You are on page 1of 10

Grade

10

TLE-INFORMATION AND
COMMUNICATIONS TECHNOLOGY

COMPUTER SYSTEMS
SERVICING:
MAINTENANCE AND REPAIR
QUARTER 4 – MODULE 4
WEEK 7
MELC/ LO5 Preparing for Maintenance and Repair

Prepared by:
JEFFREY O. TORRALBA
Teacher III
Don Ramon E. Costales Memorial NHS

0
What This Module is About
Good day learners! Welcome to this module in Information and Communications
Technology – Computer Systems Servicing Course ( ICT-CSS). In this module you will learn
skills on the different factors to consider in setting up computer network configurations.
At the end of this module you will be able to apply the knowledge and skills on setting
up computer network configuration.

The following are some reminders in using this module:

1. Use the module with care. Do not put unnecessary mark/s on any part of the module.
Use a separate sheet of paper in answering the exercises.
2. Read the instruction carefully before doing each task.
3. Observe honesty and integrity in doing the tasks and checking your answers.
4. Finish the task at hand before proceeding to the next.
5. Return this module to your teacher/facilitator once you are through with it.
If you encounter any difficulty in answering the tasks in this module, do not hesitate to
consult your teacher or facilitator. Always bear in mind that you are not alone.

We hope that through this material, you will experience meaningful learning and gain deep
understanding of the relevant competencies. You can do it!

Lesson PREPARING FOR


4 MAINTENANCE AND
REPAIR
This module will help you achieve the required competency in preparing for
maintenance and repair of computer and network systems. This will be the source of
information that will enable you to acquire the knowledge and skills in line with the job
requirements through different learning activities.

What I Need to Know

At the end of the lesson, the learners are expected to:


LO6 Preparing for Maintenance and Repair

1
What’s In

Network maintenance basically means you have to do what it takes in order to keep a
network up and running and it includes a number of tasks: Troubleshooting network problems.
Hardware and software installation/configuration. Monitoring and improving network
performance.

What’s New

Network maintenance basically means you have to do what it takes in order to keep a
network up and running and it includes a number of tasks:Troubleshooting network problems.
1. Hardware and software installation/configuration.
2. Monitoring and improving network performance.
3. Planning for future network growth.
4. Creating network documentation and keeping it up-to-date.
5. Ensuring compliance with company policies.
6. Ensuring compliance with legal regulations.
7. Securing the network against all kind of threats.

What is It

PREPARING FOR MAINTENANCE AND DIAGNOSES OF FAULTY COMPUTER


AND NETWORK SYSTEMS

Preventing Computer Systems Failure


The primary reason why computer can be used longer is because of some basic habits
that will prevent serious problems or might cause damages if not be avoided.
1. Computer issues
2. Dust issues
3. RAM issues
4. Malware issues
5. Hardware issues
6. Warning issues
7. Usage issues
8. Warranty issues
9. Backup issues
10. Error message issues

2
Network Problems
When you suddenly cannot connect to the internet, any of several things could be
wrong. Use this checklist to find and solve common internet connection problems.
1. Unplugged Network Cable
2. Website Temporarily Offline
3. IP Address Conflicts
4. Computer Firewall Malfunctions
5. Outside Wireless Signal Range
6. Wireless Network Configuration
7. Broadband Router or Access Point Malfunctions
9. Computer Glitches
10. Network Downtime

THE MATERIALS, TOOLS, EQUIPMENT AND TESTING DEVICES

Personal computers (Pcs) require continuous maintenance to ensure a great


experience. Cleaning unwanted data, updating the software, keeping the system safe from
harmful programs, and taking care of connected hardware might seem big chores. But all of
these can be easily done using some useful PC maintenance materials, tools, equipment and
testing devices.

Equipment/Facilities Equipment/Facilities Equipment/Facilities

Server Protective eye wear Floppy disk


Computer peripherals Wire stripper w/ cutter Compact disk
Desktop computers Pliers (assorted)
OHS guidelines Screw drivers (assorted)
Philippine Environmental Soldering iron/gun
protection standards De soldering tool
Monitors Flashlight
Motherboard Tweezers
Power supply Mirrors
Network device and cablings Antistatic wrist trap
Hubs LAN tester
Switches Crimping tool
LAN cards Software installer
Printers and scanners Work bench
Routers Magnifying glass
USB flash drives

TOOLS
There are many maintenance tools available that will automatically complete important
maintenance tasks for saving you from PC problems and ensuring that your PC always gives
optimum performance.
Examples:
1. PC cleaning tools 6. CPU and GPU temperature monitoring tools
2. Defragmentation tools 7. Disk space analysis tools
3. Automatic driver updaters 8. Hard drive health monitoring tools
4. Uninstaller apps 9. System information tools
5. Antivirus and malware 10. All-in-one utilities
removal program

3
COMPUTER AND NETWORK SYSTEMS SPECIFICATION

The specification or ‘spec’ is a list of the key components that make up the computer.

