. Open-ended questions, however,
generally commence with ‘how’ or ‘why’. These types of questions help to discuss and clarify issues
and establish a firmer understanding of client requirements.
For example, some questions you may want to ask during an interview to replace an existing printer
could include:
How will a new printer solve existing printer issues?
Who will be using the new printer the majority of the time?
What will be the new printer key purposes? Eg:
– letters
– advertising brochures
– information from the Internet.
Why do you need colour printing?
What is the approximate number of pages that would be printed each day?
Questionnaires
Questionnaires are helpful when you need to gather information from a number of clients. A number
of questions incorporating short answers, multiple choice and true/false choices can help you quickly
determine what kinds of features the majority of clients are requiring.
Here is a sample questionnaire to help establish a suitable mouse:
1 Trackball feature — Would a trackball device be helpful for you to manipulate images? Yes/No
2 Would you prefer a wireless mouse? Yes/No
3 List any other features you would like to be able to have available with your mouse:
___________________________________________________
___________________________________________________
Checklists
In a similar manner to questionnaires, checklists that ask clients to choose what features they would
like from a specific peripheral device can also provide an efficient way to determine a set of popular
requirements.
Observations
Even informal observations of current business procedures can provide another way of determining
client needs. Observing users as they go about their day-to-day tasks, can confirm if current
peripheral devices are not working properly or assessing the need for a new peripheral device.
Designing
The design phase enables you to figure out an effective solution. All the information you have
gathered via questionnaires, interviews, observations and during planning can be assessed to
determine the best way of satisfying client requirements.
There will often be several peripheral devices that are capable of performing the job satisfactorily. An
evaluation grid can be created to show the client each device’s functionality.
The example below illustrates an evaluation grid that could be used for appraising scanners.
Once client requirements have been clarified, all requests for hardware peripherals need to be
documented clearly in a concise form. An organisation will often have its own organisational
standards (for example, report templates, guidelines) to which you will need to adhere. The
documentation will also need to be checked and confirmed by the client before a request for purchase
in sent to the preferred supplier.
Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties, service and
support, prospective suppliers will provide.
Warranties
A warranty is an agreed upon term which covers a computer or computer component. Generally,
most computers have a 1 or 3 year warranty. This warranty may or may not cover the service, repair
and replacement of computer parts.
An extended warranty is an available option provided by manufacturers or third-party companies that
provides additional support and/or repair of a computer or other hardware devices beyond its
standard warranty.
It is important to know what kind of support services are offered by the prospective supplier. There
are many questions to consider such as:
If a device requires repairs does it have to be sent back to the supplier (called ‘Return to base’)
or will they provide on-site visits?
What is the average response time if service is required?
What kinds of maintenance and repair costs could be incurred during the duration of use of the
device?
Will the device require regular servicing? If so, how many services will be necessary over a one-
year period?
There are a large variety of peripheral devices that can be connected to a computer for input, output,
storage or communication purposes.
Before acquiring any hardware peripheral device it is fundamental that you have a clear
understanding of what the client requires. This requires a considerable amount of planning and
analysis of needs. Examining system specifications, checking availability of ports, physical space,
and confirming budgets and time frames are just some considerations that need to be taken into
account. Methods such as interviewing, questionnaires and observation can all assist gathering this
information.
Once client requirements have been clarified, suggested solutions need to be documented to the
client in accordance with organisational standards. A solution can comprise a suggested list of
products. Once the product has been chosen this needs to be verified by the client. Before
proceeding with the purchase, it is also important that the warranty and support agreements of the
supplier will be satisfactory for the client’s needs.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask
your teacher.
Identify and define the three stages of System Development Life Cycle (5pts)
a.
b.
c.
Instructions: You are required to perform the following individually with the presence of your
teacher.
As per below image, a variety of ports available for use by different peripheral device
cables, demonstrate to your teacher what are those connectors.
Testing Peripherals
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Connect the workstations to the internet through the existing internet connection and
confirming the functionality.
Launch Internet browser to enable access to the Internet and confirming the functionality.
Learning Activities
How to get
connected
Information Sheet-1
to the
Internet
The basic requirements are a computer, a modem, a phone line, and a contract with an Internet
Service Provider (ISP).
