CSS: Computer Systems Servicing NCII What is Computer Systems Servicing (CSS NCII)? Computer Systems Servicing (CSS NCII) is the upgraded version of what is then called Computer Hardware Servicing (CHS NCII) qualification. During the late CHS, the qualification was said to be of the NCII level, meaning that in a ranking basis, it is the baseline level.
Some competencies have the NCII, NCIII and NCIV levels. CHS was given an NCII level because, well, for a fact, it was not that difficult to pass, but still, many students and/or even professionals fail.
When TESDA decided to upgrade the CHS competency, they forgot or maybe they have just decided not to adjust its ranking level. Most IT professionals would certainly certain ly agree that the CSS competency deserves to be of the NCIV level.
What are the differences between CHS NCII and CSS NCII? The old CHS competency covered just two (2) modules and you are only expected to perform a couple of tasks to pass the actual examination. The examination includes a question and answer portion before proceeding with the actual hands-on configurations and the same goes for the CSS NCII exam.
To cope up with the hastened trend of technology advancement, CSS was introduced, introduced , and instead of having just two (2) modules, this new competency has four (4). This seems to be a great move to ensure that we are not left behind on what is the new global standard in technology.
What are the four (4) modules of Computer Systems Servicing? Install and Configure Computer Systems
This module expects that you can do the following: 1.
Disassemble a computer system
Take inventory of everything that you remove from the system until the case is empty 3. Assemble the computer 2.
Create a or DISKPART command 4.
bootable
USB
5.
Configure Basic Input Output (BIOS) setup
6.
Install an Operating System
using Rufus application
Create multiple partitions (three (3) partitions) with corresponding percentages 7.
8.
Install the drivers
Install the applications (MS Office, Anti Virus) and pin them on the desktop 9.
For personal practice, you will need the following: 1.
1 computer set
2.
1 screw driver
3. 4.
1 USB Rufus Application
5.
Microsoft Office (any version) installer
6.
Anti-virus software
7.
Computer drivers (Driver Pack Solution)
8.
Microsoft Operating System ISO image
The tasks are fairly easy to perform. The catch though is that you should be familiar about the different hardware components of the system, their versions, functions and importance. The good news is that we will tackle every important detail about this and every module on each succeeding post on this blog. Links on the tools (software / installers) will also be provided.
Setup Computer Networks
This module expects that you can do the following:
2.
Create cables – crossover, straight-through, patch panel Configure a wireless router
3.
Configure an access point
1.
Connect the devices – one (1) laptop, one (1) desktop client, one (1) desktop server 4.
5.
Test connectivity
6.
Create folders and configure shares
For personal practice, you will need the following: 1.
One (1) laptop
2.
Two (2) desktops
3. 4.
Unshielded Twisted Pair (UTP) cables Registered Jack #45 (RJ45)
5.
Crimper
6.
Cable Tester
7.
One (1) router
8.
One (1) wireless access point (WAP)
9.
One (1) patch panel with modular box
10.
One (1) Screw driver One (1) switch
11.
If these items are not available, you can just create your Virtual Lab for configuration practice. But the making of the cables should be practiced separately. In the future post, we will configure a Virtual Lab environment for module two (2) practice which can also be maximized for module three (2).
Setup Computer Servers
This module expects that you can do the following: 1.
Install and configure a Windows Server 2008/2012 OS
2. 3.
Promote the server to a Domain Controller Configure the Domain Name Service (DNS) role on the server
4.
Configure the Dynamic Host Configuration Protocol (DHCP) role on the
server 5.
Create an Organizational Unit (OU) and create two (2) user accounts
6.
Join the clients (laptop and desktop) to the domain
7.
Install the File and Storage role on the server
8.
Create a share in the server and map it on the clients
Create a folder in the server; share it (read/write) for FOLDER redirection. 9.
10.
Redirect documents and desktop of the clients
11.
Configure remote desktop on all the machines
12.
Install Print Management
13.
Install a printer in the server, install the driver Configure printer deployment
14.
For personal practice, all these can be done on our Virtual Lab.
Maintain Computer Systems
This module expects that you can do the following: 1.
Create a system restore point
2. 3.
Create a system backup image Use the created restore point to restore the system
4.
Use the created backup image
5.
Use disk defragmenter
6.
Use disk cleanup
7.
Scan the system for viruses
For personal practice, all these can be done on our Virtual Lab. There we go! All these tasks for eight (8) hours but I assure you, you would not need that much time.
Next, we will start with module one (1), definition of terms, the technologies, their functions and importance before we proceed with the actual task performance.
CSS: Computer Hardware Components In order to pass the CSS Exam from TESDA, we should be knowledgeable about the components of a computer system and their functions.
In this blog, we will tackle these components As Fast and As Simple As Possible.
1. The CPU. The CPU - Central Processing Unit, commonly called processor is where all of the functions, tasks, and computations occur. Although it is the powerhouse center, it cannot do these processes alone. It needs other components to do its tasks.
The two prominent manufacturers of CPUs are Intel and AMD.
