Professional Documents
Culture Documents
Harmony College
under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level II
This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics –
Introduction to Computer and Connecting Peripherals
Identify Client Requirements
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Identify and confirm client peripherals requirements in accordance with organizational standards
Document client requirements and peripherals needed in line with organizational standards and
report findings to the appropriate person
Verify client requirements with appropriate person in line with organizational standards and
reporting procedures
Take action to ensure client support expectations are covered by vendor warranty and support
services
Computer peripherals were grouped into several categories: The Input Devices, The Output
Devices, the Processors, The Storage Devices.
The Input device - is a device that’s been used as a means of input. It is any peripheral used
to provide data and control signals to an information processing system such as a computer
or other information appliance. The common input devices are keyboard, mouse, scanner.
Video input devices are used to digitize images or video from the outside world into the computer. The
information can be stored in a multitude of formats depending on the user's requirement.
In the fashion of video devices, audio devices are used to either capture or create sound. In some
cases, an audio output device can be used as an input device, in order to capture produced sound.
Microphone MIDI keyboard or other digital musical instrument
Output Device
An output device is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system (such as a computer) to the
outside world.
In computing, input/output, or I/O, refers to the communication between an information
processing system (such as a computer), and the outside world. Inputs are the signals or data sent
to the system, and outputs are the signals or data sent by the system to the outside.
Type of monitor
There two of type of monitor:
The Processor(CPU)
The Processor or the central processing unit (CPU) is the portion of a computer system that carries
out the instructions of a computer program, to perform the basic arithmetical, logical, and
input/output operations of the system. The CPU plays a role somewhat analogous
to the brain in the computer.
Example of Processors are: Pentium 4, Core Duo, Dual Core, Core i3, Core i5, Corei7
CPU Components
Centeral Prosesing Unit can be divaded into Three parts.
control unit (CU), which extracts instructions from memory and decodes and executes
them, calling on the ALU when necessary.
Registray
Registray is a small amount of storage available as part of a CPU or other digital processor.
load data from a larger memory into registers where it is used for arithmetic, manipulated,
or tested, by CPU.
It is the only one directly accessible to the CPU. The CPU continuously
reads instructions stored there and executes them as required. Any data
actively operated on is also stored there in uniform manner.
Read only memory (ROM):
ROM is memory containing hardwired instructions that the computer uses when it boots up,
before the system software loads.
In PCs, the instructions are read from a small program in the ROM, called the BIOS (Basic
Input/Output System).
E.g. Internal Hard drive, external Hard Drive, Flash Disk, CD/DVD, Floppy disk,
Memory card.
Hard Drive:
The hard drive is whech stores all your data on the computer system permanently.
It houses the hard disk, where all your files and folders are physically located.
The data is stored on a stack of disks that are mounted inside a solid encasement.
These disks spin extremely fast so that data can be accessed immediately from anywhere on the
drive.
The data is stored on the hard drive magnetically, so it stays on the drive even after the power
supply is turned off.
The term "hard drive" is actually short for "hard disk drive." The term "hard disk" refers to the
actual disks inside the drive.
CD (Compact disk):
The CD standard was proposed by Sony and Philips in 1980 and the technology was introduced
to the U.S. Market in 1983.
CDs can hold up to 700 MB of data or 80 minutes of audio.
The data on a CD is stored as small notches on the disc and is read by a laser from an optical
drive.
The drives translate the notches (which represent 1's and 0's) into usable data.
Accesed by CD-ROM
Stands for "Digital Versatile Disc." It can also stand for "Digital Video Disc," but with the
mulitple uses of DVDs, the term "Digital Versatile Disc" is more correct.
ICT Level 2 Page 8
Colleges of Harmony ICT Level 2
A DVD is a high-capacity optical disc that looks like a CD, but can store much more
information.
While a CD can store 650 to 700 MB of data, a single-layer, single-sided DVD can store 4.7 GB
of data.
The advanced DVD formats are even more amazing. There is a two-layer standard that doubles
the single-sided capacity to 8.5 GB.
Accesed by DVD-ROM.
3. Tertiary Storage
Tertiary storage or tertiary memory provides a third level of storage.
computer storage devices, usually consisting of magnetic tape transports and mass storage tape
systems, which have slower access times, larger capacity, and lower cost than main storage or
secondary storage.
Connectivity devices : The majority of external peripheral devices connect to the back of the computer’s system
unit with cables. The computer’s system unit has a variety of ports available for use by different
peripheral device cables. A port is a socket that is used to connect the cables from peripheral devices to
the computer.
