Chapter Three Introduction to Computer Troubleshooting

Total Page:16

File Type:pdf, Size:1020Kb

Chapter Three Introduction to Computer Troubleshooting Chapter Three Introduction to Computer Troubleshooting Welcome to the Machine Introduction to Computer Troubleshooting What are the three steps in the computer troubleshooting process? What do you do if the three steps does not solve your problem? DON’T PANIC!” When things go wrong remain calm, as most computer problems are a simple fix. Even if it is the rare serious problem, usually your data is still there waiting for you. The computer troubleshooting process at its most basic is gathering information about what is going on, drawing conclusions about the information gathered, and acting on those conclusions to solve the problem. If that does not solve the problem, then we return to the gathering information stage and go through the steps again. You might think of it as a loop which we exit when the problem is solved. At the top of the paragraph, I said that most computer problems are a simple fix and I would like you to keep that in mind as we go through this chapter. Important Words in this Chapter Cables Memory Simple-to-Complex Connectors Monitor Surge Protector CPU Motherboard System HD (Hard Drive) NIC (Network Card) Troubleshooting Input Devices Power Supply Video Card Main Troubleshooting Principle What is the principle on which we base all efficient and effective troubleshooting? All efficient and effective troubleshooting is based on the principle of proceeding from the simple-to-the- complex. Why is this true? Starting with complex items first, can cause you to draw the wrong conclusions. The complex parts of a computer depend on the simpler things. Drawing wrong conclusions means that you waste time trying to fix and troubleshoot something that is not even the problem. Troubleshooting in a haphazard (i.e. a random, unplanned approach) way often creates additional problems. You can forget what you have examined and what remains to be checked. What is Simple? When troubleshooting, what is the simplest or most basic level in a computer? Read the green sidebar. Has something similar ever happened to you? What two concerns do you have when using a Surge Protector? When should you replace a surge protector? What is a simple and safe way to check, or verify, that an electrical outlet is providing power? Simple means starting at the most basic level in troubleshooting the system with which you are experiencing problems. The most basic level is cables, connectors, and electrical power. Check to make sure that all cables (i.e. power, Ethernet, printer, mouse, keyboard, and any other external devices) are plugged securely into their respective ports. Don’t just look at the cables; push on them to make sure that they are pushed completely into the proper jack or socket. Once when I was still troubleshooting and repairing computers for the RC school system, a teacher had me come to look at her printer, which had quit working. It would have been easy to go into the printer settings on the computer to try to solve the problem; however, I started at the simple end of things. I checked the printer and power cables. I found the printer cable connected at both ends; however, the power cable was unplugged. I plugged it in and the printer began to work again. The teacher was plugging several things into a power strip run to the center of the room via an extension cord. Due to a full power strip, she had unplugged the printer and plugged in an overhead projector. When she finished with the overhead projector, she forgot to plug the printer back into the power strip. With respect to Figure 1 Surge Protector/Power Strip electricity, there are some other considerations. If you plug your computer into a surge protector, “Is the surge protector on?” Remember too, that surge protectors, by design, protect your computer by sacrificing themselves. After protecting your computer from one or more surges, the surge protector will cease to work. Many surge protectors have a light in the switch to indicate if they are working. If checking a surge protector that has an indicator light, “Is the indicator light working?” When the light ceases to work (telling you that it is no longer providing surge protection), you should replace the surge protector to continue providing protection to your computer. When troubleshooting at the local grade schools, the counter on which computers were placed would have stuff stored underneath. Sometimes you needed to know if a computer or monitor was getting power, or if it was just dead. Faced with moving all the stuff under the counter and stirring up dust, I came up with a shortcut. You have a computer tower and monitor setting on the counter. Plugged into each one is a computer power cable. Suppose the monitor is getting power (i.e. power light works) and the computer is doing nothing. I would shut the monitor off and exchange the power cables. Unplug the power cable from the back of the computer, unplug the power cable from the back of the monitor, plug the monitor power cable into the computer, and press the computer’s power button. If the computer did come on, I knew that the problem was with power and not the computer itself. That meant I had to move stuff to get to the power outlet or surge protector under the counter. If changing the cables didn’t make any difference, then you know you have something more than a simple problem. Note that sometimes you may Figure 2 Wall Power Outlet have a bad power outlet. It can be worthwhile to find something easily movable, for example an electric pencil sharpener or a plug-in calculator, to plug into the wall outlet and insure that the outlet is getting power. An Introduction to Computer Hardware What are the four categories, or types, or computer hardware? Computer hardware is everything that is not software. You might think of hardware as the things that you can physically touch. In this chapter, we break computer hardware into four categories: cabling, input devices, monitors, and the system itself. We discussed cabling earlier in this chapter. 