Modem –
Phone Line - Dial-up Internet access is a form of Internet access that uses the facilities of
the public switched telephone network (PSTN) to establish a dialed connection to an Internet
TTLM Development Manual Date: 05-2011 Page
64 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
service provider (ISP) via telephone lines. The user's computer or router uses an
attached modem to encode and decode Internet Protocol packets and control information into and
from analogue audio frequency signals, respectively.
The term was coined during the early days of computer telecommunications when modems were
needed to connect terminals or computers running terminal emulator software
to mainframes, minicomputers, online services and bulletin board systems via a telephone line.
**Availability
Dial-up connections to the Internet require no infrastructure other than the telephone network.
Where telephone access is widely available, dial-up remains useful to travelers. Dial-up is often the
only choice available for rural or remote areas, where broadband installations are not prevalent due
to low population density, and high infrastructure cost. Dial-up access may also be an alternative for
users on limited budgets, as it is offered free by some ISPs, though broadband is increasingly
available at lower prices in many countries due to market competition.
Dial-up requires time to establish a telephone connection (up to several seconds, depending on the
location) and perform handshaking for protocol synchronization before data transfers can take
place. In locales with telephone connection charges, each connection incurs an incremental cost. If
calls are time-metered, the duration of the connection incurs costs. Dial-up access is a transient
connection, because either the user, ISP or phone company terminates the connection. Internet
service providers will often set a limit on connection durations to allow sharing of resources, and will
disconnect the user—requiring reconnection and the costs and delays associated with it.
Technically-inclined users often find a way to disable the auto-disconnect program such that they
can remain connected for days.
Internet Service Provider (ISP) - Short for Internet Service Provider, it refers to a company that
provides Internet services, including personal and business access to the Internet. For a monthly
fee, the service provider usually provides a software package,username, password and access
phone number. Equipped with a modem, you can then log on to the Internet and browse the World
Wide Web andUSENET, and send and receive e-mail. For broadband access you typically receive
the broadband modem hardware or pay a monthly fee for this equipment that is added to your ISP
account billing. In addition to serving individuals, ISPs also serve large companies, providing a
direct connection from the company's networks to the Internet. ISPs themselves are connected to
one another through Network Access Points (NAPs). ISPs may also be called IAPs (Internet Access
Providers).
TTLM Development Manual Date: 05-2011 Page
65 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
Name:____________________ Date:_________________
Directions: Answer all the questions listed below. Illustrations may be necessary to aid
some explanations/answers. (5pts eah)
1 What is a MODEM
2 What is a ISP
Basic guide for simple home network (LAN) for File, printer & Internet connection Share
It is common for many of us to have multiple computer (desktop / laptop) in your home or in small
office. Often we face the question and need to hook them up in simple network to make sure that
we can share a single Internet connection or share files and folders to access them from different
computer.
Mostly many of us look for professional help since these heavy words (like networking / file share /
user permission) name us afraid of the task ahead. However matter of fact is, the process is pretty
simple and any one with basic knowledge of Windows operation can accomplish the job.
Here is a simple and basic step by step guide on how to setup / create a home network (LAN) for
file, printer and Internet connection sharing.
Setup 1 -> Planning
Before you proceed, planning is required to judge and figure out which type network is best suited
for you.
For example, type 1
This type of network is suitable in case of you having ADSL or cable connection coming with
direct plug n play type. Here your router come switch/hub gets connected to the Internet and then
shares the connection to your PC via NAT local IP.
Then again, you have the type 2,
Here, a PC gets connected to the internet and then it shares the connection to others while getting
connected to each other using the help of a network switch / hub or router via CAT5 connection
(LAN) cable.
Step 2 -> Hardware / Software needed
Depending on the type of network you may need following hardware.
Hub -> http://en.wikipedia.org/wiki/Ethernet_hub
Switch -> http://en.wikipedia.org/wiki/Network_switch
Router -> http://en.wikipedia.org/wiki/Router
CAT5 wire -> http://en.wikipedia.org/wiki/Category_5_cable
LAN Card -> Usually all our PC / notebook comes with a built-in network card and port (CAT5).
Software -> Setup will work with any of these OS installed Windows XP SP2 or higher / Windows
Vista / Windows 7 / Server 2003 SP2 or higher / Server 2008 / Server 2008 R2
Step 3 -> Software Configuration
In any of the above type network, basic network connection (LAN / IP) would be same.
The PC or device which will have the live internet connection should have IP address 192.168.1.1
where as the others (PC / notebook) will have IP address 192.168.1.2 / 192.168.1.3 and so on to
access the internet from first PC.
