You are on page 1of 58

COMPETENCY-BASED LEARNING MATERIALS

Sector: Electronics

Qualification Title: Computer System Servicing NC II

Unit of Competency: Maintain and Repair Computer Systems and Networks

Module Title: Maintaining and Repairing Computer Systems and Networks

Developed by: Nelson P. Alde Jr.

Technical Education & Skills Development Authority


I Connect Global Institute, Inc.
Ocampo, Camarines Sur
HOW TO USE THIS COMPETENCY-BASED LEARNING
MATERIALS

Welcome to the module “Maintaining and Repairing Computer


Systems and Networks”. This module contains training materials and
activities for you to complete.

The unit of competency “Maintain and Repair Computer Systems and


Networks” contains the knowledge, skills and attitudes required for
Computer System Servicing required to obtain the National Certificate
(NC) level II.

You are required to go through a series of learning activities in order to


complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets. Do these activities on your own and
answer the self-checks at the end of each Information Sheet. You also have
to perform the Operation/Task/Job Sheets and afterwards, you have to
evaluate your own performance using the performance criteria checklists.

If you have questions, don’t hesitate to ask your Trainer for assistance.

Recognition of Prior Learning (RPL)

If you have already some knowledge and skills covered in this module
because you have been working for some time; or already completed training
in this area; or if you can demonstrate competence to your Trainer in a
particular skill, talk to your Trainer so you don’t have to undergo the same
training again. If you have a qualification or Certificate of Competency from
previous trainings show it to him/her. If the skills you acquired are
consistent with and relevant to this module, they become part of the
evidence. You can present these for RPL. If you are not sure about your
competence skills, discuss this with your Trainer.

After completing this module, ask your Trainer to assess your


competence. Result of your assessment will be recorded in the Achievement
Chart/Progress Chart. All the learning activities are designed for you to
complete at your own pace.

In this module, you will find the activities for you to complete and
relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.

This module is prepared to help you achieve the required competency, in


receiving and relaying information. This will be the source of information
that will enable you to acquire the knowledge and skills in Maintaining and
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Repairing Computer Systems and Networks independently at your own
pace with minimum supervision from your Trainer.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Computer System Servicing NC II
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Installing and
Install and Configure ELC724331
1. Configuring Computer
Computer Systems
Systems

Set-up Computer Setting-Up Computer ELC724332


2.
Networks Networks

Set-up Computer Setting-Up Computer ELC724333


3.
Servers Servers

Maintain and Repair Maintaining and


4. Computer Systems Repairing Computer ELC724334
and Networks Systems and Networks

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
MODULE CONTENT

UNIT OF COMPETENCY: Maintain and Repair Computer Systems


and Networks

MODULE TITLE: Maintaining and Repairing Computer


Systems and Networks
MODULE DESCRIPTOR: This unit covers the knowledge, skills and
attitudes needed to maintain and service
computer systems and networks.

NOMINAL DURATION: 40 Hours

LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able
to:
LO1. Plan and prepare for maintenance and repair
LO2. Maintain computer systems and networks
LO3. Diagnose faults of computer systems and networks
LO4. Rectify/correct defects in computer systems and networks
LO5. Inspect and test the computer systems and networks

LEARNING OUTCOME NO. 1


Plan and Prepare for Maintenance and Repair
ASSESSMENT CRITERIA:

1. Maintenance and/or Diagnosis of faults is planned and prepared in


line with job requirements.
2. Tools, equipment and testing devices needed for the maintenance
are obtained and checked for correct operation and safety
3. Materials necessary to complete the work are obtained in
accordance with established procedures and checked against job
requirements.
4. OHS policies and procedures are followed in line with job
requirements.
5. Computer systems and networks for maintenance are checked
against job/service order or instructions and specifications.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Contents:

1. Planning and preparing for maintenance


2. Computer systems maintenance procedures
- PC systems
- Computer operations
- Electronic fault findings
3. Use and operation of tools, instruments and testing devices
4. Occupational health and safety policies and procedures

Conditions

The students/trainees must be provided with the following:


1. OHS guidelines and policies.
2. PC specifications
3. Tools
- Pliers (assorted)
- Screw drivers (assorted)
- Special tools
- Soldering iron/gun
- Wrenches
- Utility knife/stripper
- Hot air soldering station
- LAN Tester
- Crimping tools
4. Equipment includes but not limited to:
- Maintenance bench
- Power supply equipment
5. Testing devices include but not limited to:
- Multi-meter
- Calibrators
- Signal generator
- Oscilloscope
6. Appropriate software

Assessment Method:

1. Hands-on
2. Direct observation
3. Practical demonstration

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.1-1
Plan and Prepare Maintenance Procedures

INTRODUCTION:
Maintenance refers to the actions carried out to retain an item in or
restore it to an acceptable condition either Planned which is divided into
Preventive and Corrective Maintenance or Unplanned.

It is easy to think computers are so advanced that they don’t have the
same problems as other machines. The truth is that your computer network
is a collection of complex machines and software, communicating
simultaneously, performing of trillions of calculations, using hundreds of
parts and wires, and under constant assault by viruses and spyware and
their own users.

Planning and preparing systematic maintenance procedure will save


time, money and frustration. It is a good idea and opportunity to learn the
proper care and maintenance of your computer.

Because of these and other factors (mostly human), your computers


require regular computer service maintenance to keep the big problems
away and maintain optimal performance. This program is often referred to
as computer maintenance contract, service level agreement, or
computer network maintenance plan.

Here are ten reasons every small business needs regular and proactive
server and workstation maintenance:

1. Critical security updates need to be applied at least once a month


2. Firewall, virus and spyware protection needs regular review and
management
3. Daily use of servers and workstations by office staff can create random
network issues
4. Management of backup status, data selected and data testing is
critical to data recovery
5. Proactive server and workstation standardization minimizes problems
6. Management of hard drive resources prevents storage issues & server
crashes
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
7. Analysis of server event logs can identify issues before they create
network problems
8. Regular optimization of server(s) and workstations to increase speed
and efficiency
9. Proactive maintenance provides real peace of mind that someone is
regularly caring for your network
10. Predictable monthly budget and support minimizes financial and
technical surprises

Plan Maintenance Procedures for Computer System and Networking.

1. Design a systematic maintenance plan for hardware.




Monitoring, evaluating and updating plan.


Place your computer in a well ventilated area.


Schedule use of computers for its longer life.


Move computers only when it is turned off and unplugged.


