You are on page 1of 10

ICT 10

QUARTER 4 MODULES

Module 1
Topic: OHS Procedures in Maintaining Computer Systems and Networks

Objective
You should learn how to follow OHS procedures in maintaining computer systems and
networks at the end of this lesson.

Maintenance procedures are conducted to ensure that computer systems and networks
are in proper operating conditions at all times. While performing these maintenance
measures, occupational health and safety policies and procedures must always be
followed to ensure the well-being of all personnel that are involved in the said activities.
OHS policies and procedures are composed of predefined actions that must be observed
in order to prevent any harm to be inflicted to anyone.

Learn about it!


The following are some of the most common OHS procedures that must be followed
before conducting any maintenance measure on computer systems and networks:

1. Always read the established OHS policies and procedures before conducting any
maintenance measures.
2. When dealing with electronic components, always wear an anti-static strap to prevent
the transfer or electro-static discharge. Taking off any jewelries is also advisable.
3. Always perform maintenance procedures in the best suitable work area with adequate
space and lighting.
4. Use only the appropriate tools in performing maintenance procedures to avoid any
damage to the equipment and cause injuries to the user.
5. Turn off and unplug all components and peripherals before touching them to avoid
electrocution. Waiting for a few minutes after unplugging is also recommended to assure
that no electric charge is left in the equipment.
6. Always hold components on their sides and prevent touching the terminals to avoid
wounding yourself. Also, avoid touching any sharp parts of a component to avert any
cuts.
7. Be very careful in connecting and disconnecting cables and connectors. Faulty
connections may cause an explosion when they are plugged into a power source.
8. When maintaining network devices in hard to reach areas, make sure to use the
appropriate equipment. Use a stepladder when working with hanged devices. Maintain
proper posture when lower yourself down to reach lowly place components.
9. Always ensure that all peripherals and devices are properly closed cases before plugging
them back to the power source.

Learn about it!


Maintaining the integrity of computer systems and networks is a vital part of ensuring
that the workplace will continue its operation; it is equally important that the well-being
of all personnel concerned in maintaining the computer systems and networks in proper
operating conditions be prioritized by establishing relevant occupational health and
safety policies and procedures.
Module 2
Topic: Maintaining Computer Networks Systems

Objective
You should learn to plan on how to maintain computer and networks systems at the end
of this lesson.

The maintenance of computer and network systems play a vital part in keeping the
activities of a workplace smooth and operational. Having systems that are not well-
maintained may result to incorrect outputs or even stoppage of the entire work. The IT
department must always be on top in maintaining the operational integrity of the
installed computer and network systems.

Learn about it!


There are two types of maintenance that can be applied to computers and networks. The
first one is called reactive maintenance, where in maintenance procedures are only
conducted when a certain fault or system error has been encountered, this results to
conducting troubleshooting procedures. This type is not highly recommended since
damages can already be inflicted on the systems.

The second and more recommended method is called preventive (proactive)


maintenance. This is normally done even if faults or errors were not experienced. It
has the principles of applying maintenance procedures the computer and network
systems to prevent any damages from happening. Preventive maintenance also follows a
strict schedule when all procedures must be accomplished on the designated systems.

Learn about it!


Listed below are the common guidelines in conducting preventive maintenance
procedures on computer and network systems.

1) Hardware maintenance

 Remove the dust from the components using a brush or compressed air
 Clean the peripherals that are connected to the computer
 Check and secure loose cables and connectors
 Run hardware diagnostic tests

2) Software maintenance

 Check security updates


 Review the software and systems driver updates
 Update and run the anti-malware software
 Remove unused and unwanted programs

3) Network maintenance

 Check the networking devices


 Scan for the cable breakage
 Clear all causes of interference

Performing regular preventive maintenance has a lot of benefits, such as the reduction
of potential hardware and software problems. This will not only save money for the
owner of the workplace, but will also contribute to better productivity. It can also
strengthen system stability and reduce equipment or system failures. Conducting
preventive maintenance must be scheduled to minimize the stoppage of work as much
as possible. It must be conducted in times where minimal personnel and systems will be
affected.

Module 3
Topic: Faulty Computer and Network Systems

Objectives
You should be able to identify faulty computer and networks systems at the end of this
lesson.

The use of computer and network systems in the workplace helps in completing a job or
a task in a faster and more efficient way. Although computer systems are thoroughly
checked and inspected before being deployed and the network systems are checked
regularly, faults and errors can still be experienced. The personnel from the IT
department, especially the computer technicians must be able to identify these faults so
that proper actions can be conducted.

Learn about it!


Listed below are some of the most common computer systems fault and their probable
causes:
Here are some of the most common network system faults and their possible causes:

Learn about it!


