You are on page 1of 84

Lesson 1

Use of Hand Tools and Equipment in Computer Hardware Servicing

Do you have a wish that one day you will become a successful computer technician and run
your own computer business? Having knowledge and skills in the use of tools and equipment in
computer hardware servicing will help you a lot in achieving this dream of yours.

Get Ready
In computer hardware servicing, you use tools and materials. Knowing the various uses of these
tools and how to operate them are basic skills which should be learned before handling any job.
Aside from acquiring the basic knowledge and skills, one needs practice in using all of these tools
before he/she can operate it effectively with ease and confidence.
Tools used in computer hardware servicing include hardware tools, software tools, organization
tools, and miscellaneous tools.

HARDWARE TOOLS
There are four types of hardware tools used in computer hardware servicing, they are as follows:
A. Electro-static Discharge (ESD) tools
B. Hand tools
C. Cleaning tools
D. Diagnostic tools

A. Electro-static Discharge (ESD) Tools


1. Anti-static wrist wrap is used as safety gear to keep the user grounded and keep him
from harm and computer components from being damaged caused by the buildup of
static electricity or ESD. It is used like a bracelet. Right-handed
persons should wear the wrist strap on the left wrist and for
those left-handed to the right wrist. To use this safety gear,
just attach the other end of a wrist wrap with a clip to a non-
painted metal portion of the computer case.

345
2. Anti-static mat or ground mat is used by laying the mat on the
working table and clipping the cord to the computer case. This
way the mat will to absorb static electricity, which can cause
damage to computer components.

B. Hand Tools
Hand tools are needed to perform jobs like computer assembling and computer repair. It
can be used manually using a hand or electrically powered. Below are examples of hand tools
used in computer hardware servicing.
1. Needle-nose Pliers, also called long-nose pliers, are
used for gripping, bending, re-positioning and stripping
insulated wire. It is available with or without cutters. Its
uses is not only limited to wire work, because it can also
be used to hold small parts and can go to hard to reach places.
2. Wire Cutter is used to cut and strip insulated wires.
3. Screw Drivers are used to loosen or tighten screws during
cleaning and repair. This is made up of a head or tip, a
mechanism to apply torque by rotating the tip, and some
way to position and support the screwdriver. There are
five types of screwdrivers. These are Flathead, Phillips 1
and 2, 5 Star, and Torx.

Torx Screwdriver

4. Hex or Nut Driver is used to loosen or tighten nuts.

5. Crimper is used to crimp or attach connectors to wires.

6. Sharp-pointed Tweezers is used to hold or manipulate


small parts of computer.

346
7. Flashlight is a hand-held portable powered light source used as a
source of light during repair.

8. Wire Stripper is used to cut or strip insulation which is the protective


covering of electrical wires to expose the inner wire.

9. Part Retriever is used to hold very small parts that are quite difficult
to be held by the hand.

C. Cleaning Tools
Cleaning is essential in the maintenance and repair of computers.
It is, therefore, very important to familiarize oneself with the cleaning
tools available for use.
1. Soft Cloth is used to wipe dirt around the surface of computer.
Cotton cloth is preferred. Old rags, stiff cloth, and paper towels are not
recommended for use as it may scratch the surface of computer or laptop.
2. Compressed Air is used to remove dust and debris, especially on places that
are narrow or hard to reach.

3. Cable Ties is used to organize neatly cables inside and outside of a


computer.

4. Part Organizer is used to hold small parts like screw, jumpers, and
fasteners and to prevent them from being mixed with other parts or
from being lost.

D. Diagnostic Tools
Diagnostic tools are useful tools for diagnosing computer
problems. Below are examples of diagnostic tools.

1. Multi-tester or VOM (Volt-Ohm meter) is used to measure volts,


ohms, and milliamps. The data provided by this device can be used
to determine faulty devices and parts.

2. Loopback Adapter or loopback plug is used to test if


computer ports are functional or not.

347
3. Toner Probe is a two-part tool used to trace and locate cables.