Understanding a Specification

Processors
Intel Inc. and AMD Inc. are the manufacturers of most of today’s PC processors and
both offer a range that balances price and performance. Random Access Memory (RAM) is
the main working memory which is used to run programs. RAM is measured in megabytes
(MB). A minimum of 2024 MB (2GB) of RAM is recommended for general purpose PCs. 2048
MB (2GB) of RAM is also sufficient for PCs running multimedia applications.

Storage – The Hard Drive


The hard drive is the computer’s primary storage area. It stores the applications and
programs that run on the PC, as well as any work created by users. A hard drive capacity of
at least 80GB is recommended for general purpose PCs. A hard drive capacity of 200GB or
more is recommended if working with multimedia applications where large graphics and digital
audio/video files are being created and stored.

Monitors
The older Cathode Ray Tube (CRT) had been largely replaced by Liquid Crystal
Display (LCD) and Light Emitting Diode (LED) flat-screens. A 15” LCD/LED has the same
viewing area as the older 17” CRT. Average entry-level PCs usually come with a 17” flat-
screen and this is adequate for most general purpose applications. Larger 19” flat-screens are
available and may be appropriate if video editing and advanced graphics work is being carried
out.

4
Optical Drives
CD R/W drives are standard on PCs and allow the information on a compact disc
(either data or audio) to be read and written to by the PC. It is defined by its speed (i.e. 48x or
48 speed). DVD drives can read both CDs and DVDs. Standard on entry level computers are
48x DVD-ROM/CD_RW drives and allows you to copy blank CDs. High performance computer
uses 52x DVD-RWs. Educational software is being developed in both DVD and CD formats,
but a DVD can hold over 25 times more data than a CD.

Graphics and Sound Cards


Responsible for determining the quality of the audio and visuals (graphics and video)
output by the computer. An integrated graphics card with 256MB of memory is recommended
for general purpose PCs. Computers running high-end applications generally require a
separate 256MB graphics card.

Speakers and Headphones


Most computers come with either built-in or external speakers. Cheap ‘headphone
splitters’ can also be purchased — these enable two sets of headphones to be used per
computer.

Network Interface Card (NIC)


A network card allows a computer to be connected to a network. A 10/100/1000 Mbps
(Megabits per second) card is the standard network card today.

Operating Systems (OS)


Microsoft’s Vista generally performs the same functions as Win XP. Linux is an open
source free operating system. The most widely used open source database is Ubuntu. It is a
Linux based operating system and is distributed free along with the source code. The common
applications include Mozilla Firefox web browser, Office application suite, and GIMP image
editor.
OpenSolaris is a computer operating system developed by Sun Microsystems. It runs
well on desktops, laptops, servers and data centers. OpenSolaris is GUI based like Ubuntu
and has rich graphical desktop and windows for easy navigation.

Networking Hardware Requirements

Materials Purpose
DSL or Cable Modem A DSL or cable modem connects your computer to a high-speed
DSL or cable Internet connection.
Wired or wireless A wired or wireless router connects your DSL or cable modem to
router your home network.
Wired or wireless A wired or wireless network adapter is the device in your
network adapters computer (or printers, gaming consoles, and other networking
equipment) that connects your computer to your network.
Ethernet cabling Ethernet cabling is used to connect your wired network adapters
to a router or network switch.

Router Basics

Your router is the glue that holds your home network together. It connects all your
computers to one another, either through Ethernet cables or a wireless connection.

5
Wireless Throughput

Throughput is the speed at which a router can transfer data. The most common
standards today are 802.11g and 802.11n (also known as "wireless G" and "wireless N",
respectively). Wireless N is faster than wireless G, though routers that support wireless N are
also more expensive. Most new devices like smartphones and laptops support the faster
wireless N.

Wired Throughput

The wired half of your router will come in one of two speeds: 10/100 Mbps and
10/100/1000 Mbps (also known as "gigabit"). 10/100 routers are cheaper, but will not transfer
data between computers as quickly as gigabit routers will.