Ports
There exist several types of ports like serial port, parallel port, USB port, AGP port, power supply port.
Serial Port: As the name suggests, the serial port transfers data serially a bit at a
time. As a result, the serial port needs only wire to transmit 8 bits. The
disadvantage is that it takes 8 times longer to transmit a byte. Serial ports come
in the form of 9-pin or 25-pin male connector. Serial ports are often known as
communication ports or RS232C ports. They are typically used to connect devices like old mouse and
modem.
Power supply
Parallel ports can send or receive a byte (8-bit) at a time. Unlike the serial
port, these 8-bits are transmitted parallel to each other. Parallel ports come
in
the form of 25-pin female connector. Parallel ports are popularly used to connect printer, scanner, CD writer,
zip drive, external hard disk drive, tape backup drive, etc.
To spare the user botheration of 8-pin, 25-pin, male, female connectors, the USB
has been designed. It gives you a single, standardized, easy-to-use way to connect
up to 127 devices to a computer. These devices include printers, scanners, mice,
joystick, digital camera, web cameras, speakers, telephones, zip drives, network
connections, scientific data acquisition devices, etc.
AGP (Accelerated Graphics Port) port is used to connect to graphic card that provides high-speed video
performance typically required in games and other multimedia applications.
AGP is a type of expansion slot designed specifically for graphics cards.
Since the AGP interface provides a dedicated bus for graphics data, AGP cards are able to render
graphics faster than comparable PCI graphics cards.
Like PCI slots, AGP slots are built into a computer's motherboard.
Ethernet port, the LAN port is a port connection that allows a computer to connect to a
network using a wired connection. In the picture to the right, is a close up example of what a
LAN port looks like for a network cable using an RJ-45
connector. In the case of this example, the two led lights will blink when that port is active and receiving activity.
However, a given system's keyboard and mouse port may not be interchangeable since the two devices use a
different set of commands. Today this connector has all but been
replaced by USB
Power Supply : is a device that supplies electrical energy to one or more electric
loads. A regulated power supply is one that controls the output voltage or current
to a specific value; the controlled value is held nearly constant despite variations
in either load current or the voltage supplied by the power supply's energy source.
A power supply is a hardware component that supplies power to an electrical device.
It receives power from an electrical outlet and converts the current from AC (alternating current)
to DC (direct current), which is what the computer requires.
It also regulates the voltage to an adequate amount, which allows the computer to run smoothly
without overheating.
The power supplies an integral part of any computer and must function correctly for the rest of
the components to work.
Connectors
MONITOR CABLE - This cable is usually permanently connected to a monitor. Small screws
hold the cable in place
USB CABLE - Most PC's now have these fast and versatile ports on the front and back. They can be
used for portable storage devices, digital cameras, scanners, video cameras, printers, keyboards and
mice - just about everything!
POWER CORD - This is a standard "kettle cord" that connects the computer to the AC outlet on the
wall and the power supply of the computer. This MUST be unplugged if you are ever doing any
maintenance work inside the computer.
PRINTER CABLE - This is a 25-pin "D" shaped connector that connect printers to the
parallel port on a computer. (Newer printers may connect with a USB plug.)
PS2 CABLE - On most computers these days, this connection is used for both
the Mouse and the keyboard. This plug has 6 pins-
VGA CABLE – This is use to connect the monitor to the VGA port
AUDIO CABLE – This is use to connect the speaker to the Audio port.
The monitor is the computer's display screen. Liquid Crystal Display (LCD) or flat
screen monitors offer reduced bulk and lower power consumption, relative to cathode
ray tube (CRT) monitors. Monitors are normally measured diagonally in inches -
typically 19, 22 or 24. Larger or wide-screen monitors allow you to compare two
documents on-screen. Many monitors have an aspect ratio - the proportion of image
width to height - of 16:10, although screens with a 16:9 ratio are becoming more widely
available and offer higher resolution.
Display adapter Software requiring a better than average computer graphics display,
like graphics editors and high-end games, often define high-end display adapters in the
system requirements.
Software requirements
Software Requirements deal with defining software resource requirements and pre-
requisites that need to be installed on a computer to provide optimal functioning of an
application. These requirements or pre-requisites are generally not included in the software
installation package and need to be installed separately before the software is installed.
1. Platform: In computing, a platform describes some sort of framework, either in hardware
or software, which allows software to run. Typical platforms include a computer's
architecture, operating system, or programming languages and their run time libraries.