4. External Hard Drive Enclosure is not a diagnostic tool but is used


by technician when diagnosing computer problems. It is made to
hold and power disk drives for inspection, diagnosis, and repair. It
can also be used to recover data from damaged computer’s hard
drive or used as backup to prevent data corruption during repair.

SOFTWARE TOOLS
Software tools or programming tools are considered as the intangible part of a computer
system. It is used to create, debug, maintain, or otherwise support other programs and applications.
These tools are as important as hardware tools in diagnosing computer problems. There are two
software tools used in computer hardware servicing the disk management tools and protection
software tools.

A. Disk Management Tools


1. FDISK is a short name for fixed disk which is a command-line tool that is used to create
and partition a brand new hard drive. It can also be used for repartitioning the hard drive
when you want to change something. Personal computers today, such as Windows XP,
Vista, or 7, no longer have FDISK on it. It is replaced with a more advanced tool called disk
part or logical disk manager.
2. Disk Management Tool is considered as the most powerful application in the computer
used to create, modify, and delete any storage volume connected to the computer.
Windows users call it “Disk Management,” while Mac users call it “Disk Utility.” The essential
functions of disk management tool includes: finding an attached disk and checking what
OS it requires, formatting, partitioning, re-purposing and setting-up new drives, and
checking the health of an attached disk and the file system.
3. Format is used to prepare a storage device usually a disk in storing information.
4. Scandisk and CHKDSK (check disk) is a software utility capable of checking and
resolving files and folders on a hard drive by scanning the file system. For MS-DOS and
Windows 9x based systems Scandisk is used while new technology (NT) based system,
such as Windows 2000, Windows XP, and Windows Vista, CHKDSK is used.
5. Defrag or “defragging” is used by putting pieces of data on a hard drive back together
to be able to optimize space and to allow faster access to programs and data. Time and
regular use are reasons why files and folders on hard drives break down or become
fragmented.
6. Disk Cleanup is a maintenance utility used in searching and removing unnecessary files
on hard drives that are no longer of any use.
7. System File Checker (SFC) is a utility tool used to scan and restore corrupted files.

B. Protection Software Tools is used to protect operating system and hardware for possible
damaged caused by malicious attacks. Protection software includes: Windows 7 action center,
anti-virus program, anti-spyware program, and Windows 7 firewall.

348
Organizational Tools
As a computer technician, it is always a challenge to look for ways on how you keep records and
journal on all the services and repairs you have done. The records can be used for future reference.
Part also of good customer service is to provide your customer with detailed list of problems and
repairs done.
Aside from keeping records, Internet is also a very good source of information in looking for
specific hardware problems and possible solutions.
Organizational tools include: personal reference tools such as notes, journal, and history repair
and internet reference tools such as Internet search engines, news groups, manufacturer FAQs, online
computer manuals, online forums and chat, and technical websites.

Miscellaneous Tools
As you go on with your journey towards being a computer technician you will discover
additional items to be added to your toolkit. Examples of these tools are miscellaneous tools that
include:
• Masking tape used for labeling parts during repair;
• Working computer which can be used for downloading, researching, and communicating
with other technicians;
• New computer parts for replacement of worn-out parts during repair; and
• Peripherals.

Request Appropriate Materials and Tools


A job order or work order form is a written contract stating work to be done according to
specified requirements, within specified time frame and cost estimates issued by a technician or a
company to the customer.
A requisition and a borrower slip on the other hand are official forms used by technician when
he/she needs something for use within the company. He/she needs to fill out a requisition form.
Another important uses of these forms are for monitoring and inventory of tools and materials.
Below is a sample of a job order slip, a requisition slip, and a borrower’s slip:

Job Order Slip


Department/Office: Job Order No.: Date:__________________
Time Started:____________
Time Finished:___________
Kind of Work(kindly check):
Carpentry Plumbing Electrical Mason Computer Repair Others

Complaints:

Action Taken:
Please Evaluate Our Service(kindly check):
Excellent Very Satisfactory Satisfactory
Poor
Comments:

349
Performed by:___________________________
Signature over Printed Name

Requested by:___________________________
Signature over printed Name

Approved by :___________________________
Signature over printed Name

Requisition and Issue Slip

Date: Delivered to:


Requisition No.:
Requested by: Department:
Approved by:
Stock No. Particulars Quantity Price Total

Borrower’s Slip

Name : Date Borrowed: Date Returned:


Department:
Approved by:
Issued by:
Name of Tools or Item Control Number
Equipment Remarks

350
Maintain Hand Tools, Equipment, and Peripherals
Tools, equipment and peripherals used in computer hardware servicing should be maintained
to make sure of its efficiency and for keeping its life long. Below are simple ways on how one can
achieve success in taking care of tools while working and storing.