1. Input Devices – What are the most common computer input devices? Modern keyboards are all based upon the typewriter. How old is the typewriter? For whom are punched cards named? The most common input devices are keyboards and mice. The idea of a keyboard dates to the time of the American Civil War (i.e. 1860) with the creation of the typewriter. Keyboards were adapted to computer use from the teletype machines used with the telegraph. Around 1930, IBM adapted the Figure 3 Old-Style keyboard to control a keypunch to punch the cards (See Mechanical Typewriter Figure 4, next page) used as input for early computers. In the 1960s, computers began to appear that could have more than one user at a time. VDTs (i.e. Video Display Terminals), combining a monochrome monitor and a keyboard, were developed to act as an interface with these computers. There have been many Figure 4 Hollerith Punched Card unsuccessful attempts to replace the keyboard as an input device. I have trouble envisioning a successful replacement for the keyboard or mouse. As we developed graphically orientated operating systems, the mouse replaced some of the functions of the keyboard. The trackball is actually older than the mouse. It dates back to the early 1950s, developed as part of a top- secret Canadian Navy project. The first trackball used a five-pin bowling ball as the ball! In a sense, a trackball is just a mouse turned on its back. The mouse came along in the early 1960s, in the form of a block of wood with two gear wheels perpendicular to one another. (Douglas Engelbart, the creator of the computer mouse died in July 2013.) It is thought that the name mouse came from the size and the tail (i.e. cable) connecting it to the computer. Xerox refined the mouse and began offering it with their 8010 Information System in 1981. However, this system had few buyers as it sold for over $20,000. Apple adopted the mouse for its 1983 Lisa computer and computers have Figure 5 Keyboard and Mice Controllers never been the same. There are other, alternate, input devices; however, we will not cover them. If you are interested in knowing more about alternative input devices, ask your teacher or google it. 2. Monitor – What is a monitor? What do users sometimes call their monitor? Figure 6 Flat Screen Monitor If your computer is an all-in-one or a laptop, then your display is built-in. However, even with the laptop, you usually have the option to add an external monitor. Just as a television displays a signal obtained from satellite, cable, or a I have heard people refer to the monitor as a television. That is not far from the truth. Early personal computers, using a RF modulator as an interface, connected to a television and used it as a monitor. Even now, there are people using a flat-screen television as their monitor. DVD/VHS player, a computer monitor displays the signal output by a computer’s graphic card. How much you need to spend for a monitor depends upon your intended use. It is possible to spend over $5,000 for a monitor, but most of us are just fine with something under $300. 3. System - What does a computer power supply do? What are the three common voltages output by a computer power supply? What is a NIC? What does it do? What does a graphics card do? Who might want to replace their graphics card with a better one? What does the motherboard do? How long does the information found in computer memory (RAM) remain there? How long does the information found in a HDD (Hard Disk Drive) remain there? Why does your teacher think the DVD/CD drive will cease to be used? What is the CPU, what does it do, and why might gamers plan to replace them every couple of years? a.
Recommended publications
  • Operating Systems
    CS101 – Fundamentals of Computer and Information Sciences – LIU 1 of 2 Operating systems OS History We covered a (slightly rambling) story about the history of operating systems. Batch computing Batch systems were extraordinarily large and expensive, so that organizations could afford at most one or two. The machines had a human operator who was responsible for scheduling tasks for the machine, in order to make best use of its (very valuable) time. • Norwich council takes delivery of its first computer –@StuartSumner • Punch cards • IBM ad feat. punched cards • Keypunch machine • IBM 704 with card reader • LEGO Grace Hopper with Univac TODO: scheduling and calculating turn-around time using First-Come First-Served (FCFS) vs. Shortest Job First. (See book section 10.4, pages 350–351.) Time-sharing When mini-computers became available (just the size of a refrigerator, not a whole room), then we could have one for each workgroup or department within an orga- nization. They were powerful enough that multiple users could share the computer at the same time, by connecting multiple terminals (keyboard and monitor) to the same machine. The job of the human operator was now automated, and this was the golden ageof operating systems. Not only did they have to schedule tasks effectively, but they had to switch efficiently among serving different users, protect those users from interfer- ing with each other’s work, and so on. Some of the operating systems developed in this era were Multics, VMS, and UNIX. • PDP-11 with Ken Thompson, Dennis Ritchie • VT-101 terminal • IBM 7090 time-sharing video • Brian Kernighan on Bell Labs (Computerphile video) 2 of 2 Prof.