2. The Motherboard. The motherboard is the framework of the computer system. It is the component in which all of the other components are connected and inserted. In the motherboard also resides the data busses. Data busses are pathways on the motherboard that allows the transfer of instructions from one component to another. External components such as monitors, speakers, microphones and USBs also connect to the motherboard.
You will also see the Northbridge and the Southbridge in the motherboard. The Northbridge controls the data pathways and communication of the heavily used components of the system; the memory, cpu, video. The Southbridge, on the other hand, controls communication on the "not so important" and minimal components of the system; the usb, serial ports, BIOS, audio et cetera.
3. The Memory or RAM. The memory does not control anything. It serves as the storage of all the functions, applications, services, programs, features, instructions that are being utilized by the CPU. It is in the memory where our Operating System is loaded.
To have an idea of the memory's function, imagine this scenario.
Your computer has 1 gigabyte of memory. When the Operating System is loaded, it occupies let's say, about 100 Megabytes. You then opened a few web browsers, lots of websites (YouTube, Facebook, Twitter), and you also opened PC applications such as Microsoft Word, Powerpoint, Photoshop et cetera. You will then notice slowness on your computer depending on how occupied your memory is. If you've reached the maximum of 1 Gigabyte, some systems tend to see the BSOD - Blue Screen of Death error. This is the result of memory overload wherein the memory has to offload a few programs or functions to accommodate to the ones being currently used by the p rocessor.
4. The Hard Disk Drive. The HDD is our non volatile storage. Contrast to the memory being volatile (it loses all data on power loss), the HDD retains all that is saved permanently. When we first install our Operating System, it is saved in the HDD, a recovery partition is also created amounting to 100 to 300MB. This allows for system recovery in case of errors.
The HDD is also where we save our fi les; music, videos, documents, pictures et cetera. When you install an application, it is also installed in the hard disk drive.
The newer version of the HDD is t he SSD or Solid State Drive. They both function as storage but instead of using disk platters, SSDs use Integrated Circuits and memory organized as disk drives.
Now, these are only the main components of the computer system. There are still quite a few that contributes to the total functioning of the system. Saturday, 26 August 2017
Common Networking Devices and their Functions This is a very brief article about the different devices used in a network and their particular purpose.
1, The most common end points in our networks are the computers. Inside the computers we have the Network Interface Card or NIC. This is what allows our computers to be able to communicate in the network. We do have the wired and the wireless. It is in these NICs where theMedia Access Control Address or MAC Address is burned to. No two NICs can have the same MAC Address. This is for the purpose of i dentification.
2. The switch is most commonly what is on the other side of our cables connected to our devices. The purpose of the switch is simple; to allow our devices to communicate internally and to be able to connect more devices in one network. Embedded on each switch port is the ASIC, Application Specific Integrated Circuit which allows simultaneous data transfer as contrast to the old hubwhich only allowed one communication at a time no matter how many ports it has.
3. The router. I have written a more detailed article about a router here. But, mainly, a router's role is to allow our devices to communicate to other networks. It serves as the receiving point in and out of the internet which the switch is not capable of doing.
4. The cables. In networking, you will always encounter different types of cables with different purpose, specifications and limitations. The most widely used cables are the Twisted Pair and Fiber Optics. These cables are very much different. The twisted pairs have a limit of 100 meters and usepulses of electricity to transmit data while the fiber optics use Light Emitting Diode and Lasertechnology and are used for very long distances ranging from 2 to 100 kilometers.
So, to summarize, all we need are these four essential devices / materials to be able to create our networks.
CSS: COC1 - Install and Configure Computer Systems STEPS and INSTRUCTIONS 1.
Remove all jewelries, watches, and static. Or at least show the assessor you are doing so.
2.
Disassemble the computer while taking notes on what peripherals you are taking out from the unit. You will have to remove also the processor, power supply and the motherboard from the case. a. Example, if you remove a memory card, write the quantity (1 piece), the type (DDR3), and description (1GB). That’s why it is important that you know the parts of a computer. b. TIP: count the cables that you disconnect from the motherboard and know to which they are attached to. c. Pay attention also to the cables for the front panel of the PC. E.g. light indicators for HDD, reset button, power button, usb power et cetera. One missed cable will cost you lots of time. 3. Assemble the computer. a. Now this is fairly simple. Last out should be first in. Use the list of the items that you removed as reference. b. Once done. Turn on the PC. If it’s working, good for you. If not, troubleshoot as fast as you can and do not be disheartened. There’s a lot of time! 4. Create a bootable USB. You have to know how to create a bootable usb using the DISKPART command in the command prompt and/or how to make a bootable usb using RUFUS. Search the ne t, it’s simple. The assessor will not really make you create the bootable usb, he/she will just check if you know the process. 5. Once done, the assessor will hand you a working bootable usb which you will use in reformatting the PC. NOTE: If the usb isn’t working, ask for another one. I had an experience wherein the one they gave me did not work. Remember, time i s limited. 6.
Insert the usb, configure the BIOS to boot from the usb then restart your PC.
7. a.
Go on with the formatting process. You will be asked to create three partitions with specific disk space, know how to.
8. a. b. c. d.
Once OS installation is finished, you will be handed a new usb containing the drivers and applications which you will use. Install the drivers first Install MS Office Suite Install Anti-virus Pin the shortcuts to the desktop
9.