Check Conditions of Tools and Equipment Before Use


• Inspect tools for defects before use. Replace or repair
defective tools.
• Ensure that the handle fits tightly into the head of
the tool.
• Operate electric tools within their design limitations.
• Use the right tool for the job.
• Operate tools according to the manufacturer’s
instructions.
• Ensure tools are in safe working order. Attach a
“do not use” tag to damaged tools, and notify your
immediate boss.
• Clean up practices on the tools and equipment must be maintained.
• Keep cutting tools sharp and cover the sharp edges with a suitable covering to protect
the tool and to prevent injuries from unintended contact.

Store Tools and Equipment

Hand Tools:
• Clean dirt and debris from tools after each use.
• Lightly sand rough wooden handles and apply linseed oil.
• Replace loose handles.
• Replace cracked or broken handles on files, hammers, or screwdrivers before storing.
• Protect surfaces of cutting tools in storage.
• Store hand tools in a clean, dry storage area
• Perform basic preventive maintenance

Power tools:
• Read and follow the maintenance schedule in the owner’s manual for each piece of power
equipment.

351
• All portable hand-held electrical tools and equipment should be grounded or double-
insulated
• Check electric cords and connections on electric-powered tools. Repair or replace
damaged wiring or frayed cords promptly.
• Store power tools in a clean, dry storage area when not in use.

Equipment:
• Store equipment in a clean dry storage area.
• Clean equipment after each use.

Practice Occupational Health and Safety Procedures


Being safe while working is a very important concern. Hand tools and equipment look like
harmless, but they may become the cause of many injuries. To prevent hazards associated with the
use of tools and equipment, one must observe the following general precautions:

• Read and follow the manufacturer’s instructions and warning labels.


• Know how to safely use hand tools and identify when they need repair.
• Ensure there is adequate lighting in the work area.
• Wear personal protective equipment (PPE), such as safety footwear, safety glasses, hand
protection, etc. that are appropriate for the hazards to which you may be exposed to
when doing the required task.
• Do not cut towards yourself when using a cutting tool.
• Use the right tool for the job. Do not substitute.
• Use good quality hand tools.
• Do not carry a sharp tool in your pocket.
• Before cleaning any device, turn it off and unplug the device from the power source.
• Technicians should roll up their sleeves, remove scarves or ties, and tuck in shirts to
prevent interference from clothing. Ensure that earrings, necklaces, and other loose
jewelry are properly secured.
• Cut hardened wire only with pliers designed for that purpose.
• Disconnect tools when not using them, before servicing and cleaning them, and when
changing accessories.
• Never use a screwdriver as a pry bar, chisel, punch, stirrer, or scraper.
• Never carry a tool by the cord or hose.
• Clean up and pick up after yourself as you go; good maintenance practices on the job site
must be maintained.

352
Remember These

1. Tools used in computer hardware servicing include hardware tools, software tools,
organization tools, and miscellaneous tools.
2. There are four types of hardware tools used in computer hardware servicing. They are:
Electro-static discharge (ESD) tools, hand tools, cleaning tools, and diagnostic tools.
3. There are two software tools used in computer hardware servicing the disk management
tools and protection software tools.
4. Organizational tools include: personal reference tools, such as notes, journal and history
repair, and Internet reference tools, such as Internet search engines, news groups,
manufacturer FAQs, online computer manuals, online forums and chat, and technical
websites.
5. Miscellaneous tools are additional items to be added to your toolkit which include:
masking tape used for labeling parts during repair; working computer, which can be used
for downloading, research, and communicate with other technicians; new computer
parts for replacement of worn-out parts during repair and computer peripherals.
6. A job order or work order form is a written contract stating work to be done according
to specified requirements, within specified time frame and cost estimates issued by a
technician or a company to the customer.
7. Requisition and a borrower slip are official forms used by technician or company either in
monitoring or inventory of tools borrowed and materials used during repair.
8. Tools, equipment, and paraphernalia used in computer hardware servicing should be
maintained to make sure of its efficiency and for keeping its life long.
9. To prevent hazards associated with the use of tools and equipment one must observe
safety precautions.