2. APIs(application programming interface) and drivers: Software making extensive use of
special hardware devices, like high-end display adapters, needs special API or newer device
drivers. A good example is DirectX, which is a collection of APIs for handling tasks related
to multimedia, especially game programming, on Microsoft platforms.
3. Web browser: Most web applications and software depending heavily on Internet
technologies make use of the default browser installed on system. Microsoft Internet
Explorer is a frequent choice of software running on Microsoft Windows, which makes use
of ActiveX controls, despite their vulnerabilities.
Other requirements
Hardware inventories
The purpose of a hardware inventory (or registry) is to keep detailed information about all the hardware
equipment within an organization. Every piece of hardware, including each computer and peripheral device,
should be recorded on the inventory. As well as providing an excellent quick reference guide to the
organization’s
hardware, an inventory can be very useful for insurance, warranty and service purposes.
In order for an inventory to be a valuable source of information, it is vital that the information be
maintained regularly. New devices need to be entered into the inventory as soon as they have been obtained.
You must also adjust the inventory frequently, to delete hardware that is no longer functional or has been
removed. Some organizations do random checks or yearly audits of their hardware inventories to ensure that all
information is current.
There are a number of tools available to create hardware inventories. Databases and spreadsheets are
often used to store the information. There are also software programs that you can purchase, designed
specifically for recording hardware and software details. Although these programs are good for keeping a ‘soft
copy’ of the information, it is also essential that you keep a current ‘hard copy’ (printed version) of the
inventory. In this way,
if the computer system ever fails you will still have the information.
Details that should be included within a hardware inventory include:
If the peripheral is an essential part of the computer system (for example mouse, keyboard or monitor) it
is logical to record information about the device within the documentation for the computer to which it is
connected. Individual computer inventories will often contain detailed information about the computer’s related
hardware and software. It may also be more practical to record information about the peripheral inside the
computer’s record, if the device is also permanently connected to a computer (for example a printer or scanner).
Manufacturer: Dell
Model: OptiPlex GX280MT Minitower—Power
Operating System: Windows XP
Serial number: 12345
RAM: 128 Mb
Hard disk space: 160 Gb
Monitor: Dell UltraSharp™ 1905FP flat panel,
Printer: HP LaserJet IID
Keyboard: Dell USB keyboard
Pointing device: Dell USB 2-button optical mouse with scroll
Check that the brightness and contrast controls of the screen have been adjusted to suit lighting conditions
in the room.
The top of the screen should be the same level as the user’s eye level.
Positioning of the keyboard
A keyboard also needs to be positioned carefully to be of adequate comfort and safety for the user. Some
tips include:
Position the keyboard directly in front of the monitor and at the same height as the mouse.
The keyboard should allow the user’s forearms to be parallel to the floor.
Allow space for the computer user to rest their wrists.
Some general Occupational Health and safety guidelines to consider when positioning other peripheral equipment
are:
Make sure that you can reach the peripheral device and its components without having to strain your back.
Place equipment such as scanners and printers at a suitable height so a user is easily able to reach paper
trays, open scanner lids, etc.
Make sure that equipment such as speakers is easily accessible if settings such as volume control need to be
changed
Do not be tempted to add too many extension cables or double socket adapters to your existing electrical
sockets.
Never use damaged plugs or leads.
If possible, ask an electrician to check the safety of your system.
Position electrical leads where they will not cause tripping hazards to people
be necessary to find a secure location to store the device. Make sure that these kinds of devices are secured in a
lockable storage cupboard, cabinet or safe when not required. Some organisations install security devices onto
desks to guarantee that computers are secure and will not be able to be taken from their position unless unlocked.
Storing consumables
The term ‘consumables’ refers to a product that is used once and then replaced. Examples of consumables
include printer cartridges, CDs and paper. As well as for computer equipment, consideration also needs to be
given to the way consumables for peripheral devices are stored.
Paper
Paper needs to be stored in an area which is cool and dry, to prevent moisture from fusing pages together.
Ink cartridges and toner
Make sure to store cartridges/toner in a cool dry place, away from sparks and open flames, with adequate
ventilation and do not expose the device to high temperatures. Also ensure that the cartridges are not taken out of
their packaging until they will be used within the printer, as the ink will dry out before use.
CDs
When possible, make sure that CDs are kept in their protective case, to minimise the chances of being
scratched. Also keep them out of direct sunlight and extreme temperatures.
Summary
There are several steps that you must go through when you obtain a peripheral device. The first step
involves working out where to obtain the device, whether it is from a supplier who regularly provides equipment
to the organization, or a supplier found from searching the Internet, magazines or telephone directory.