Treat your computer properly.
Maintain your hard disk


2. Design a systematic maintenance plan for your software.


Backup your files


Install or secure passwords


Delete temporary files
Update antivirus and spy ware

Sharon llagas
---MAINTAINANCE PROGRAM---
Maintenance Program- is a comprehensive list of maintenance and its
incidents. This would include all maintenance activities to be undertaken,
manpower needed, maintenance methods to be used, all the materials and
supplies needed for the maintenance and cost involved in the maintenance.

Maintenance Schedule- Is a list allocating specific maintenance of an area.


Equipment and tools to a specific period. The maintenance schedule is just
a part of the maintenance program.
Quality management- is a method for ensuring that all the activities
necessary to design, develop and implement a product or service are
effective with respect to the system and its performance.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
The following diagram is the Shewhart cycle (PDCA) for quality
improvements. Made popular by Dr. Deming.

The Quality Management Cycle

The philosophy is to keep improving the quality of an organization. It is


defined by the four key steps:
A. Plan: Design and revised business process components to improve
results.
B. Do: Implement the plan and measure its performance
C. Check: Assess the measurements and report the results to
decisions makers
D. Act: Decides on changes needed to improve the process.

A. PLAN. In this stage an organization must be able to prepare a good


maintenance program which will define the standards for Best
Management Practices.
What can we gain from maintaining our facilities?

1. Ensured SAFE environment


2. Improve MORALE of human resources
3. Reduced operational COST
4. Increased PRODUCTION
5. Prolonged LIFE facilities
6. Prompt DELIVERY of services/ product
B. DO. Here in this stage the organization through the clearly identified
Maintenance Program, must be able to practice the Methods and System
defined in order to meet the standards (measurable performance levels of
maintenance execution) established.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Maintenance Methods and Procedures
1. 5S
2. Types of Maintenance
Planned
 Preventive
 Corrective
 Unplanned

 SEIRI (Sort)…………………………….. Taking out and disposing


unnecessary items.
 SEITON (Systematize)……………….. Arrangement/organization of
necessary items in good order for
use.
 SEISO (Sweep)………………………... Cleaning of the workplace,
including
tools and equipment.
 SEIKETSU (Sanitize)…….…………… Maintaining the workplace in
high standard of housekeeping
and organization.
 SHITSUKE (Self-Discipline)…………. Doing things spontaneously
without being told.

SAMPLE TEMPLATE NO. 2 EQUIPMENT MAINTENANCE


SCHEDULE
EQUIPMENT TYPE Personal Computer
EQUIPMENT CODE PC 1
LOCATION Practical Work Area
Schedule for the Month of
ACTIVITIES MANPO September 2010
WER
Remark
Month
Weekl
Other
Every

Every
Daily

15th
Day

Day

ly
y

1. Clean PC Trainer/ X
utility/
trainees
2. Check Hard disk
Trainer/ x

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
utility
3. Check power source
and lines Trainer x

C. CHECK. To determine if the maintenance program is implemented


according to what is planned, an assessment must be done. The result of
the assessment will then be recorded and recorded to the proper
authorities for the immediate action.

Regular inspections are conducted to assure that the maintenance


activities are done on the date and time it was planned and that the
performance levels adhered to the defined standard.

SAMPLE EQUIPMENT INSPECTION CHECKLIST


This checklist will confirm if the maintenance activities have been
performed in order to prolong the life of this particular equipment.
The Inspection items are stated in a question form as these serve
as the criteria or standards of maintenance.

Sample Template MAINTENANCE INSPECTION CHECKLIST


No. 3
Equipment Type PERSONAL COMPUTER
Property Code
Number pc1
Location Practical Work Area

YES NO INSPECTION ITEMS


√ Is the machine turned off after use?
√ Are accessories checks for damage?
√ Are terminals, connections checked for loose
connection?
√ Is the machine regularly cleaned?
√ Is the machine used properly according to
manufacturer’s specification?

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
D. ACT. The inspection will allow the organization to determine if the
standards of maintenance are met. This will also allow the identification
of further improvement in the process and procedures. Hence, the results
of the inspection must be properly documented and reported to the
proper authorities for immediate action or correction needed.

A. PROPER UTILIZATION OF EQUIPMENT AND TOOLS

The proper use of the training tools and equipment is the first and
foremost task in the maintenance. The proper use of tools and
equipment is a very important task of the worker in any trade. They
must be able to use them in accordance to the manufacturer’s
manuals as this would evidently extend the life of the equipment and
tools.
USER’S MANUAL:
1.) For the Safe and Proper Operation of an Equipment or Tools.
When using equipment and simple tools, it is best to read the
manufacturer’s and/or user’s manuals. This would indicate the part
of the equipment, the functions of each part and the way to maintain
it. We must always refer to it for reference. The user’s manuals must
be kept handy and within the Quality Control Area where the
equipment is kept for immediate reference.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
LEARNING OUTCOME NO. 2
Maintain Computer Systems and Networks
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with
standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures
Contents:

Job service order forms or checklist


1.
Problem solving in emergency situation
2.
Procedures in maintenance scheduling
3.
Preventive maintenance of computer system and network
4.
- Operating system update
- Back-up scheduling
- Creating restore point
- Guarding against virus
- Cleaning computer systems and networks
Conditions

The students/trainees must be provided with the following:


1. PC specification
2. Scheduled/periodic maintenance checklist
3. Personal protective equipment
4. Materials
5. Diagnostics software and CD-ROMs
6. Tools and test equipment’s
7. Spare parts

Assessment Method:

1. Hands-on
2. Direct observation
3. Practical demonstration

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.2-1

Set-up and Maintenance of a Computer Systems

LEARNING OBJECTIVE:

Computer users can avoid problems by regular maintenance. This


includes covering their keyboard when not in use, cleaning disk drive heads
and printers as well as backing up important data and software.

Proper set-up and maintenance ensures that system users can put it
to good use.

A simple regimen to follow is presented below:

SET-UP AND MAINTENANCE


 Clean and dry work environment
 Plenty of work space
 Storage for disks and manuals
 Proper lighting and seating
 Surge protector
 Screen glare shield
 Anti-static pad

PROPER ENVIRONMENT AND LOCATION OF


COMPUTER
One of the most overlooked aspects of
microcomputer preventive maintenance is protecting the
hardware from environmental abuse. The result of this
type of abuse is many system failures.

Examining the Operating Environment


 Before you acquire a system, prepare a proper location for new
system, free of air borne contaminants such as smoke or other


pollution.


Do not place your system in front of a window.
The system should not be exposed to direct sunlight or temperature


variations.
The environmental condition should be as constant as possible.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 Power should be provided through properly grounded outlets and


should be stable and free from electrical noise and interference.
Keep your system away from radio transmitters or other sources of
radio frequency energy.