Check Your Understanding


A. Naming of Tools
Directions: In the space provided, name the tool and write its uses.

1. ____________________
____________________________________________________

2. ____________________
____________________________________________________
____________________________________________________

353
3. ______________________
____________________________________________________

4. ______________________
____________________________________________________

5. ______________________
____________________________________________________

6. ______________________
____________________________________________________

7. ______________________
____________________________________________________

8. ______________________
____________________________________________________

9. ______________________
____________________________________________________

10. ______________________
____________________________________________________

B. Explain:
1. How do you maintain the efficiency of each tool in computer hardware servicing?
2. Why is it important to know the functions of each tool in computer hardware servicing
and how they are handled properly?
3. How do requisition slip, job order slip, and borrower’s slip differ from each other?
4. Why is it important to check tools and their parts before and after using them?

354
5. Why is cleaning tools and equipment important before storing it?
6. Why is it necessary to observe precautionary measures while working?

Research To Do
1. Divide the class into small groups of four students or five students. Then plan on a role
play or dramatization showing the functions and uses of each tool. Allow the audience to
give their observations after the play.
2. Ask the students to make an album showing the common tools, equipment, and materials
used in computer hardware servicing.
3. Divide the class into small groups of four students or five students. Then plan on a role
play or dramatization showing how to accomplish the job order slip, borrower’s slip, and
requisition slip. Allow the audience to give their observations after the play.
4. Role-play practices in (a) checking, (b) storing, and (c) maintenance of tools and equipment.
Allow each group to write their own script highlighting how each process is carried out in
an actual setting. Create scenarios on actual checking, storing, and maintenance of tools
and equipment.

355
Lesson 2
Perform Mensuration and Calculation

This lesson emphasizes the importance of knowing the types of computer components to be
measured and knowing how to use the correct specifications as specified in the operating system of
the computer.

Read and Learn


Types of Components and Objects to be Measured
Clock Speed or Processor is responsible for the overall performance of the computer. The brain
of the computer is the central processing unit (CPU); also known as the processor. Everyone likes
fast processor because they offer better performance. A computer’s processor speed describes the
maximum number of calculations per second the processor can perform, and is given in megahertz
(MHz) or gigahertz (GHz). It is said that the larger the number, the faster and more powerful the
processor is.
• 1 Megahertz (MHz) is 1,000,000 (1 million) Hertz
• 1 Gigahertz (GHz) is 1,000,000,000 (1 billion) Hertz
A modern CPU typically has a speed of 2.8 GHz. This means that it can perform almost 3 billion
actions every second.
If you want to know your computer’s processor speed (Windows users), here are the steps to
follow:
1. Open System by clicking the Start button, clicking Control Panel, clicking System and
Maintenance, and then clicking System.
2. Under System, you can view the processor type and speed, as well as the number of
processors installed, if your computer uses multiple processors.

For Mac users, here are the steps to follow:


1. Click on the Apple menu and select “About This Mac.” Your CPU information will be
displayed there.

356
2. Hit the Command+Space bar to open the Spotlight search field.

3. Type in “Activity Monitor” and press the return key.

4. Look at the bottom of the “Activity Monitor” screen. Click on the tab that says “CPU.”
Information about the central processing unit will appear.

Memory is the shortened or other term for high-speed microchip-based data storage of
a computing device. A computer comes with a memory (referred to as main memory) known as
random-access memory or RAM which only stores the data temporarily, then comes its secondary
storage like magnetic hard disks and floppies, or optical storage like CDs and DVDs.