Have the assessor check your work.
END OF Module 1
CSS: COC2 - Setup Computer Networks STEPS and INSTRUCTIONS 1. Create 1 cross-over cable, 1 straight-through cable and patch panel cable. a. I consumed lots of time on this simple task due to the dullness of the crimping tools. Bring your own if you can. b. Obviously, you’ll have to know the wiring standards of T568A and T568B to create the cables. c. Every patch panel is different, so before taking the exam, visit the assessment center and check the patch panel type and color coding. The one I used had no color coding on it. d. You must have every cable checked when finished at once by the assessor in order to move on.
2.
Connect all the devices together using the cables. 2 desktops 1 switch 1 patch panel 1 wireless router 1 access point 1 laptop which will be connected wirelessly after configuring the router and the access point. a. Drawing
included
in
the
reviewers.
** Additional cables will be provided 3. Once all devices are connected, get the mac addresses of the pc, server and laptop for the purpose of assigning them IP Addresses using DHCP reservations. Note the mac addresses down together with the corresponding unit to avoid confusion. To get the MAC Address, open command prompt and type “getmac” or “ipconfig”. a.
b. c. d. e.
Here, although the devices are all configured to get IP addresses using DHCP, you will be instructed to select an IP address specifically that is why DHCP Reservations should be configured. For example. Create a DHCP Pool of 192.168.1.100 to 192.168.1.200 From the pool, the IP 192.168.1.114 should be assigned to the pc 192.168.1.117 should be assigned to the server 192.168.1.155 should be assigned to the l aptop
4. Configure the router using your web browser to access it's interface a. In order to access the router’s interface, look for its IP address at the back of the device. If it’s not there, you can ask the assessor. If the router’s address is indicated on the back of the device but you are unable to access it using that address, reset first the router by pressing the power button for 10 to 20 seconds. Usually, the password to access the interface is indicated also on the device. Ask the assessor if otherwise. b. Create the DHCP Pool as instructed; the ranges will be given by the assessor. c. Change the SSID and configure wireless security using WPA2. d. Configure DHCP reservations. e. Check your work by pinging the connected devices, if task is accomplished, move on to the access point. 5. Configure the Access Point a. Same steps as the router, you just have to change its SSID and IP configuration that corresponds with the IP subnet you are using. 6.
Now, connect the laptop to the access point.
7. Test interconnectivity of all the devices by using the “PING” command. Make sure the devices got the correct IP addresses reserved to them. 8.
Create folders on all the devices, share the folders and make sure everyone has read/write permissions.
9.
Show your work to the assessor, he will give you i nstructions to test your work. END OF module 2
CSS: Creating our CSS NCII Virtual Lab Part 1
Nothing can replace hands-on experience, it's true. A study was conducted and it proved that you are more likely to remember something if you actually have done it. That's why a virtual lab is important. I, for one, have had a few labs of my own. I started when I practiced for my CompTIA A+ exams, I also had a lab for when I was studying for CISCO, I had one when I did a self study on Computer Systems Servicing NCII and I have one now while I'm on track for my Windows Server certification. I always did remember a lot through the use of these labs wherein a did tasks one after another more than once. And whatever configurations I did, did not affect my physical device's setup. Virtual labs are made possible by the technology known as virtualization. It literally has broken the barrier to lots of things. Let's enumerate and explain some.
1. Before, in order to do a practice using two (2) computers, you really would need to have two (2) computers. But now, not anymore. With virtualization, you can build another computer or even more on top of the existing system that you have. 2. Virtual labs are safe for practice. Safe in a sense that if you try to configure something that has a potential to disrupt your configuration totally, you need not worry because if you made a mistake you just build it again and that has no effect on your physical system. 3. In a business perspective, companies don't need to have hundreds of bulky heavy machines in their environment. Nowadays, they maximize the use of virtualization by building all of their servers in just one, two or three physical machines. This has greatly reduced the cost for purchase and maintenance. Virtualization does have tons of benefits but for our purpose, we only need to learn a few - the basics. It does have, as most things do, some catch. The first concern is the ability of your device (desktop / laptop) to support virtualization. If it does, how many machines can it support? Typically, the ideal machine to build a virtual lab on is one that has is a 64-bit architecture.
64-bit systems break the limit for memory usage, thus, you can have more than 4 GB in your system. Keep in mind that when you create one (1) virtual machine, the resources that you allocate to it are really being taken from the physical machine. For instance, consider the following specifications:
This machine only has 3 GB of memory. It's possible to create a virtual machine on top of this device but it will greatly strain the physical machine. If I gave the virtual machine 1 GB of RAM, the physical machine is left with 2 GB which is not enough to carry out multiple processes at one time. Can't we add some memory then? Yes, we can. But since it's a 32-bit Operating System on a 32-bit machine, we can't exceed more than 4 GB. If your machine is virtualization capable, we can create our virtual environment. Please download the following installers that we will use. 1. Oracle Virtual Box 2. Windows Server 2012 R2 Evaluation 3. Windows 8.1 Evaluation Note that you need to register before you can download.