1. HEATING AND COOLING


Temperature variation leads to serious problems. To ensure, you
first must determine your system’s specified functional range.
Two temperature specifications might be available, one
indicating allowable temperatures during operation and other
indicating temperatures under non-operating conditions.

 Turning on (Also called Powering On) a cold system


2. POWER CYCLING (ON AND OFF)

 For these reasons, limiting the number of power-on cycles


subjects it to the greatest possible temperature variations.

a system is exposed to greatly improve its life and

 If possible, power on the system one time only daily.


reliability.

 If you do keep your system on for too long periods of time,


make sure that the screen is blank or displays a random
image if the system is not in use.

 Static electricity can cause numerous problems within a


3. STATIC ELECTRICITY

system. In this case you might need to take special

 Most static sensitivity problems are caused by improper


precautions to ensure that the system functions properly.

groundings of the system power. Be sure that you always


use three-prong, grounded power cord plugged into a

 Whenever you open a system unit or handle circuits


properly grounded outlet.

removed from the system, you must be much more careful

 Handle boards and adapters first by a grounding point


with static.

such as the bracket to minimize the potential for static

 If the static problem is extreme, you can resort to other


damage.

measures. One is to use a grounded static mat


underneath the computer. Touch the mat first before you
touch the computer to ensure that any static charges are
routed to the ground and away from the system unit’s
internal parts.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
4. POWER LINE NOISE
To run properly, a computer system requires a steady supply of
clean noise-free power. During the site preparation of a system
installation, you should be aware of these factors to ensure a
steady supply of clean power.
 If possible, the computer should be on its own circuit with
its own circuit breaker.

The circuit should be checked for a good, low resistance-ground, proper line
voltage, freedom from interference and freedom from brownouts (Voltage
dips)

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.2-2

Cleaning Computer’s Components and Peripherals

Introduction

Cleaning your computer and your computer components and


peripherals helps keep the components and computer in good working
condition and helps keep the computers from spreading germs.
Depending on the environment that your computer operates in
determines how often you should clean your computer case.

How often should I clean my computer?

To help you determine how often you need to clean your computer, use
the chart below. Check each of the boxes below that apply to your
computers environment to determine how often it should be cleaned.
Where is computer located?

In a home environment

In a clean office environment

In construction or industry environment

In school environment

Computer environment

Have cat or dog in same building as computer

Smoke in same building as computer

Smoke next to computer

Computer is on floor

Room that the computer is in has carpet

Eat or drink by computer

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Who uses it?

Adult (18 and older)

Young adults (ages 10-18) use computer

Pre-teen (younger than 10) use computer

More than one person uses computer

General cleaning Tips

1. Never spray or squirt any liquid onto any computer component.


If a spray is needed, spray the liquid onto a cloth and then use
that cloth to rub down the component.
2. You can use a vacuum to suck up dirt, dust, or hair around the
computer on the outside case. However, do not use a vacuum
for the inside of your computer as it generates a lot of static
electricity that can damage the internal components of your
computer. If you need to use a vacuum to clean the inside of
your computer, use a portable battery powered vacuum
designed to do this job or try using compressed air.
3. When cleaning a component or the computer, turn it off before
cleaning.
4. Be cautious when using any cleaning solvents; some individuals
may have allergic reactions to chemicals in cleaning solvents
and some solvents can even damage the case. Try to always use
water or a highly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs
or controls. In addition, when cleaning the back of the
computer, if anything is plugged in, make sure not to
disconnect any of the plugs.
6. When cleaning fans, especially the smaller fans within a
portable computer or laptop it's suggested that you either hold
the fan or place something in-between the fan blades to prevent
it from spinning. Spraying compressed air into a fan or cleaning
a fan with a vacuum may cause damage or back voltage to be
generated.
7. Never eat or drink around the computer.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Cleaning tools

Although many companies have created products to help improve the


process of cleaning your computer and peripherals, users can also use
household items to clean their computers and peripherals. Below is a
listing of items you may need or want to use while cleaning your
computer or computer peripherals.

 Cloth – A cloth is the best tool used when rubbing down a


component; although paper towels can be used with most
hardware, we recommend using a cloth whenever possible.
Caution: We only suggest you use a cloth when cleaning
components such as the outside of the case, a drive, mouse, etc.
You should not use a cloth to clean any circuitry such as the RAM
or motherboard since they can generate ESD that can damage
electronics.
 Water or rubbing alcohol - When moistening a cloth, it is best to
use water or rubbing alcohol. Other solvents may be bad for the
plastics used with your computer.
 Portable Vacuum - Sucking the dust, dirt, hair, cigarette
particles, and other particles out of a computer can be one of the
best methods of cleaning a computer. Over time, these items can
restrict the airflow in a computer and cause circuitry to corrode.
Do not use a standard vacuum as it can generate a lot of static
electricity that can damage your computer.
 Cotton swabs - Cotton swaps moistened with rubbing alcohol or
water are excellent tools for wiping hard to reach areas in your
keyboard, mouse, and other locations.
 Foam swabs - Whenever possible, it is better to use lint-free
swabs such as foam swabs.

CLEANING THE PARTS OF THE COMPUTER AND THE PERIPHERALS

 Case cleaning

Why? Keeps the appearance of the computer looking new. During


cleaning, if ventilation locations are found, these can be cleaned
helping the case keep a steady airflow to the computer, keeping
components cool and in good working condition.

Procedure: The plastic case that houses the PC


components can be cleaned with a lint-free cloth
that has been slightly dampened with water. For
stubborn stains, add a little household
detergent to the cloth. It is recommended that

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
you never use a solvent cleaner on plastics.

Make sure all vents and air holes are hair and lint free by rubbing a
cloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is safe
to use a standard vacuum when cleaning the outside vents of a
computer; however, if you need to clean the inside of the computer, use
a portable battery powered vacuum to prevent static electricity.

 CD-ROM, DVD, and other disc drive cleaning

Why? A dirty CD-ROM drive or other disc drives can cause read errors
when reading discs. These read errors could cause software installation
issues or issues while running the program.

Procedure: To clean the CD-ROM drive we recommend purchasing a


CD-ROM cleaner from your local retailer. Using a CD-ROM cleaner
should sufficiently clean the CD-ROM laser from dust, dirt, and hair.

In addition to cleaning the drive with a special disc designed to clean


drives users can also use a cloth dampened with water to clean the tray
that ejects from the drive. Make sure however that after the tray has
been cleaned that it completely dry before putting the tray back into
the drive.

 CD and DVD disc cleaning

Why? Dirty CDs can cause read errors or cause CDs to not work at all.