357
RAM is “volatile,” which means it will only retain data as long as your computer is on. On the
other hand, the micro-chip memories used in flash drives and removable card memories are non-
volatile, requiring no power source to retain data.
RAM is necessary to access and run programs. It comes in different types, like DDR3 (double
data rate, third generation) SDRAM, DDR2 (double data rate, second generation) SDRAM, and DDR
(double data rate, first generation) SDRAM. Many older systems use SD (single data rate) SDRAM, fast
page mode (FM), or extended data out (REDO).
ROM or Read-only Memory is used to store a small piece of software called “boot up” program.
It is non volatile meaning the data it contains will never be lost even if there is no power source.
The storage capacity of memory is measured in bytes. RAM has the capacity to hold millions of
bytes of data shown below:
• Megabytes (MB) or 1,000,000 (1 million) Bytes
• Gigabytes (GB) or 1,000,000,000 (1 billion) Bytes
This only means that, if a computer has 2GB of RAM, it can hold up to 2 billion bytes of data and
instructions at any time.
If you want to know your computer’s memory or RAM (Windows users only), here are the steps
to follow:
1. Open System by clicking the Start button, clicking Control Panel, clicking System and
Maintenance, and then clicking System.
2. Under System, you can view the processor type and speed, as well as the number of
processors installed, if your computer uses multiple processors.

Data Storage Capacity


Storing data means saving it in a place where it can be retrieved for later use. There are a lot of
storage devices you can use for storing data. Below is a table showing the storage capacity of each
storage device.

Storage vice
De Data apacity
C

Always remember that:


A byte is 8 bits…
… enough to hold one character.
A kilobyte (KB) is 1024 bytes…
…enough to hold about one page of text.

358
A megabyte (MB) is 1024 kilobytes, or 1,048,576 bytes…
… about enough to hold a digital picture.

Here is how to compute if you want to determine the bytes being used for in a file or folder:
1. How many bytes are there if a file is 60 KB in size?
1 KB = 1,024 bytes
60* 1,024 = 61,440

2. If a 60 KB file is stored in a 1 MB folder how many files of the same size can be stored in
that folder?
1MB = 1,048,576 bytes
1,048,576/ 61,440 = 17 files
You can use the succeeding tables below as reference for conversion.

A thousand bytes is called a kilobyte (KB)


1,000B = 1KB
A million bytes is called a megabyte (MB)
1,000,000B = 1MB
A thousand million bytes is called a gigabyte (GB)
1,000,000,000B = 1GB
A million bytes is called a terabyte
1,000,000,000,000B = 1TB

bit bit 0 or 1
byte B 8 bits
kibibit Kibit 1024 bits
kilobit kbit 1000 bits
kibibyte (binary) KiB 1024 bytes
kilobyte (decimal) kB 1000 bytes
megabit Mbit 1000 kilobits
mebibyte (binary) MiB 1024 kibibytes
megabyte (decimal) MB 1000 kilobytes
gigabit Gbit 1000 megabits
gibibyte (binary) GiB 1024 mebibytes
gigabyte (decimal) GB 1000 megabytes
terabit Tbit 1000 gigabits
tebibyte (binary) TiB 1024 gibibytes
terabyte (decimal) TB 1000 gigabytes
petabit Pbit 1000 terabits

359
pebibyte (binary) PiB 1024 tebibytes
petabyte (decimal) PB 1000 terabytes
exabit Ebit 1000 petabits
exbibyte (binary) EiB 1024 pebibytes
exabyte (decimal) EB 1000 petabytes

File Storage Capacity by Bits and Bytes

bit byte Kilobyte Megabyte Gigabyte

bit 1 8 8,192 8,388,608 8,589,934,592

byte 8 1 1,024 1,048,576 1,073,741,824

Kilobyte 8,192 1,024 1 1,024 1,048,576

Megabyte 8,388,608 1,048,576 1,024 1 1,024

Gigabyte 8,589,934,592 1,073,741,824 1,048,576 1,024 1

Terabyte 8,796,093,022,208 1,099,511,627,776 1,073,741,824 1,048,576 1,024

Petabyte 9,007,199,254,740,992 1,125,899,906,842,624 1,099,511,627,776 1,073,741,824 1,048,576