Range

Wireless routers can only reach a limited area of distance. Your range, like your speed,
is determined by the wireless standard you use. Wireless N has a longer range than wireless
G, so if range is important, you will want to use wireless N.

Number of Ports

Routers have two types of ports in the back: LAN ports and WAN ports. Your WAN
port hooks up to your modem (which, again, is what connects to the internet), while the LAN
ports hook up to your computers and other clients. If you have more wired devices than can
fit on a router, you can plug them all in using a wired switch. A switch is like a power strip for
your router, it lets you plug in more devices than the router originally allowed.

Wireless Security

Always protect your wireless network with a password. WPA2 is currently the most
secured type of wireless encryption, so make sure you use WPA2 if you can. Some old
wireless devices do not support WPA, in which case you will have to use the less secured
WEP instead.

6
What I Have Learned

Directions: Fill in the blanks with the missing word/s to complete the paragraph that
summarizes our topic for today. Write your answer on your activity notebook.

I learned that you should consider the 1. ____________ and network problems in
preparing for maintenance and repair. PCs require continuous maintenance to ensure a great
experience. But all of this can be easily done using some useful PC maintenance 2.
_________, materials, equipment and 3. ____________. Check the 4. _______________ to
meet the computer and network system requirements for each component. Students will also
need to be aware of the type of 5. _________ that are possibly present in their work
environment.

Summative Assessment

I. Directions. Choose the letter of the best answer. Write your answer on a separate sheet of
paper.

1. It refers to a list of the key components that make up the computer.


a. brand b. checklist c. manufacturer d. specs
2. The main working memory in a computer is called ___________.
a. memory b. processor c. RAM d. ROM
3. These are the two leading companies when it comes to manufacturing processors.
a. Acer and Asus b. AMD and Intel c. Epson and Canon d. HP and Dell
4. It is a free open source operating system.
a. Chrome OS b. Linux c. Windows d. MAC
5. A glue that holds your home network together.
a. DSL b. Ethernet c. hub d. router

II. Directions: Match column A to column B. Write the letter of your answer on your
answer sheet.

Column A Column B
1. This is a computer failure which commonly shows signs A. computer issues
of regular poor performance, frequent errors and/or pop B. Linux
ups, frequent power loss, frequent crashes, or certain C. Network Interface Card
parts not working. D. router
E. unplugged computer
2. One of the most common reasons why you might cables
suddenly find yourself unable to connect to the internet. F. wireless network
3. It is a free open source operating system. configuration

4. This card allows a computer to be connected to a


network. A 10/100/1000 Mbps (Megabits per second) card
is the standard card specifications today.

5. A glue that holds your home network together.

7
III. Directions: Supply the missing word to make the statement complete. Write your
answer on your answer sheet.

Printer Network Flashdrive


Motherboard Software Router

1. The device that forwards data packets between computer networks, creating an overlay
internetwork is called __________.
2. This is a group of computers and associated devices that are connected.
3. ________ is portable storage device which is plug directly to the USB.
4. A _______ contains the CPU, BIOS, Memory, mass storage interfaces, serial and parallel
ports, expansion slot and all the controllers required to control standard peripheral devices
such as the display screen, keyboard and disk drive.
5. It is a piece of hardware that produces a paper copy (also known as hardcopy) of the
information generated by the computer through a ____________.

IV. Directions. Explain the following subjects comprehensively.


1. Why is Network Security a priority in Computer Network Maintenance?
2. Explain the flow of Computer signal through a Wired Router.

8
Answer Key
What I have Learned
1.Computer system failure
2.tools
3.testing devices
4.specifications
5. hazards
References:

Abrams, M. D., et al., "The NBS network measurement system," IEEE Trans. on Commun.
COM-25, (Oct 1977), 1189--1198.

Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”,
Fast Software Encryption, Cambridge Security Workshop Proceedings (December
1993), Springer-Verlag,
1994.

Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso and Frank Piessens,
“Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network
Discovery Mechanisms”, ACM Asia Conference on Computer and Communications
Security, May 2016.

Lixia Zhang, “A New Architecture for Packet Switching Network Protocols”, PhD Thesis,
Massachusetts Institute of Technology, 1989.

School Self-Learning Module Development Committee:


Chairman: Dr. Rowena Lea G. Moreno (School Principal IV)
Co-Chairman: Dr. Maribeth S. Tugare (Head Teacher III, TLE Dept.)
Content Researcher: Mr. Jeffrey O. Torralba (Teacher III)
Language Validator: Mr. Ulysses M. Bañaga (Teacher III)

You might also like