Procedure: Cleaning CDs and DVDs should be done with a cleaning kit
but can also be done with a normal clean cotton cloth or shirt. When
doing this with a clean cotton cloth or shirt, wipe against the tracks,
starting from the middle of the CD or DVD and wiping towards the
outer side as shown in the below picture. Never wipe with the tracks;
doing so may put more scratches on the disc.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
It is recommended when cleaning a CD that water is used. However, if
the substance on a CD cannot be removed using water, pure alcohol
can also be used.

 Hard drive cleaning

Why? While hard drives cannot be cleaned physically, they can be


cleaned with various utilities on the computer to help it run fast and
more efficiently. Utilizing these utilities will prevent the hard drive from
slowing down.

Procedure: Refer to our basic troubleshooting section for your


operating system for steps that can be done to help improve the
performance of your computer.

Additional help: Hard drive page

 Headphones cleaning

Why? Headphones that are used by multiple people may need to be


cleaned frequently to help prevent the spreading of germs and head
lice.

Procedure: If the headphones being used are plastic or vinyl, moisten a


cloth with warm water and rub the head and earpieces of the
headphones. As mentioned earlier in our cleaning tips, it is
recommended that if your headphones are being used for a library or
school that you do not use any disinfectant or cleaning solvent as users
may have allergic reactions to the chemicals they contain.

Headphones that have cushions also have the availability of having the
cushions replaced. Replacing these cushions can also help keep the
headphones clean.

 Keyboard cleaning

Dust, dirt, and bacteria

The computer keyboard is often the most germ infected items in your
home or office, often it will contain more bacteria than your toilet seat.
Cleaning it can help remove any dangerous bacteria. Dirt, dust and
hair can also build up causing the keyboard to not function properly.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Procedure: Before cleaning the keyboard first turn
off the computer or if you're using a USB keyboard
unplug it. Not unplugging the keyboard can result
in causing other computer problems as you may
press keys that cause the computer to perform a
task you don't want it to do.

Many people clean the keyboard by turning it upside down and


shaking.

 to use compressed air.


A more effective methods are:

 To use vacuum cleaner


but make sure the keyboard doesn't have loose "pop off"

 If you wish to clean the keyboard more extensively you'll need


keys that could possibly be sucked up by the vacuum.

 After the dust, dirt, and hair has been removed. Spray a
to remove the keys from the keyboard

disinfectant onto a cloth or use disinfectant cloths and rub each


of the keys on the keyboard.

 LCD cleaning

Why? Dirt, dust, and finger prints can cause the computer screen to
be difficult to read.

Procedure: Unlike a computer monitor,


the LCD or flat-panel display is not made of glass,
therefore requires special cleaning procedures.

When cleaning the LCD screen it is important to


remember to not spray any liquids onto the LCD
directly, press gently while cleaning, and do not use a
paper towel as it may cause the LCD to become
scratched.

To clean the LCD screen we recommend that you use a non-rugged


microfiber cloth, soft cotton cloth, or Swiffer duster. If a dry cloth does
not completely clean the screen, you can apply rubbing alcohol to the
cloth and wipe the screen with the damp cloth. Rubbing alcohol is used
to clean the LCD before it leaves the factory.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 Motherboard cleaning

Why? Dust and especially particles of cigarette smoke can build up


and corrode circuitry causing various problems such as computer
lockups

Caution: When inside the computer take the necessary ESD


precautions and try to avoid unplugging any cables or other
connections.

Procedure: Our recommendation when


cleaning the motherboard from dust, dirt, or
hair is to use compressed air. When using
compressed air, hold it in the up-right position;
otherwise, it is possible chemicals may come
out of the container that could damage or
corrode the Motherboard or other component
within the computer. Also, ensure when using compressed air that you
always blow the dust or dirt away from the motherboard, or out of the
case.

Tip: When cleaning the inside of the case also look at any fans or heat
sinks. Dust, dirt, and hair collect around these components the most.

 Mouse cleaning

Why? A dirty optical-mechanical mouse (mouse with a ball) can cause


the mouse to be difficult to move as well as cause strange mouse
movement.

Procedure: To clean the rollers of an optical-mechanical mouse, you


must first remove the bottom cover of the mouse. To do this, examine
the bottom of the mouse to see what direction the mouse cover should
be rotated. As you can see in the below illustration, the mouse cover
must be moved counter clockwise. Place two fingers on the mouse
cover and push the direction of the arrows.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Note: Cleaning your mouse pad with a damp cloth can also help
improve a computer's mouse movement.

Why? To help keep a mouse clean and germ free it can be helpful to
clean the mouse.

Procedure: Use a cloth moistened with rubbing alcohol or warm water


and rub the surface of the mouse and each of its buttons.

 Printer cleaning

Why? Cleaning the outside of a printer can help keep the printer's
appearance looking good; and in the case of a printer that is used by
many different people, keep the printer clean of germs.

Procedure: First, make sure to turn off the printer before cleaning it.
Dampen a cloth with water or rubbing alcohol and wipe the case and
each of the buttons or knobs on the printer. As mentioned earlier,
never spray any liquid directly onto the printer.

Why? With some printers it may be necessary to clean the inside of the
printer to help keep the printer running smoothly.

Procedure: Because of how many different printers there are, steps in


cleaning printers, and printer manufacturer policies on cleaning the
inside of the printer, we recommend you obtain the printer cleaning
steps from your printer manufacturer.

 Scanner cleaning

Why? Flatbed scanners commonly become dirty with dust,


fingerprints, and hair. When a scanner is dirty, the images may have
distortions.

Procedure: Clean a flatbed scanner's surface by spraying a window


cleaner onto a paper towel or cotton cloth and wipe the glass until
clean. As mentioned earlier, never spray a liquid directly onto the
component.

To clean the outside of the scanner, the same towel or cotton cloth can
be used.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.2-3

Speeding up Computer System

DIAGNOSTIC PROGRAMS
There are three categories of diagnostic disks.

 WHOLE MACHINE DIAGNOSTIC products attempt to test the entire


machine. They test the memory, the microprocessor, the DMA chips,
the numeric coprocessor, and the floppy and hard drives, the serial
and ports, the video, the mouse and the keyboard. They also provide
full system configuration information (including the interrupt and
memory address used by each place of hardware.

 DISK/DATA DIAGNOSTICS concentrate on the disk drives and the


data structures of the hard disk and/or floppy disk, patiently reading
each sector in search of corrupted data.

 SYSTEM SNOOPERS report on the hardware and software installed in


the computer plus interrupts and addresses used by the hardware,
but do not attempt to test it. Products in this class call themselves
configuration utilities or system information utilities.