Depending on the organization, placing an order for a device may be done in different ways. Some
smaller organizations may not have strict guidelines, while larger organizations may have strict procedures that
need to be followed.
Once the device has arrived it is always a good idea to keep a record of the device in a hardware
inventory. Recording details such as manufacturer, supplier, model, date of purchase and purchase price, can be
very useful — especially if you need to send a device back within the warranty period.
It is also a good idea to unpack the contents in an organized manner. Find a clear space to unpack
contents and create a checklist of equipment that should be supplied.
Once the device has been unpacked, storage is another consideration. Make sure to look at the
manufacturer’s guidelines, consider the security of the device and any occupational health and safety issues.
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –
Avoiding disruption to the client
Connecting and configuring hardware peripherals
Testing devices and creating a test plan
This guide will also assist you to attain the learning outcome stated in the cover page.
common organizational procedures that regularly need to be performed on the computer (for example, end
of month processing or weekly backups) and plan installations outside these periods
Current projects, deadlines and schedules of the client/user.
Installations should be scheduled for times such as:
quiet periods (for example, during holiday periods)
before or after normal office hours
while the client/user is out of the office
when the client will not be needing their computer.
It can be difficult to work out how long it will take to install a peripheral device. It will vary according to
the type of device, current operating system, problems requiring troubleshooting and the experience of the
installer. If you will be regularly performing installations, keeping a log of installations — noting the time
required and problems experienced — could help to estimate the time spent on future installations.
Once you have arranged a suitable time, make sure you adhere to it or give advanced notice if you will be
delayed. Remember that clients may have scheduled their daily workload around the installation.
Also consider the timeframe expected by client when installing new hardware. If you work for a busy
organization it may be necessary to work out a daily to-do list. Order tasks with priority given to installations
that perform critical functions or have been waiting to be done for the longest amount of time.
Testing
In addition to ensuring a device is able to perform a basic task (such as printing a test page or scanning
an image) it is also necessary that all functionality required by the client is tested. When new peripheral
equipment is not tested for critical functions before being used, it can lead to malfunction, causing large
disruptions to clients and potentially damage other parts of a computer system. If, for example, a new external
zip drive has not been
tested to check it will be capable of making backups of specific files, it could mean that vital information of the
client’s could be destroyed if those backups were not successful.
Ensure that all new installations are thoroughly tested after initial setup and prior to use by the client.
Depending on the device, different functions will need to be tested.
Devices that have components that are known to degrade with time, especially printers, should also be
tested periodically. Printers need to be routinely tested, as components such as the ink cartridges and toner can
cause deterioration of print quality and may require maintenance and/or cleaning.
All tests should be completed according to a documented test plan.
Some suggestions of functions that may be tested for a printer, scanner and digital camera devices
are included below.
Printer
Can the printer handle different paper types (for example A4, A5, foolscap, thick, thin,
overhead transparencies)?
Will the printer work successfully on different computers?
Will the printer work successfully with different software packages (for example, word
processing, spreadsheets and desktop publishing)?
Is black and white print quality acceptable to clients?
Is colour print quality acceptable to clients?
Scanner
Whenever you install a hardware peripheral device, you will also have to install a driver.
A driver is a software program that allows the hardware device to talk to the operating system.
Generally, driver software will be included within the packaging of a new device. Sometimes operating
systems, such as Windows XP, automatically provide their own drivers if you don’t provide one. At times it may
be necessary to find a newer version of a driver than the one that has been provided by the manufacturer. It is a
good idea to regularly check the manufacturer’s website to see if any new drivers have been developed.
What is plug and play?
Plug and play is a hardware technology that enables many operating systems to automatically recognise
new hardware devices and configure them automatically. Most USB devices support plug and play.
To make your computer work, you need to connect all the hardware peripherals to the ports at the back of
the CPU case, as shown above.
Before connecting all the peripherals to its corresponding ports, see to it that the power cord was unplug
into the power source to prevent electrical related injury.
You should be able to connect the Mouse, Keyboard, Monitor, Printer, Scanner, Speaker and power up
your computer by connecting the power cord to the power supply. After doing so, you can now start using your
computer.To do it, you connect the Monitor by using the VGA cord connector to the port
PS2 Cable
To connect the scanner to the PC, you will use also use the USB cable.
USB Cable
For audio devices such as speaker or headset, you can connect it o and mic
Speaker/headset
mic
Before powering up your PC, make sure that the power cable was connected to the power supply
To connect the Printer to the PC, you will use the cable below via printer port.