Exabyte 9,223,372,036,854,775,808 1,152,921,504,606,846,976 1,125,899,906,842,624 1,099,511,627,776 1,073,741,824

Zettabyte 9,444,732,965,739,290,427,392 1,180,591,620,717,411,303,424 1,152,921,504,606,846,976 1,125,899,906,842,624 1,099,511,627,776

Storage Devices includes: Magnetic storage devices, optical storage devices, and solid-state storage
devices.
A. Magnetic Storage Devices uses tiny magnetized dots to store data.
• Hard drive can be used to store large amount of information up to 1TB.

• Portable hard drive is used to store large amounts of data that can be transported from
one computer to another.

• Floppy Disc is a low capacity removable portable storage medium that can store data up
to 1.44 MB.

360
B. Optical Storage Devices uses patterns of dots that can be read using a light source called a
laser beam to store data. Below are examples of optical storage devices:
• CD-ROM (Compact Disc Read-only Memory) can store up 800MB of data and is used to
hold data that cannot be deleted like software applications or games, music, and e-books.

• DVD-ROM (Digital Versatile Disc Read-only Memory) can store up to 4.7 GB of data and
is used same with CD-ROM but is more popularly used in storing high-quality video
because of its high capacity in storing data.

• BLU-RAY – this is made as replacement for DVDs, which can hold data 25 to 50GB. A dual
layer can hold twice as the single layer.
• HD-DVD (High-density DVD) – this has the capacity to hold data up to 15GB while a dual
layer can hold twice.
• CD-R (CD-Recordable) and DVD-R (DVD-Recordable) – data can be written (burnt) into
the CD-R or DVD-R using a special disc drive called a burner. You can add more data into
the CD-R but you cannot erase these data.
• CD-RW and DVD-RW – one can burn or erase data using this disc, so the disc is reusable.
C. Solid-state Storage Devices uses electronic circuit with no moving parts on it to store data. In
storing data solid-state storage devices uses a special type of memory called flash memory.
• USB Memory Stick or thumb-drives can hold up 16GB of data.

• Memory Cards are used in almost all digital


devices like cameras, mobile phones, mp3 players,
etc. for data storage. SD card is used in storing
images for cameras while SIM card is used to store
phone’s number and text messages.

361
Computer Number System
Computer has a unique language that represents data using a binary numeral system. All
information like text, numbers, pictures, audio, etc. can be converted into a computer language
called bits or binary digits, which can either be at two states, 0 or 1. Bit is the basic unit of data the
computer recognizes. Bits are being grouped together to a byte. A byte is equal to 8 bits.

Binary Number System and Decimal Number System


Decimal is base 10 and has 10 digits: 0,1,2,3,4,5,6,7,8,9; while Binary is base 2 and has 2, so we
use only 2 symbols: 0, 1

Converting Binary to Decimal


1. What is 342?
342 is in base 10 and positional notation is:
3 x 10 = 3 x 100 = 300
+ 4 x 10 = 4 x 10 = 40
+ 2 x 10º = 2 x 1 = 2 = 342 in base 10

This number is in
base 10
The power indicates
the position of
the number

2. What is the decimal equivalent of the binary number 101100?


(To compute work left to right)
1 x 2 = 1 x 32 = 32
+ 0 x 2 = 0 x 16 = 0
+1x2=1x8=8
+1x2=1x4=4
+0x2=0x2=0
+0x2=0x1=0
= 44 (decimal) [to check, refer to table above]

Converting Decimal to Binary


To be able to convert a decimal number to binary number, divide the decimal by 2. Get the
quotient and the remainder. Bring down the quotient, divide it by 2, and get the quotient and
remainder again. Do it until such time that the quotient results to 0. To get the binary number write
all the remainder starting from bottom to top. See sample computation below.
1. What is the binary equivalent of the decimal number 103?
103 / 2 = 51, remainder 1 → rightmost bit
51 / 2 = 25, remainder 1

362
25 / 2 = 12, remainder 1
12 / 2 = 6, remainder 0
6 / 2 = 3, remainder 0
3 / 2 = 1, remainder 1
1 / 2 = 0, remainder 1→ leftmost bit
103dec = 1 1 0 0 1 1 1bin
note: dec=decimal, bin=binary
Here’s another way of converting decimal to binary using binary conversion.
Look at the table below. It shows that DECIMAL 44 is composed of one 32, one 8, and one 4.
The blanks are filled with zeros giving 101100 as the binary equivalent of decimal 44.