Diagnostic program error messages, your computer’s BIOS ROM error


messages and DOS error messages are all based on the educated guess. Use
this information these error messages give you, but remember they are not
infallible. Several of the diagnostic programs that are currently on the
market are:
1. WHOLE SYSTEM UTILITIES
2. DIAGNOSTIC AND DATA RECOVERY UTILITIES

I. REGULAR MAINTENANCE

As time passes while you use your PC, everything stored in your
computer data may become scattered. Bad sectors can be found; some
files or folders may be missing. There are 3 steps you have to take in
order to fix these problems.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
A. Defragment your hard disk
B. Perform Scandisk(chkdisk) for your hard disk
C. Run Disk Cleanup for your Windows

A. DEFRAGMENT DISK

―Defragmentation‖ is a term used for the process


of scanning the file system and reducing the amount
of fragmentation in file systems. Doing this may greatly improve
system performance.

Use Windows Disk Defragmenter!

There are many different ways to open Disk Defragmenter. The


two most common methods are listed below.

 (Start –> Programs –> Accessories –> System Tools –>


Disk Defragmenter)
 (My Computer –> Right click your drive –> Select ―Tools‖
on the Tabs –> Click Disk Defragmenter)

For Windows XP:

When you open Disk Defragmenter, you will see a list of


the hard drives displayed at the top of the screen.

The Estimated Disk Usage Before Defragmentation


and Estimated Disk Usage After Defragmentation will be

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
blank until a drive is selected and the Analyze button is
clicked.

After the Analyze button has been clicked and the process
has been completed, the Session Status will show ―Analyzed‖
and the Estimated Disk Usage before Defragmentation will show
a graphical represent the drive fragmentation.

B. SCANDISK

Sometimes you may notice that your computer systems are


running slow, many programs stop responding halfway, or your
CPU usage for the system process approaches 100 percent. At this
rate, you should check your hard disk immediately by
using Scandisk Utility.

ScanDisk is a utility in Microsoft Windows which checks your


drive to make sure there aren’t any problems with it. ScanDisk
scans your hard disk for errors and manage to repair the errors
found.

The errors usually caused by improper shut down, improper


installation of certain files, viruses, worms and Trojan horses.
Using ScanDisk Utility to scan and correct errors can fix damage
caused to Windows systems and improving system performance.

For Windows XP/Vista:

 Double-click “My Computer”, and then right-click the “hard


disk” that you want to check.
 Click “Properties”, and then click “Tools”.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 Under “Error-checking”, click “Check Now”.

To repair errors without scanning the volume for bad sectors,


select the “Automatically fix file system errors” check box.

To repair errors, locate bad sectors, and recover readable


information, select the “Scan for and attempt recovery of bad
sectors” check box. Finally, click “Start”.

For Windows XP Users, if you receive the following message:


“The disk check could not be performed because the disk check
utility needs exclusive access to some Windows files on the disk.
These files can be accessed by restarting Windows. Do you want to
schedule the disk check to occur the next time
you restart the computer?
Click “Yes” to schedule the disk check, and then restart your
computer to start the disk check.

C. DISK CLEAN UP
The Disk Cleanup tool helps you free up space on your hard disk to
improve the performance of your computer. The tool identifies files
that you can safely delete, and then enables you to choose whether
you want to delete some or all of the identified files.

Use Disk Cleanup to:

 Remove temporary Internet files.


 Remove downloaded program files (such as MS
ActiveX controls and Java applets).
 Empty the Recycle Bin.
 Remove Windows temporary files such as error reports.
 Remove optional Windows components that you don’t use.
 Remove installed programs that you no longer use.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 Remove unused restore points and shadow copies from System
Restore.
How to Use Disk Cleanup Utility?
1. Click Start, click All Programs,
click Accessories, click System Tools,
and then click Disk Cleanup. If your
computer has multiple drives, you might
be prompted to specify which drive you
want to clean.
2. Disk Cleanup will now calculate how
much space you will be able to free on
your selected drive. This may take a few
minutes to complete.

3. Upon its completion, a new window as shown in the screenshot


below will be opened up. It shows you the total amount of disk
space you can free by using Disk Cleanup. Scroll through the
content in the Files to delete list, check the check boxes for
files that you want to delete, and then click ok.
4. For more options, such as cleaning up System Restore and
Shadow copy files, under Description, click Clean up
system files as shown in the screenshot above, specify the
drive you want to clean, wait for the calculation to be done
again, then click the More Options tab.

5. To uninstall programs and features that are


no longer in use, click Clean up under
the Programs and
Features section.
To remove shadow copy files and system
restore points, click Clean up under
the System Restore and Shadow
Copies section.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
6. Congratulation, you’re done! You’ve just bathed your computer
and it is as clean as you wish now!
II. REMOVING VIRUSES FROM INFECTED MACHINES

Computer Virus

 A virus is a destructive executable program that infects


the other programs in the system and spreads by
replicating itself.
 Such a program is designed to damage the victim’s
computer files.
 Viruses are coded by malicious programmers in a way
that they can spread in the system without one's permission and
knowledge.

TERMINOLOGY

Virus

A virus is a piece of computer code that attaches itself to a program or


file so it can spread from computer to computer, infecting as it travels.
Viruses can damage your software, your hardware, and your files.

Worm

A worm generally spreads without user action and distributes


complete copies (possibly modified) of itself across networks. A worm
can consume memory or network bandwidth, thus causing a
computer to stop responding.

Spyware

Spyware is any technology that aids in gathering information about a


person or organization without their knowledge. It can overload your
system and shutdown other services.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Trojan Horse

A Trojan Horse is a computer program that appears to be useful


software, but instead compromises your security and causes a lot of
damage.

Malware

Short for malicious software. Malware is software designed


specifically to damage or disrupt a system, such as a virus or a
Trojan horse.

Different Aspects of Computer Virus


Finder- searches for the new uninfected files and the

Replicator- actually targets these files and infects it by multiplying itself.

How do Virus Affects a System?

 It corrupts files
 It slows down the speed of the computer system
 It causes the system to hang frequently
 It deletes various files

Sources of Virus Infection


A virus can enter the system and infect it through various sources. Some of
the sources are

 Infected CDs, DVDs, pen drives, etc


 E-mail
 Browsing infected sites
 Downloading files from the internet

Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if the
computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device
driver). These programs are loaded in memory during execution, taking the
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
virus with them. The virus becomes active in memory, making copies of
itself and infecting files on disk.

Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect


program files and when the infected program is executed, these viruses
infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection.


They may either redirect the disk head to read another sector instead of the
one in which they reside or they may alter the reading of the infected file’s
size shown in the directory listing. size given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so
that it appears differently in each infection. These viruses are more difficult
to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software

Is a software designed to cure virus infected machines. An antivirus is a


program that searches for, identifies and removes potential viruses existing
in the computer system

Examples of Anti-virus software

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
STEPS TO REMOVE VIRUSES
Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.