There are different ways of determining if a computer or network system is faulty. One
is called reactive, in which a fault can only be identified once it was already experienced
by the end-user or by anyone who is using the computer or network system. The other
method is known as proactive wherein a series of tests is conducted on both the
computer and network systems to determine whether a fault or error is present but has
not shown any symptoms yet.

Faults in computer and network systems must be determined as soon as possible.


Failure to know these faults would result in failure to perform the specific actions
needed. Maintenance and repair procedures must be done immediately to address the
faulty computer systems and network.

Module 4
Topic: Tools in Maintaining Computer and Network Systems

Objectives
In this lesson, you should learn to identify tools in maintaining computer and network
systems.

In order to achieve the optimum performance of the installed computer systems and
networks, proper maintenance must be included in the list of priorities by the personnel
from the IT department. The computer technicians, as well as the IT manager are
responsible in conducting maintenance tests to ensure that all computer systems and
the network itself is in proper operating conditions. In order to do this, technicians must
be well aware of the different tools to use for specific maintenance checks.
Learn about it!
Listed below are some of the most common tools in maintaining computer and network
systems:

1) Cleaning tools – one of the most basic maintenance that must be practiced is keeping
all computer systems, devices, and peripherals clean. Unclean components may lead
into malfunctions when too much dirt is already accumulated. Examples of cleaning
tools are brushes, lint-free cloths, cotton swabs, cleaning agents, vacuum cleaner, and
compressed air.

2) Hand tools – this includes all the equipment that is used in the installation and
maintenance of the computer systems. Examples are screwdrivers, wrenches, cutters,
and tools used for cabling like a crimping tool and a wire stripper.

3) Back-up Utility – this tool is composed of an external storage device that


automatically backs-up important data. This maintenance tool will enable the retrieval
of files and data in case something bad happened to the computer system.

4) Diagnostic Software – these are software tools designed to check the different
components of a computer system. Examples are:

 CPU Diagnostics – checks the central processing unit’s specifications and


performance.
 HDD Diagnostics – checks the hard disk drive’s integrity to store permanent
data.
 Memory Diagnostics – checks how the RAM stores and retrieves temporary data
used by a running application
 Power-on Self-test – checks all the components every time the computer is
booted up.

5) System Diagnostics Tool – if running each of the diagnostic software is not enough, a
system diagnostic tool may be used to maintain the system with respect to all the
components, hardware and software, that compose the computer system. This may
check for hardware compatibility, software updates, and scans for irrelevant and unused
files that may be deleted.
6) Anti-malware – this is a software tool that is designed to protect the system from
unwanted viruses or infections. Having an anti-malware installed across the network
will minimize the risk of having malfunctions that are caused by unwanted software.
Network Monitor or Network Diagnostic Tool – this tool is used to scan the entire
network for any faults and will try to fix them. This can also be used to send ping across
the network to ensure that all connected devices are able to communicate. Some of the
network activities scanned are the following:

 Bandwidth – this pertains to the amount of data that can be transmitted thru a
network within a specific period. This is normally measured in bits per second.
 Connected devices – this will show all the computer systems and devices that are
currently connected to the network. It will also show their activities that will
determine whether they are behaving differently.
 Logs – this lists all the activities that were performed by all connected devices.

These are just the common tools used in maintaining computer and network. Other
tools with greater capabilities can also be used if the situation calls for it.
Module 5
Topic: Inspection of Testing Equipment/Devices

Objectives
At the end of this lesson, you should be able to inspect testing equipment/devices.

Testing devices and equipment are used to check and maintain the proper operating
condition of a computer system or network. These tools enable a computer technician to
perform physical inspection as well as to check the internal functionalities of a computer
system, its components, and its peripherals. In order to perform a successful
maintenance check, testing devices and equipment must be inspected to ensure that
they will produce correct results.

Learn about it!


Listed below are the most common testing equipment and devices and how to properly
inspect them:

1) Digital Multi-meter – this device is used to check the various characteristics of


electronic components and circuits such as resistance, voltage, and current.

Inspection procedures:

 Always check if the batteries still have juice left in them.


 Make sure that the endpoints of the probes are clear from any dirt or lint.
 Ensure that the probes are connected to their proper terminal.
 All settings must be checked and selected prior to using the device.
 The LCD must be clear and properly visible.

2) Multifunction Cable Tester – this device is used to test if the connectors are properly
connected to both ends of the cable. This could also check the different ports like the
USB, HDMI, and RJ45 ports.

Inspection procedures:

 Check if the battery are installed or it is connected to a power supply.


 Inspect the ports for any dusts, dirt and lint that may prevent the contact points
of a connector from establishing proper connection.
 All plugged connectors must be removed before testing another cable.
 Check the light indicators so that proper readings can be made.

3) Toner Probe – this device is used to locate or trace cables and wires. One part is
connected on one end of the cable while the other part produces a sound or a tone if it
gets near the other end of a cable.