A USB able is now also being use to connect the new printer to the computer especially the colored and
laser printer.
Installing a printer
Printer cable
1. Turn off the power to both the printer and the computer.
2. Plug the printer cable into the correct port of the PC — depending on the type of printer the port will most
likely to be either a USB or a parallel port located on the back of the computer. If you are plugging the
cable into a parallel port connection you will need to secure the cable by either tightening small screws or
snapping in wire connectors.
3. Install ink
Depending on the printer you have you may need to install an ink cartridge (for inkjet printers) or toner
cartridge (for laser printers). Turn the computer’s power on and follow the manufacturer’s guidelines to install a
new cartridge.
4. Install the printer driver
At some point the computer will either recognise that new hardware has been installed (for example if the
operating system is plug and play compatible) or you will need to tell the computer that a new device has been
added. In either case, you will at some stage be asked for the printer model and a printer driver. Make sure you
install the printer driver at this stage. Sometimes the installation CD will automatically run, installing the printer
driver at the same time.
5. Print a test page
Often at the end of the driver installation you will be asked if you would like to print a test page. This is a
good idea because you can quickly determine if the printer is working correctly. If not you can troubleshoot the
installation.
6. Troubleshoot printer installation (when necessary)
If a page is not able to print it is necessary to go back and determine why the printer is not working. There
are a number of factors that can contribute to printer problems including:
cables between printer and computer are not properly connected
printer driver is not suitable for the current operating system
paper is loaded incorrectly
ink cartridge or toner is not correctly installed
printer power switch is off.
Make sure the margins have been set correctly in the software program you are using (eg the word
processor or desktop publishing package).
Make sure that the paper has been loaded correctly.
The quality of the printout is poor
If the printer is an inkjet the heads of the ink cartridge may need to be cleaned.
Some printers have software that allows you to change the quality of the printout from draft to best quality.
4. Turn on the scanner: Some scanners will have a power cord that will need to be plugged into a power outlet.
Other scanners are dependent on power from the computer. Some scanners will also have an on/off switch,
which will also need to be turned on.
5. Turn on the PC: When you turn on your computer, most operating systems will recognise
that new hardware has been added (eg it is plug and play compatible). If it hasn’t recognised
the new scanner you
may need to tell your computer that a new device has been added.
6. Insert the scanner driver : At some point you will be asked if you have a disk for your
scanner. This generally means the computer is requesting you provide it with the disk
containing the driver software.
7. Scan a test image: Ensure that the scanner is working by performing a scan of a book or magazine page.
8. Troubleshoot scanner installation (if necessary)
Suggested solutions for common scanner problems
Scanner making a clicking sound
Check that the scanner lock is in the unlock position.
Unable to scan anything: Make sure that the scanner is plugged in
also allow you ability to adjust settings such as dpi (dots per inch), colour, black and white or
greyscale. Make sure you modify settings for normal scanning requirements.
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics –
Planning the placement of printers
Connecting to the network
Adding upgrades
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Location of peripherals are planned to provide appropriate services to users and to take into
consideration OHS standards.
Peripherals are connected to network, using vendor-approved method and technology.
Peripherals are connected to computers in the network using parallel, serial or other direct
connection methods appropriate for the job order.
Peripherals are tested for correct operation based on client’s specifications.
What should you consider when locating a peripheral? This reading looks at the occupational,
health and safety requirements you should follow, from opening the box to placing the device,
and the repercussions on users in the workplace.
The first computers needed a special environment and power supply to function. Today, most
components function in a normal office environment. They don’t need special air conditioning
or clean
power supplies, although these will always allow them to work at their best. In the 1970s,
mainframe computers were often placed behind locked doors and only a privileged few
allowed access. Even today, because of security concerns, you may find some network devices
are stored in a restricted area.
Some peripherals can only connect by a network cable and protocols. Others may only connect to a
computer or other host device such as a print server. Yet others will allow you a choice of connection
methods. For example, network attached storage (NAS) devices will connect to the network cable.
Scanners will normally require connection to a computer, and printers will usually give you a choice.
In most cases, peripherals attached to a host computer on a network slow the performance of the
computer when the peripheral is being activated over the network. In a stand-alone environment, there
may be no other choice. But in a network environment, the host computer that connects the peripheral
to the network should not be operated heavily as a workstation.
Peripherals such as speakers are only connected to the local host computer and cannot be used over the
network. Speakers use little resources but peripherals that heavily use resources should be turned off if
other peripherals such as a printer are being used over the network.