The basic steps are:

 Buy or download an antivirus


software
 Install the antivirus software
 Update antivirus software with
the latest virus definitions
 Do a complete system scan

METHODS OF ELIMINATING VIRUSES

 Removing the virus – When the virus can be easily identified and can
be removed without affecting other files, then the antivirus removes it
from the host place.

 Quarantine – This is done when the virus cannot be easily identified


removed from the file and the removal of virus means the removal of
the complete file. In this method, although the virus is not eliminated,
it is rendered inactive by moving the file into "quarantine" and
renaming it.

How and Why to Clear Your Cache


Often referred to as the cache, the Temporary Internet Files
folder contains a kind of travel record of the items you have seen,
heard, or downloaded from the Web, including images, sounds, Web
pages, even cookies. Typically these items are stored in the Temporary
Internet Files folder.
Storing these files in your cache can make browsing the Web
faster because it usually takes your computer less time to display a
Web page when it can call up some of the page's elements or even the
entire page from your local Temporary Internet Files folder.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Clearing Your Browser's Cache
All those files stored in your cache take up space, so from time
to time, you may want to clear out the files stored in your cache to
free up some space on your computer. This is called clearing the
cache.
To clear your cache:
1. On the Internet Explorer Tools menu, click Internet Options.
The Internet Options box should open to the General tab.

2. On the General tab, in the Temporary Internet Files section,


click the Delete Files button. This will delete all the files that
are currently stored in your cache.

Tip: You can adjust your Internet


Explorer settings to automatically
clear the cache whenever you close
Internet Explorer. Go to the Tools menu,
and click Internet Options.
Click the Advanced tab.

In the "Settings" box, scroll


down to the section labeled "Security,"
and click to check the box next to the
"Empty Temporary Internet Files folder
when browser is closed" option.
Click OK to finish.

This option does not delete cookies,


but it will clear your cache of other
files when you close your browser.
3. Click OK, and then click OK again.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Anti-Spyware Programs
Spyware is typically placed on your system by visiting websites and
installing software.
Typical signs that you have spyware
• You have a lot of popup windows when visiting the web or just
logging on to your system.
• Your homepage has changed to a different site.
• You notice a major drop in system performance.
• Your anti-spyware or antivirus utility stops working.
• You go to search for things and your search page has changed.
• New items appear in your favorites.
• In many cases there are no signs and it is running silently
recording your actions.
Protect Yourself from Spyware
• Use a popup blocker like Google Toolbar, or the one that
comes with Firefox and Internet Explorer.
• Install Anti-Spyware utilities.
• Some that we recommend are Ad-aware, Spybot - Search and
Destroy, and CWShredder.
Install Windows updates if there are any
Microsoft regularly issues updates (patches) to fix bugs and plug security
holes in Windows. The 'security holes' are used by worms, viruses and
hackers to compromise your system. It is vital to keep Windows up-to-date
with patches.
How long will it take and how often do I do it?
The first time you do the procedure, it may take a 'long time'. Do
not be put off - this is IMPORTANT. Once you have updated
your copy of Windows you MUST repeat the update procedure at
least once per month. The 'monthly' updates will be quick and
easy.
Updating Windows
To update Windows over the Internet either:
1. Click on the Windows Update bubble (or small icon).
2. Follow instructions below for more instructions...

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
a. Ensure that you an 'administrator' on your PC (Win
NT4/2000/XP)- most users should be administrators on
their own PCs.
b. Run Internet Explorer.
c. Click on the 'Tools' menu, then the 'Windows Update'
option*.
d. You will see 'Microsoft checking your system' screen.
e. If you are asked to download a module - click 'Yes'
button.
f. If you are asked, click 'Install Now' button.
g. Click on 'Express Install' option.
h. You will probably be prompted to reboot your system.
When rebooted – restart 'Windows Update'.
i. Click on the 'Express Install' Option.
j. Keep clicking on the 'Install' button until there are no
more patches to install.
k. Reboot your system if asked to do so.
To configure a schedule for Automatic Updates:
1. Click Start, click Control Panel, and then double-
click System.
2. On the Automatic Updates tab, click either
Automatic download the updates, and install
them on the schedule that I specify or Download
updates for me, but let me choose when to
install them.
3. Click to select the day and time that you want to
download and install updates when you know your
computer will be up. If you select the 2nd option,
you will see a globe or a shield appear in your task
bar and you should click on it when it shows up.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.2-4
BACK-UP FILES

As our world becomes more digitized, the files we store on our computers
are becoming increasingly more important. Instead of keeping handwritten
letters in a shoebox, we correspond with family members using e-mail. If we
use digital cameras, we often keep our photo albums on our computers.

Unfortunately, computers (and particularly the hard disk drives that hold
your files) can fail. Your computer might run for a decade with no problems,
or it could fail tomorrow—there's no way to tell. To make sure you don't lose
important files if your computer stops working, you should back up your
computer on a regular basis. The backup process copies your files to a safe
place so that even if your computer fails, you won't lose them.

Choose backup storage


You should back up your files to an external hard disk drive or removable
disk drive, such as a CD. If your computer does fail, you can then connect
the external hard disk drive or use the CDs to restore your files to your new
or repaired computer.

If you decide to get an external hard disk drive, choose one that is at least as
large as the hard disk drive inside your computer. For example, if your
computer has a 100-gigabyte (GB) hard disk drive, choose a 100-GB or
larger external hard disk drive. Then connect the external hard disk drive to
your computer. Make a note of the drive letter (such as E:, F:, or G:)
assigned to your new hard disk drive.

Manually back up your files


To back up your files to an external hard disk drive

1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools
menu, you can install it.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

4. On the What to Back Up page, click All information on this computer,


and then click Next.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
5. On the Backup Type, Destination, and Name page, click Choose a
place to save your backup, and select your external hard disk drive.
Then click Next.

6. On the Completing the Backup or Restore Wizard page, click Finish.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
7. Windows Backup saves a copy of your files to your external hard disk
drive. When the backup is complete, click Close.

If your computer stops responding, you will be able to restore your files to
the state they were in when you completed the backup. However, any new
files you have created and any changes you have made to existing files since
the backup occurred will not be saved unless you back up your files again.
For best results, back up your files every week or immediately after creating
important files, such as after you copy pictures from your digital camera.

Schedule backups
If you're busy, you might not have time to manually back up your files every
week. Fortunately, you can schedule backups to occur automatically. This
takes a few minutes to set up, but once you've done so, you'll be protected
indefinitely.