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • The FORTRAN Automatic Coding System J
    The FORTRAN Automatic Coding System J. W. BACKUS?, R. J. BEEBERt, S. BEST$, R. GOLDBERG?, L. M. HAIBTt, H. L. HERRICK?, R. A. NELSON?, D. SAYRE?, P. B. SHERIDAN?, H.STERNt, I. ZILLERt, R. A. HUGHES§, AN^.. .R. NUTT~~ system is now copplete. It has two components: the HE FORTRAN project was begun in the sum- FORTRAN language, in which programs are written, mer of 1954. Its purpose was to reduce by a large and the translator or executive routine for the 704 factor the task of preparing scientific problems for which effects the translation of FORTRAN language IBM's next large computer, the 704. If it were possible programs into 704 programs. Descriptions of the FOR- for the 704 to code problems for itself and produce as TRAN language and the translator form the principal good programs as human coders (but without the sections of this paper. errors), it was clear that large benefits could be achieved. The experience of the FORTRAN group in using the For it was known that about two-thirds of the cost of system has confirmed the original expectations con- cerning reduction of the task of problem preparation solving most scientific and engineering problems on 1 large computers was that of problem preparation. and the efficiency of output programs. A brief case Furthermore, more than 90 per cent of the elapsed time history of one job done with a system seldom gives a for a problem was usually devoted to planning, writing, good measure of its usefulness, particularly when the and debugging the program.
    [Show full text]
  • NBS FORTRAN Test Programs 3^1 No "I Volume 1- Documentation for Versions 1 and 3 V.I
    j I i Vt NBS SPECIAL PUBLICATION 399 J Volume 1 U.S. DEPARTMENT OF COMMERCE / National Bureau of Standards] National Bureau of Standards Library, £-01 Admin. BIdg. ncT 1 1981 13102^1 NBS FORTRAN Test Prog Volume 1-Documentation for Versions 1 and 3 NATIONAL BUREAU OF STANDARDS The National Bureau of Standards^ was established by an act of Congress March 3, 1901. The Bureau's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and technological services for industry and government, (3) a technical basis for equity in trade, and (4) technical services to promote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute for Applied Technology, the Institute for Computer Sciences and Technology, and the Office for Information Programs. THE INSTITUTE FOR BASIC STANDARI>S provides the central basis within the United States of a complete and consistent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essential services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry, and commerce. The Institute consists of a Center for Radiation Research, an Office of Meas- urement Services and the following divisions: Applied Mathematics — Electricity — Mechanics
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • 2 9215FQ14 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources
    2 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources 21-22 Legal 23-25 Marketing 26 Personal Names (Individuals) 27 Predecessor Companies 28-29 Products & Services 30-89 Public Relations 90 Research 91-97 April 10, 2007 9215FQ14 3 Facilities & Buildings Q. When did IBM first open its offices in my town? A. While it is not possible for us to provide such information for each and every office facility throughout the world, the following listing provides the date IBM offices were established in more than 300 U.S. and international locations: Adelaide, Australia 1914 Akron, Ohio 1917 Albany, New York 1919 Albuquerque, New Mexico 1940 Alexandria, Egypt 1934 Algiers, Algeria 1932 Altoona, Pennsylvania 1915 Amsterdam, Netherlands 1914 Anchorage, Alaska 1947 Ankara, Turkey 1935 Asheville, North Carolina 1946 Asuncion, Paraguay 1941 Athens, Greece 1935 Atlanta, Georgia 1914 Aurora, Illinois 1946 Austin, Texas 1937 Baghdad, Iraq 1947 Baltimore, Maryland 1915 Bangor, Maine 1946 Barcelona, Spain 1923 Barranquilla, Colombia 1946 Baton Rouge, Louisiana 1938 Beaumont, Texas 1946 Belgrade, Yugoslavia 1926 Belo Horizonte, Brazil 1934 Bergen, Norway 1946 Berlin, Germany 1914 (prior to) Bethlehem, Pennsylvania 1938 Beyrouth, Lebanon 1947 Bilbao, Spain 1946 Birmingham, Alabama 1919 Birmingham, England 1930 Bogota, Colombia 1931 Boise, Idaho 1948 Bordeaux, France 1932 Boston, Massachusetts 1914 Brantford, Ontario 1947 Bremen, Germany 1938 9215FQ14 4 Bridgeport, Connecticut 1919 Brisbane, Australia
    [Show full text]
  • Part I. Part II. FORTRAN IV Language Object Time System Part III. Science