Web cams used for individual staff attending interstate meetings require a good amount of bandwidth.
They also use a lot of the computer’s processing power and should only be fixed to computers that are
not used as a network resource for other peripherals.
Physical network connections
The most common network standard in use today is Ethernet. The IEEE (Institute of Electrical and
Electronic Engineers) sets Ethernet standards for the physical devices and the protocols. It is a medium
that consists of coaxial copper cable, twisted pair or fibre optic cable, on which electronic signals travel
and to which computer devices are attached.
The Ethernet protocol sets the rules for constructing frames that are transferred around the network.
Frames are short messages that hold information, and include the destination and source address of
each computer.
Most organisational networks are now running at a speed of 100 Mbps using CAT5 UTP (unshielded
twisted pair) cables. However, a CAT6 cable can transfer data at 1000Mbps, and is used in some larger
organisations. A new standard IEEE 802.3ak™-2004 will transfer data at 10 Gbs.
A peripheral will normally connect directly to a hub or switch, or into a wall connection that is wired as
part of the network.
As with connections directly to the network, Universal Serial Bus (USB) is becoming very popular. USB uses
plug and play technology and reduces the configuration time, as it is usually not necessary to adjust
configurations. There is no need to reboot the computer each time a new device is added.
Wireless connections
Wireless connection is becoming very popular in home and office technology. It eliminates the
‘spaghetti trap’, where cables entwine and it creates an uncluttered environment. However, wireless
network communication can be slower, and insecure, leaving data more easily open to hackers.
Cordless peripherals are now available at affordable prices for most users. They include keyboards,
mice, game pads, joysticks and pointing devices to interact with host devices. Host devices are not only
computers but can be home appliances, game machines and televisions. The peripheral requires battery
power to operate, and are more easily accessible to potential thieves.
Cordless peripherals are usually controlled by a short-range communication method such as the
infrared standard IrDA (Infra-red Data Association) that sets the standards for both the physical
devices and the protocols they use to communicate. IrDA requires line-of-sight access between devices
for data transfer.
New developments in other short distance communication such as Bluetooth technology, which use
radio frequency to communicate, have proved to be more efficient and faster than IrDA. IrDA and
Bluetooth are not network technologies, but simply different methods of connecting.
LAN wireless communication requires a wireless router and a transmitter connected to each device
that is connected to the network. These are becoming more economical. The main problem is their lack
of security.
Wireless LANs use the standard 802.11. One type of wireless LAN can transfer data at 11Mbps and
another at 54 Mbps. But if interference is detected or the radio signal is weak, the transfer rate is
reduced.
Configuring a wireless network
here are two methods of configuring a wireless network:
1 Infrastructure
2 Ad Hoc.
In the Infrastructure mode, the wireless LAN connects to an access point that covers a fixed area
using an antenna. The wireless access point converts the data into wired Ethernet data, acting as a
bridge between the wired LAN and wireless clients. Access points connect to a wired Ethernet
backbone and extend the wireless network coverage. For example, as a mobile user moves out of range
of one access point, they move into the range of another.
Ad Hoc wireless networks are similar to a peer-to-peer workgroup where computers communicate with
other computers, and there is no structure or fixed point. The computer devices need to be within range
of each other and it is cheaper and easier to set up than the Infrastructure mode.
Some peripherals can help lift organisational efficiency by simply incorporating an extra device on the peripheral
— a much cheaper option to buying a new peripheral.
Not all peripherals can be upgraded, but many can be expanded. For example, network attached storage devices
can usually take additional disk drives to increase capacity. Scanners may be able to take a film or transparency
holder so photographs can be scanned. Printers can have more memory or extra sheet handling features added.
Some upgrades may be incorporated at the time of purchase while others are added on after the user has had the
device for some time.
Typical upgrades for the some larger printers include:
duplex units for two-sided printing
envelope feeders
more memory
extra input trays and output stackers
cabinets and stands.
Naming conventions
Printer drivers
Access and security
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Required software is installed to manage local and network-connected peripherals according to business
requirement software peripherals according to business requirement.
Meaningful names are used for peripherals and control queues
Security and access are configured to allow appropriate users to make use of peripherals.
o Workstation for peripherals is configured to allow applications to work with peripherals.
f
peripher
reflected al location usually number sequence
Making a peripheral available on the network does not necessarily mean that every single user should have access.
Drives may be shared and then permissions allocated to users or groups. All other peripherals will normally
provide some means of restricting access.