To schedule a weekly backup

1. Click Start, point to Accessories, point to System Tools, and then


click Backup. If the Backup option does not appear on the System
Tools menu, you can install it.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

4. On the What to Back Up page, click All information on this


computer, and then click Next.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
5. On the Backup Type, Destination, and Name page, click Choose a
place to save your backup, and select your external hard disk drive.
Then click Next.

6. On the Completing the Backup or Restore Wizard page, click


Advanced.

7. On the Type of Backup page, click Next.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
8. On the How to Back Up page, click Next.

9. On the Backup Options page, select Replace the existing backups.


Then click Next.

10. On the When to Back Up page, click Later. In the Job name box, type
Backup. Then click Set Schedule.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
11. On the Schedule tab in the Schedule Job dialog box, click the
Schedule Task list, and then click Weekly.

12. In the Start time box, specify a time of day when your computer will
not be used for several hours, such as 3:00 AM. In the Schedule Task
Weekly area, select the day of the week you want to back up your files.
If you are backing up files overnight, remember to leave your computer
running the night before.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
13. Click the Settings tab. Select the Wake the computer to run this task
check box.

14. Click OK.

15. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
16. On the When to Back Up page, click Next.

17. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.

18. In the Account Information Warning dialog box, click OK.

19. On the Completing the Backup or Restore Wizard page, click Finish.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Your computer will automatically back up your files to your external hard
disk drive every week at the time you specified.

How to change an installed program


Note You cannot use this feature to modify all programs.

You can use this feature to change the installation of Windows Installer-
based programs such as Microsoft Office XP. Windows Installer-based
programs include a Maintenance Mode option. With this option, you can add
or remove features, change the installation state of the program or of
individual components, or repair and restore the installation.

To change a program, follow these steps:

1. Click Start, click Control Panel, and then double-click Add or


Remove Programs.
2. In the Currently installed programs box, click the program that you
want to remove, and then click Change or Change/Remove.
3. Follow the instructions that appear on the screen to make the changes
that you want.

How to remove an installed program


To remove a program that is installed on your computer, follow these steps:

1. Click Start, click Control Panel, and then double-click Add or


Remove Programs.
2. In the Currently installed programs box, click the program that you
want to remove, and then click Remove.
3. If you are prompted to confirm the removal of the program, click Yes.

Troubleshooting

 Make sure that the program that you click in the Add or Remove
Programs tool is the program that you want to remove from your
computer. Some programs may not prompt you to confirm the removal
before the program is removed from the computer.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 You can only remove a program with the Add or Remove Programs tool
if the program is written for Windows. If you do not see the program
that you want to remove in the Currently installed programs box,
view the program documentation for instructions about how to remove
it.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
LEARNING OUTCOME NO. 3
Diagnose Faults of Computer Systems and Networks
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with
standard procedures.
2. Faults or problems in the computer systems and networks are
diagnosed according to requirements and in line with the standard
procedures.
3. Contingency measures are managed and implemented in
accordance with established procedures
4. Unplanned events or conditions are responded to in accordance
with established procedures.
Contents:

1. Diagnostic procedures
2. Identifying and isolating faults/problems
- Diagnostic software utilities
- Gathering of information
3. Accomplished forms
- Diagnostic reports
- Proposal reports

Conditions

The students/trainees must be provided with the following:


1. PC and network specification
2. PC specification
3. Scheduled/periodic maintenance checklist
4. Personal protective equipment
5. Materials
6. Diagnostics software and CD-ROMs
7. Tools and test equipment’s
8. Spare parts

Assessment Method:

1. Hands-on
2. Direct observation
3. Practical demonstration

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.3-1

MAINTAIN NETWORK SYSTEM

LEARNING OBJECTIVE:
After reading this INFORMATION SHEET, YOU MUST be able to Maintain
Network System
Computer maintenance is an important part of keeping any business
running smoothly. An ounce of prevention is worth a pound of cure. Below
is a basic recommended schedule for preventing costly computer problems
on workstations.

SCHEDULE FOR WORKSTATIONS:

FREQUENCY MAINTENANCE ACTION


Weekly Update virus definitions - There have been an average
of about 19 new viruses per day on Windows systems
since 1995.

Run and install Windows Updates - This will fix security


flaws in Windows, reduce crashing and can solve
compatibility issues. You do not need to install all of the
"Recommended Updates" but you should install ALL
"Critical Updates"
Bi-Weekly Run Scandisk (Standard Scan) - Fixes some kinds of
incorrect file information and provides early detection of
potential hard drive crash.
Quarterly Run Disk Defragmenter - This will increase the
efficiency and decrease the wear on the hard drive.
Run Scandisk (Thorough Scan) - This thoroughly scans
the hard drive for bad physical sectors and will provide
early detection of potential hard drive crash.
Yearly Disk Cleanup - This frees up space on your hard drive by
displaying and, if you desire, removing unnecessary or
unused programs, temporary files and Internet cache
files. Located in Accessories/System Tools on Windows.

Check Fans and System Temperature (hard drive and


CPU) - This can usually be done in the system BIOS at

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
startup and varies from PC to PC. Insurance of proper
operation of this hardware can help prevent hardware
freezes and costly hardware repair.

Upgrades - There are usually upgrades for drivers and


firmware released annually. Installation of these will
usually make your system more compatible and reliable
and can get rid of a huge assortment of problems. Check
with the hardware manufacturer for upgrades for each
device.

SCHEDULE FOR SERVERS: For servers, perform these activities in


addition to the above activities.

FREQUENCY MAINTENANCE ACTION


Bi-Weekly Check Backup Logs - This is a
common problem. Businesses think
that their data is being backed up
when it is not. Checking the log will
ensure that the backup was made.

How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk Clean Up

2. Select Drive to Clean Up and click ―OK‖

3. Place Check Marks in Items to be removed Click ―OK‖

(If your not sure what you are deleting select the category and then Click
―View Files‖)
--------------------------------------------------------------------------------

How to Clear Internet “History”


1. Start Menu>>Settings>>Control Panel>>Double Click Internet Options
2. Click ―Clear History‖
3. Click ―OK‖
--------------------------------------------------------------------------------

How to Clear “Temporary Internet” Files


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options
2. Click ―Delete Files‖
3. Put check mark in ―Delete all Offline Content‖
4. Click ―OK‖

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
5. Click ―OK‖ again
--------------------------------------------------------------------------------
How to Run Scan disk and Disk Defragmenter without interruption:
Start Menu>>Run >>In Run Type ―MSCONFIG‖ then click ―OK‖
MSCONFIG will appear
Select ―Selective Startup‖ then Uncheck
―Load Startup Group Items‖
Click ―OK‖
Click Yes to Restart Computer
Upon Restart