    FORTRAN IV Part I. Language Part II. Object Time System Part III. Science Library ADVANCED SOFTWARE SYSTEM Programmer's Reference Manual Iorder No. DEC-9A-AF4B-D from Program Library, Maynard, Mass. Price: $2.50 ~ct comments concerning this manual to Software Quality Control, Maynard, Mass. DIGITAL EQUIPMENT CORPORATION. MAYNARD. MASSACHUSETTS Copyright 1968 by Digital Equipment Corporation PREFACE This manual describes the FORTRAN IV language and compiler system for the PDP-9 com­ puter. It provides the user with the necessary information for writing FORTRAN programs for compila­ tion and execution with the PDP-9 Advanced Software System. The manual is divided into three parts: Basic FORTRAN Language (Part I), FORTRAN Object Time System (Part II), and the FORTRAN Science Library (Part I I I) . Part I, Basic FORTRAN IV Language, is divided into chapters as follows: Chapter 1 . Introduction Chapter 2. Elements of the FORTRAN Language Chapter 3. Arithmetic Statements Chapter 4. Control Statements Chapter 5. Input/Output Statements Chapter 6. Specification Statements Chapter 7. Subprograms Part I is intendeq to familiarize the user with specific PDP-9 FORTRAN coding procedures. Several excellent texts are available for a more elementary approach to FORTRAN programming. "A Guide to FORTRAN IV Programming, II by Daniel D. McCracken (published by John Wiley and Sons, Inc.) is recommended. Part I I, FORTRAN IV Object Time System, describes the group of subprograms that process compi led FORTRAN statements, parti cu larly I/O statements, at execution time. Part ",, PDP-9 Science Library, provides deta iled descriptions of the intrinsi c functions, external functions, subfunctions, and arithmetic routines in the PDP-9 Science Library.
    [Show full text]
  • Reference Manual IBM 29 Card Punch
    Product Reference Literature IBM Reference Manual IBM 29 Card Punch Reference Manual IBM 29 Card Punch Preface This reference manual contains the information required by a card punch operator or trainee to use the IBM 29 Card Punch efficiently. The reader is assumed to have at least an introductory knowledge of data processing. The manual describes the available models of the 29 Card Punch, operating features and procedures, special features, and 29 Card Punch programming. Seventh Edition (June 1970) This is a reprint of GA24-3332-S incorporating changes released in Technical Newsletter GN22-0337 (dated June 2, 1969). Changes are periodically made to the specifications herein; any such changes will be reported in subsequent revisions or Technical Newsletters. Requests for copies of IBM publications should be made to your mM representa­ tive or to the IBM branch office serving your locality. This manual has been prepared by the IBM Systems Development Division, Product Publications, Dept. B98, PO Box 390, Poughkeepsie, N. Y. 12602. A form for readers' comments is proVided at the back of this publication. If the form has been removed, comments may be sent to the above address. Contents IBM 29 Card Punch 5 Special Features .................................. 24 Features. .. 5 Auxiliary Duplication ............................... 24 Programs ........................................ 5 Card Insertion ..................................... 24 Card Punching ............................... " 5 Character Inhibit ................................ 24
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe z/OS Basics Basic mainframe concepts, including usage and architecture z/OS fundamentals for students and beginners Mainframe hardware and peripheral devices Mike Ebbers John Kettner Wayne O’Brien Bill Ogden ibm.com/redbooks International Technical Support Organization Introduction to the New Mainframe: z/OS Basics March 2011 SG24-6366-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2011) © Copyright International Business Machines Corporation 2006, 2009, 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii How this text is organized . xiv How each chapter is organized . xiv The team who wrote this book . xv Acknowledgements . xvi Now you can become a published author, too! . xix Comments welcome. xix Stay connected to IBM Redbooks . xix Summary of changes . xxi March 2011, Third Edition . xxi August 2009, Second Edition . xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The System/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 8 1.5 What is a mainframe . 9 1.6 Who uses mainframe computers. 12 1.7 Factors contributing to mainframe use . 15 1.8 Typical mainframe workloads . 22 1.9 Roles in the mainframe world . 29 1.10 z/OS and other mainframe operating systems .