Setting security access and permissions can help keep peripherals in peak condition. For example, a high-speed
laser printer of minimal quality may always print large label runs, or invoices for thousands of clients. A laser
printer running at a slower speed but with high print quality may do letters and documents. This uses the
advantages of both without placing undue stress on the slower machine. Setting security access and permissions
can also ensure protection for confidential documents or activities.
For printers and other peripherals, once a resource has been shared and configured on the network, the user will
need to load the appropriate drivers for their operating system. When drivers are loaded, it is a relatively simple
task to access the printer across the network. If the user is running an operating system that is different to the
server controlling or managing the device, different drivers may be required.
If the peripheral is a disk drive, the most common way of accessing this is to map the shared drive or folder. The
share will substitute a drive letter for the shared area, and the user then accesses this as if it were a local disk. In
most cases, the administrator will also have set designated permissions for the drive or folder. Users are unlikely
to have total access to the folder or drive.
Just how a peripheral is secured will depend upon the operating system used. Windows-based operating systems
use the concept of sharing. Sharing a printer works in a similar way to sharing drives. The administrator can select
a printer and designate the users that may access it, or set a level of access such as read only, read and execute,
modify or full access. In most cases, network administrators enable user access by the following method:
1 Connect the peripheral and install the drivers.
2 Share the peripheral.
3 Allow access to certain users or groups of users.
4 Set the security level for each user or group of users. For example, this may be read only, or read and
execute, or modify or full access.
5 On the client’s computer, allow access to the peripheral.
6 Install the drivers for the peripheral on the client’s computer.
Methods are demonstrated to the user for using peripheral services from their application or workstation
You set appropriate priorities to each printer that uses the same print device. For example, you can allow:
executives to access Laser_High
managers to access Laser_Normal, and
everyone can access Laser_Low.
If an executive sends a print job to their printer it will take priority over any lower priority jobs in the queue.
Managing peripherals with software
The means to manage a peripheral are provided with the operating system, or with driver software, or
as a specific application from the vendor. Software may also be available from third parties. There are
many firms that specialise in print management software, for instance, particularly for large businesses.
Possible functions depend on the type and model of the peripheral. Some management functions for
printers include being able to:
start, stop or reset the printer device and/or printer queues
set a form for the printer
perform testing operations or cleaning of an inkjet printer.
The management software may also configure a network printer automatically, or automatically
download updated printer drivers. It may also monitor consumables and alert administrators to perform
status checks on paper and toner levels, thereby minimising the printer downtime (and improving client
relationships).
In many cases, the means to set access and priorities is normally provided with the operating system.
Other configurations may be set up by an administrator, but may also be changed by users if they have
access to those tools.
Monitoring usage
Some organisations are keen to track the usage of peripherals, especially printers. For example, it can
be done as part of an accounting procedure, to ensure sufficient capacity, or to keep track of
consumable items.
Most printers allow a report to be produced, or the printer may have a counter. With many, the
configuration report displays the number of pages printed. It also lists the number of pages printed at a
higher fuser temperature (at which the toner is melted onto paper) if this mode has been selected.
Maintenance schedules
Printers, in particular, have many moving parts subject to wear as well as consumables that run out.
They require more maintenance than purely electronic or solid state components.
Device manuals normally specify maintenance schedules. Some maintenance is time-based and other
forms are usage-based, such as with printer toner, the need to replace which is shown by a warning
light on the printer, or in the case of a large network printer with management software, an automatic
email may be sent to the administrator. Paper can be considered a time-based consumable because if
packets of it are left open for more than a few weeks it can dry or be subject to moisture, humidity or
dust. These changes alter the friction between each sheet and contribute to misfeeds and paper jams. It
is important estimate replacement times for things such as toner and paper so to ensure stock and
minimise user disruption. You do not want to overstock, as some consumables are expensive and
subject to falling quality over time. Laser printer developers, for instance, usually have a limited
working life.
Conducting maintenance
Once you have a maintenance schedule organised you then follow the instructions as the need for
maintenance that arises. Most peripherals have detailed instruction books, including diagrams that
show you how to perform routine maintenance tasks. Proper care of peripherals will improve their
long-term functioning and reliability.
It is important to follow the instructions in the manuals, especially any health and safety warnings. You
should also dispose of any spent consumables in accordance with the manufacturer’s
recommendations.
For example, you should wear gloves when changing any printer toner. When disposing of the empty
cartridge, place it in the container it arrived in and either put it in the bin or organise a recycling
company to collect it.