Start Menu>>Settings>>Control Panel>>Dbl Click Display


Select the ―Screen Saver‖ Tab
Change the Screen Saver Drop Menu to ―NONE‖
Click OK

Then Perform Scan Disk:

Start Menu>>Programs>>Accessories>>System Tools>>Scan Disk

After Scan Disk Perform Disk Defragmenter

Start Menu>>Programs>>Accessories>>System Tools>>Disk Defragmenter


Select which disk to Defragment then click ―OK‖

After Disk Defragmenter

Start Menu>>Run >>In Run Type ―MSCONFIG‖ then click ―OK‖


MSCONFIG will appear>>select ―Normal Start Up‖ and Click ―OK‖
Click Yes to Restart Computer
Upon Restart

4. Start Menu>>Settings>>Control Panel>>Dbl Click Display

5. Select the ―Screen Saver‖ Tab>>Change the Screen Saver Drop Menu to
your preferred screen saver

6. Click OK

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
SCHEDULED MAINTENANCE TASKS FOR XP MACHINES

Daily (or weekly) : Double click ―Cleanup.exe‖ icon on desktop then click
the cleanup tab – this clears out all temporary
internet files % cookies (when finished – no need to
Log Off)

Daily (or weekly) : Double click ATF Cleaner – Click Run select all and then
Empty Selected

Weekly : Start / Run command (type in) %temp% delete all files found

Ensure your Antivirus is updated (if AVG i.e. In Colour) daily or at least once a
week (If necessary – normally automatic) (AVG and AVS/Superantispyware
should both update themselves automatically every day)

System/Registry Backup/(Restore) Click Start – Help and Support – Click


Undo changes to your computer with system restore – Click in Create
Restore Points.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
LEARNING OUTCOME NO. 4
Rectify/Correct Defects in Computer Systems and Networks
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with
standard procedures.
2. Defective components or parts are replaced or corrected without
damage to the surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance
with established procedures.

Contents:

1.
Defects in computer systems and networks
2.
Troubleshooting and repair techniques
3.
Problem solving in emergency situation
4.
Corrective action
- Hardware Configuration
- Software configuration
Conditions

The students/trainees must be provided with the following:


1. PC and network specification
2. PC specification
3. Scheduled/periodic maintenance checklist
4. Personal protective equipment
5. Materials
6. Diagnostics software and CD-ROMs
7. Tools and test equipment’s
8. Spare parts

Assessment Method:

1. Hands-on
2. Direct observation
3. Practical demonstration
4. Oral and written exam

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
LEARNING OUTCOME NO. 5
Inspect and Test the Computer Systems and Networks
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing
conducted on the device conforms with the manufacturer’s
instruction/manual
2. Computer systems and networks are checked/tested to ensure safe
operation.
3. OHS standards and 5S principles are followed according to
enterprise policies
4. Work site is cleaned and cleared of all debris and left in safe
condition in accordance with company procedures
5. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
6. Report is prepared and completed according to company
requirements.

Contents:

1. Testing methods and procedures


2. Documentation and making reports
3. Waste management
4. OHS standards and 5S principles
5. Practicing 3Rs – reduce, re-use, recycle/recover
6. 3Rs environmental policies
7. Managing waste from electrical and electronic equipment (WEEE)

Conditions

The students/trainees must be provided with the following:


1. Multi-meter
2. Calibrators
3. Signal generator
4. Appropriate software

Assessment Method:

7. Hands-on
8. Direct observation
9. Practical demonstration
10. Oral and written exam

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Information Sheet 4.5-1

INSPECT AND TEST CONFIGURED/REPAIRED COMPUTER


SYSTEM AND NETWORKS

Checking the Maintained Computer Systems:

The effectiveness of checking maintained computers depends on the


quality of inspection. A quality inspection of computer systems must include
the following:

 Powering On the Computer


 Testing all the computers’ devices
 Check if all the devices are working properly
 Monitor
 Keyboard
 Mouse
 Checking the computers’ performance
 Check if the computer is performing at its best
 Inspecting the cables attached on the computer
 Check if the Cables are fixed properly
 Power Cables
 LAN Cables
 PS2 Cables
 USB Cables
 Monitor Cables

Reasons for Running Computer to Computer Communications:

The effectiveness of running computers to computer communications


is to make sure that the computers in a network is connected properly for
effective and easier sharing files and information. A quality inspection of
computer communications must include the following:

 Pinging - The ping command is the basic tool for testing


TCP/IP connectivity. It sends a special packet (called
ICMP Echo) to a particular IP address and looks for a
reply.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
 Determining TCP/IP Settings - TCP/IP settings that are
used in network settings are:

 IP Address – Unique address assigned to a network


adapter. A computer with multiple network
adapters has an IP address for each one, and each
one must be in a different subnet.

 Subnet Mask – Used in conjunction with the IP


address to determine which subnet an adapter
belongs to.

 Default Gateway - IP address of a computer or


router, on one of this computer’s local area
networks, that knows how to communicate with
subnets not present on this computer.

 DHCP Server – If an adapter is configured to obtain


an IP address automatically, this is the address of
the server that provides it.


DNS Servers – IP address of one or more Domain
Name Server computers.
Burn In - To run a system or device for a period of time to ensure that
all components are working properly.
- The intention is to detect those particular components that
would fail as a result of the initial, high-failure rate portion
of the bathtub curve of component reliability. If the burn-in
period is made sufficiently long (and, perhaps, artificially
stressful), the system can then be trusted to be mostly free
of further early failures once the burn-in process is
complete.
Bathtub Curve - An equipment failure-rate curve with an initial
sharply declining failure rate, followed by a prolonged
constant-average failure rate, after which the failure rate
again increases sharply.
REPORT - Is a piece of information describing, or an account of
certain events given or presented to someone.
Importance of Making a Report - It enables you to practice your
skills of presentation, argument, evaluation, and
calculation, and provides a permanent record of your
work.

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Inspection Checklist Template

INSPECTION CHECKLIST
Equipment Type : Desktop Computer
Property Code : P.C. #1
Number : P.C.#1
Location : Practical Work Area
YES NO N/A INSPECTION ITEMS
1. Is the machine operate normally?
2. Are accessories checks for damage?
3. Are all device driver installed and
configured properly?
4. Are the display properties configured
correctly?
5. Is the sound functioning?
6. Is the pc connected to the server?
7. Is the printer installed shared?
8. Is IP address configured correctly?
9. Is their internet connection?
10. Is desired workgroup followed
11. Is internal parts cleaned?
12. Is external parts cleaned?
13. Is check disk performed
14. Is unwanted programs removed
15. Is necessary files back-upped
16. Is anti-virus program updated and run
17. Is disk defragment performed

Date Developed: Document No.


CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.

You might also like