Inspection procedures:

 Check if batteries are properly installed.


 Check the endpoint of the probes and make sure that it is free from any form of
dirt.
 Ports or slots must also be free from dust and lint to ensure that connectors will
have a proper contact point.
 Light indicators must be clear and free from any obstruction.
4) Power Supply Tester – this device is used to determine whether the power supply
generates the correct voltages for the different computer components. This is used by
testing the different power connectors.

 Check if batteries are installed.


 No other connectors must be plugged in before conducting any tests.
 Check the wires for any breaks or damages.
 Ports must be free from dusts and dirt.
 LCD and indicator lights must be clear.

Module 6
Topic: Checking PC Specifications

Objective
Learn how to check PC specifications with the help of this lesson.

A computer system is composed of multiple components that are chosen for a particular
purpose. In order to determine whether a computer system will be able to adhere to the
job requirements specified, it must have the correct PC specifications. PC (System)
specifications pertains to the specific capabilities and measurements of a computer
system together with its installed components and peripherals. Often times, the job
requirements must be assessed first in order to determine the PC specifications needed.

Learn about it!


There are multiple ways to check the PC specifications:

1. Check the box – normally, the box that contains the computer system indicates
all the necessary specifications that is needed to be known by the technician or
the user. This can only be used if the PC is bought brand new.
2. Check the system properties – most operating systems has an option to view its
specifications. These can be compared with the box if there is any. Most of the
times, the information listed in this is more reliable than those on the box since
this displays the actual specifications. This is often used for customized computer
systems.
3. Check the support website – all you have to do is to know the model of the
computer system and log on into its support website to view the needed
specifications. This is used if the computer system is not new and does not boot
up.
4. Listed in the table below are the most common PC specifications to look out for:

Tips
 For a computer system to be fully utilized, the correct PC specifications must always be
taken into consideration.
 A higher specification means a better performing computer system.
 Being able to know how and what to look for will greatly aid not only a computer
technician, but also a normal end-user as well.

Module 7
Topic: Verify Network Functions and Specifications

Objectives
At the end of this lesson, you should be able to verify network functions and
specifications.

All computer systems and peripherals are connected to a network with the primary
purpose of sharing resources. These shared resources can be in the form of files, data,
connectivity, software, and peripherals. In order to ensure that a computer network will
be able to perform correctly, its functions and specifications must be verified. Network
functions pertains to the services and features that a network can perform while the
specifications pertain to the physical and operational characteristics.
Learn about it!
Listed below are the most common functions of a computer network and how to verify
them:

1) Resource Sharing

 Files – any computer system that is connected to a network must be able to view, copy,
edit or delete a shared file depending on the authorization of the author. This can be
verified by accessing the shared folder of a computer.
 Connectivity – all computer systems must have the ability to connect to the Internet.
This can be verified by opening a web browser and logging on a website.
 Software – in a client-server setup, all clients must be able to access software that is
sourced by the server. This can be verified by launching an application provided by the
server.
 Peripherals – all computer systems must have access in using a shared peripheral, such
as a printer or a fax machine. This can be verified by printing on a remote printer, for
example.
 2) Communication
 All computer systems, peripherals and networking devices must be able to send
packets to each other. These packets contain essential data that is needed for all
devices to be able to communicate. This can be verified by sending a ping to all
the connected devices and wait for a reply. Receiving a reply means
communication has been correctly established.
 3) User access
 In a client-server set-up, an active directory may be configured to allow a user to
login to any computer while using the same credentials. To verify this, a user may
try to login into several computer systems, his files and preferences must be the
same in all the systems that he logs in to.
 Listed below are the network specifications and how to verify them:
 1) Cables and Connectors (for wired networks)
 It is relatively easy to verify these. A simple physical inspection is what it takes to
check whether the correct cables and connectors are used.
 2) Wireless Connectivity
 To verify this, log into the wireless router’s (central access point) setup. Check the
band and channel that it broadcasts. It must be configured to allow all wireless
devices to connect. Normally, all bands are enabled and channels are set to
automatic.
 3) Physical Topology
 Pertains to the physical arrangement of the devices in a network. This can easily
be verified by checking the indicated floor plan.
 4) Logical Topology
 Pertains to how the flow of data is designed in a network. This can be verified by
comparing it against networking protocols.

 5) Bandwidth
 This pertains to the data transfer rate within the network. This can be verified by
running a network diagnostic tool and comparing it to the indicated bandwidth of
the networking devices and network interface cards of computer systems.

Tips
 In order to ensure that the computer network will be able to perform accordingly,
verifying its functions and specifications is a vital activity that must not be taken for
granted.
 Having a computer network that adheres to its primary purpose will result in flawless
resource sharing and communication.

You might also like