The care of computer equipment usually falls under three categories:
1 external components
2 internal components
3 software.
External components
External components should usually be wiped down with the proper cleaning fluid and technique. For
example, do not use soap and water to clean a keyboard. This can short-circuit the keyboard or cause
the keys to stick when in use.
A mouse with a roller ball can stop tracking correctly because of dirt. Use a proper cleaning solution or
alcohol on a lint-free cloth to clean the exterior. Remove the mouse ball from its cover. Clean the ball
with the cleaning solution or warm water and dry it off. Remove any lint or dust from the rollers inside
the mouse ball housing. You may need to use a cotton bud.
Internal components
Dust and dirt tend to build up inside computer equipment. In a PC, too much dust can cause the system
to overheat or crash. Unplug the computer equipment before you open it up. Use compressed air or a
vacuum cleaner to remove as much dust as possible. All computers and many peripherals have a power
supply that is cooled by a fan, which pulls air in through vents. You can normally remove the dust by
blowing compressed air into the vent holes of the power supply, which will force the dust out of the fan
and the vents.
Cleaning monitors
Monitors should be cleaned with an anti-static cleaner made for electronic equipment. Always
spray the cleaning product on a lint-free cloth then wipe the monitor. This technique prevents
excess liquid being applied to surfaces, and leaking into the edges of the monitor.
Qualified technicians only
The cathode ray tube (CRT) in a colour monitor is powered by 25,000 volts of electricity. This
ICT Level 2 Page 36
Colleges of Harmony ICT Level 2
makes it dangerous to work with — leave all internal maintenance to a qualified technician.
Special care needs to be taken, such as not wearing metal jewellery when working with high-
voltage equipment. Even when not in use, the CRT acts like a capacitor and can retain a charge.
Never touch the high-voltage anode near the front of the CRT, because it can give you a fatal
electric shock.
Cleaning printers
Most printers come with instructions for maintenance and you should always follow them.
Laser printers can become very hot. The toner that provides the image on the paper is fused to
the paper. The fuser assembly can reach temperatures of 600 degrees and can cause severe
burns. The laser radiation can cause serious eye damage. Most of them will have safety
switches that disable the laser radiation when opened. However, you should always turn off the
printer before you open it.
Laser printer cleaning
The instructions below for cleaning a laser printer are only for general information. Always
check your manual.
Wear protective gloves and non-conductive rubber-soled shoes to avoid any electrical
shocks.
Spray the cleaning product on a lint-free cloth, and then wipe the printer. You may have
to do this after cleaning the following components, as dirt, dust and toner are moved
around by this activity.
Blow compressed air into the power supply vents to remove dust, or use a vacuum cleaner.
If possible, remove the toner, developer and separator pad.
Wipe the separator pad, removing excess toner.
Wipe the outside of the toner and developer very gently.
Vacuum out any excess toner inside the printer.
Clean the connectors and contacts inside the printer using a contact cleaner.
Put the toner, developer and separator pad back inside the printer.
Remove the cables and use the contact cleaner to clean the cable connections.
Software
At times, users may not be able to access a peripheral. This may require re-installing the software
drivers for the peripheral. If the user has a new computer with a different operating system, the driver for
the operating system must be installed. At other times, the drivers may be updated to eliminate any bugs
or to run more smoothly with the operating system. New drivers can usually be found on the vendor’s
website.
Creating templates and forms
Templates and forms can make it easier to follow a maintenance schedule.
By using templates, an organisation can lift the standard of documentation and it becomes easier to find
information in documents. Templates can speed the process of creating new documents, as much work is
already done.
Consistency of layout and design helps clients easily recognise where the document has originated. For
example, the header may always have the page number and document name, with the section name of
the document, the version number and date completed in the footer. The start of the document may
contain the heading page, contents, author and introduction.
Templates are useful for enforcing consistency of style also and in some cases provide much of the text,
which may then only require a small amount of editing. This is most common in specification
documents, which may all contain similar information with only a small amount of information needing
to be tailored for a specific job.
Many organisations store templates in a networked or shared area. The user opens the template, and then
saves it as a normal document in their individual folder. As an example, a template for the LAN
administrators of an IT department to record their maintenance schedules may include: dates; parts for
maintenance; frequency of maintenance; whether an automatic or manual schedule; the date that the next
maintenance is to be performed.
The information may be stored directly in a database to then view the maintenance history of a piece of
hardware. Usually, a paper copy of the maintenance task is required with the signature of the technician
who performed it, but an electronic signature is now possible also.