How to set / configure IP address in Windows Vista / Windows 7 / Windows Server 2008 and
Windows Server 2008 R2 ?
In Windows Vista or Windows 7, Right Click on Network on Start menu and click on “Properties”
It should open the network control panel, in which at its LHS (left hand side) you may find the option
to manual configure your network adepter settings.
Under Network connection, there may be multiple connection visible, therefore select your LAN
connection and right click to go to its properties.
It should offer you the advance settings Window and option for the said network connection. There
you can find an option called “Internet Protocol Version 4 (TCP/IPv4)”, select and click properties to
access the option to set the value manually.
How to set / configure IP addresses in Windows 2000 Windows XP / Windows Server 2003 /
Win2k3 R2 ?
Under My Computer, right click on the option “My Network Places” and click properties.
It should present the network adapter settings window displaying the available network connections.
Here, please select your “local area connection” and right click on to find the option “properties” to
TTLM Development Manual Date: 05-2011 Page
72 of 84
3rd Revision Author: MoE – TVET Outcome Based Training Core Process
Ethiopian TVET System
Training, Teaching and Learning Materials Development
access the advance settings for entering values for the manual IP configuration.
It should present you the advance settings Window, there please select “Internet Protocol (TCP/IP)”
and click properties to access the panel to enter the manual IP address value.
What IP address value to set ?
As we have discussed early, the PC (running any OS) or if the router (in case of type 1), which will
have thelive internet connection and act as a server to share it, should contain follow IP address
settings,
IP address -> 192.168.1.1
Subnet Musk -> 255.255.255.0
Default Getway -> Blank
DNS -> Blank
Now to the PC / Computers or Notebooks in the network, which will access the internet from the
acting server or PC1 or from the router.
IP address -> 192.168.1.2 (and then next PC 192.168.1.3 and so on)
Subnet Musk -> 255.255.255.0
Default Getway -> 192.168.1.1
DNS -> 192.168.1.1 (in case, this following value does work, then set the numbers given by ISP or
useOpenDNS)
By now, if done properly, your PCs are connected with each other on a simple Local Area
Network.
Make sure you have powered ON all the PCs and your network switch / router or hub for a test run.
To check the connection with each other, in every PC open the command prompt and use PING
command to verify the connectivity.
Run command PING ip-address-of-another-PC -> example, PING 192.168.1.1 (when testing the
server from a HOST PC). If the things are connected, then it should present you a successful
results with 0% loss. If Ping results time out, it means something is wrong and you should review to
check everything again.
Step 4 -> Turning on the Internet Connection Share
In Type 2 networks, One PC dials a connection to get connected to the Internet and share the
connection with others by acting as a server. Your acting server can be a PC running any OS
(Windows XP / Vista / 7). Please visit the Network settings of this PC again.
Now right click on the Internet connection (your internet connection can be from any type or from
any service provider using any name) to access the “properties” option.
Under the advance settings, please visit the “share” TAB to check on all the option to share the
said connection with all PCs connected in this Network.
Under Advance Sharing option panel, select “share” and allow permission with full control for user
“everyone” for seam less access of this folder or file or drive with every computer under your home
network.
How to share drive / file or folder under Windows 2000 / Windows XP / Server 2003 ?
Make sure you have the latest update (Service Packs) installed for these legacy Operating systems.
Open “My Computer” click “Tools” in the menu bar and go to “Folder Options”.
Under “Folder Option”, visit the “View” tab and scroll down to un-check “use simple file sharing”
to turn offthe option for Windows XP / Windows Server 2003.
Now “Right Click” on the folder / file or drive you wish you share and click “properties” to access the
advance panel for sharing options.
Under properties, visit the “sharing” tab to create a “new share” and allow full permission given to
use “everyone” for seamless connectivity and access for all users under your home network or
small business/office network.
You are done. By following this in every PC where you wish you have a shared drive or folder, can
now be visible and accessible for all users accord the network.
How to access a shared PC (drive / folder / file) from another one in the network ?
You can access the shared PC or its drive or folders by entering its IP address or name in
your Windows explorer window with “\\” as prefix.
Instructions: You are required to perform the following individually with the presence of your
teacher.
Demonstrate a step by step guide on how to setup / create a home network (LAN) for file,
printer and Internet connection sharing.