    [Show full text]
  • OHD Outbreak Investigation Templates for Questionnaires, Data Entry, and Data Analysis
    31 July 2003 OHD Outbreak Investigation Templates for Questionnaires, Data Entry, and Data Analysis Overview This describes how to use a family of questionnaire templates for outbreak investigations. Although most commonly used with outbreaks of gastroenteritis, they can be adapted for other kinds of investigations. Although they can be used as stand-alones, they are optimized for use with a FileMaker data entry template, “Data Entry.FP5”. (Note to non-FileMaker users: although a tedious project, these templates could be replicated in Access or most other database programs; help yourself.) The FileMaker template allows for fast and accurate data entry, and feeds directly into pre-written EpiInfo analysis programs. Because the set-up does not vary much from outbreak to outbreak, data entry people quickly become (and stay) proficient. The key difference between this system and more traditional data entry is that many exposures (typically food items), as well as symptoms and other characteristics, are grouped into blocks for data entry. Only “yes” answers are entered; “no” is otherwise assumed. For example, if there were 20 items available at a suspect meal, traditionally one would make 20 yes/no variables. In this system, however, those 20 items are entered as a single variable. If the person ate only items A, C, and H on the list, for example, one would enter “ACH”. Behind the scenes, these raw data are being split into “traditional” YES/NO variables. At any time, with the flick of a button, the data can be automatically cleaned and exported (e.g., as DBF files) for analysis in EpiInfo or other programs.
    [Show full text]
  • Punched and Mark Sense Cards
    Punched and Mark Sense Cards A Superficial History The first significant use of punched cards for data processing was the electronic tabulating machines used for the 1890 US census. The machines were created by Herman Hollerith who founded Tabulating Machine Corporation. The use of punched cards was inspired by the Jacquard loom which was an Hollerith 1890 Census Tabulator automatic weaving machine invented in 1801 that was controlled by a chain of punched cards. Jacquard loom Hollerith picked the card size of 7 3/8 x 3 1/4 inches since it was the size of bank notes at the time which allowed use of money bins for storing cards. This size remained the most common, however the hole format was changed several times. The Tabulating Machine Corporation merged with three other companies to form the Computing Tabulating Hollerith Punched Card Recording Company which changed its name to International Business Machines in 1924. IBM introduced the 80 column card with rectangular holes in 1928. This format card was the dominant card format until the end of the punched card era. Competitors such as Remington Rand had their own card format though many used the IBM format after the patents ran out. In 1952 IBM produced 16 billion cards a year. The infallible web claims peak US consumption of punched cards was around 200 billion in 1967 (16 terabytes). IBM closed its last punched card plant in 1984 though other companies were still selling around 100-300 million cards a year at the turn of the century. It appears that no company is still selling IBM type punched cards or equipment as their business today.
    [Show full text]
  • Career Preparation in Data Processing--Keypunch Operator, Key-To-Tape Operator, Key-To-Disk Operator
    DOCUMENT RESUME ctp 113 441 CE 004 888 411,11. Career Preparation in Data Processing--Keypunch Operator, Key-To-Tape Operator, Key-To-Disk Operator. An Instructor's Guide. INSTITUTION New York State Education Dept., Albany. Bureau of Continuing Education Curriculum Development.; New York State Education Dept.,'Albany. Bureau of Secondary Curriculum Development. PUB DATE [75) NOTE 43p. 11. EDRS ,PRICE Mi7-$0.76 HC-$1.95 Plus Postage DESCRIPTOPS *Business Education; Curriculum Guides; Data Processing; *Data Processing Occupations; *Electronic Data Processing; Post Secondary Education; Secondary Educations; *Teaching Guides; Unit Plan ABSTPACT The outline presents six units of instruction for use in secondary schools and adult education programs to help prepare students with basic typewriting skills for employment as data entry operators. The units are: (1) introduction to punched card data processing,(2) nonbuffered card punch machines, (3) punched card verifiers, (4)buffered card punch/verifiers,(5) key-to-tape data recorders, and (6)key-to-disk data recorders. They are designed for use as follows: unit one as an introduction to any of the other units, unit three to follow unit two, and units two, four, five, and six, which do not build on the content of the other units, to be used in any sequence. Objectives for each;unit are stated in behavioral terms. A two-column format lists topics necessary for an adequate presen4.ation on the left and teaching methods on the right with textbook page references. A description is provided of instruction time required, facilities, application in secondary and adult education programs, classroom management, general teaching suggestions, and expected outcomes for the entire course.
    [Show full text]