Binary Conversion 64 32 16 8 4 2 1

Decimal 44 1 0 1 1 0 0

Number of Binary Dig- Common Name


its (bits)
1 Bit
4 Nibble
8 Byte
16 Word
32 Double Word
64 Quad Word

Refer to the table below for conversion of binary, decimal, and hexadecimal.

BINARY DECIMAL HEXADECIMAL


(base 2) (base 10) (base 16)
0 0
1 1
10 2 2
11 3 3
100 4 4
101 5 5
110 6 6
111 7 7
1000 8 8
1001 9 9

363
1010 10 A
1011 11 B
1100 12 C
1101 13 D
1110 14 E
1111 15 F
10000 16 10

Remember These

1. A computer’s processor speed describes the maximum number of calculations per second
the processor can perform, and is given in megahertz (MHz) or gigahertz (GHz).
2. It is said that the larger the number, the faster and more powerful the processor is.
3. A computer comes with a memory referred to as main memory known as random-access
memory or RAM which only stores the data temporarily.
4. RAM is necessary to access and run programs.
5. Different types of RAM are DDR3 (double data rate, third generation) SDRAM, DDR2
(double data rate, second generation) SDRAM, and DDR (double data rate, first generation)
SDRAM.
6. ROM or Read-only Memory is used to store a small piece of software called “boot up”
program.
7. The storage capacity of memory is measured in bytes.
8. Storage devices include: Magnetic storage devices, optical storage devices, and solid-
state storage devices.
9. A magnetic storage device uses tiny magnetized dots to store data.
10. Optical storage devices uses patterns of dots that can be read using a light source called
a laser beam to store data.
11. Solid-state storage devices uses electronic circuit with no moving parts on it to store
data. In storing data solid-state storage devices uses a special type of memory called flash
memory.
12. Computer has a unique language that represents data using a binary numeral system.
13. Binary digits are at two states, 0 or 1.
14. Bit is the basic unit of data the computer recognizes.
15. A byte is equal to 8 bits.

364
Check Your Understanding
A. Matching Type.
Match column A with column B. Write the letter of your answer on the blank before each
number.
A B
_____ 1. 7 A. 1000B
_____ 2. 1kB B. Main memory
_____ 3. 1GB C. 111
_____ 4. Magnetic storage device D. terabyte
_____ 5. Byte E. Basic unit of data the computer recognizes
_____ 6. TB F. It uses tiny magnetized dots to store data
_____ 7. RAM G. Binary digit
_____ 8. Bits H. 1,000,000,000B
_____ 9. 1 or 0 J. 8 bits
_____ 10. 14 I. 1110 K. Binary system

B. Explain.
1. Why does everyone like to have fast processor?
2. What is a bit? A byte?
3. How are data being represented in a computer system?

Research To Do
1. Ask the students to make an album showing the common storage devices or media used
in computer.
2. Find out the following:
a. Name and memory storage capacity of personal computer or laptop you have at
home.
b. Capacity of storage devices or media you have at home.

365
Lesson 3
Prepare and Interpret Technical Drawing

Technical drawing, also known as drafting, is the act and discipline of composing plans that
visually communicate how something functions or has to be constructed. Drafting is the visual
language of industry and engineering.
People who communicate with technical drawings may use technical standards that define
practical symbols, perspectives, units of measurement, notation systems, visual styles, or layout
conventions. These enable a drafter to communicate more concisely by using a commonly understood
convention. Together, such conventions constitute a visual language, and help to ensure that the
drawing is easy to understand.

Read and Learn

Identify Basic Symbols Used in Technical Drawing


An electronic symbol is a pictogram used to represent various electrical and electronic devices
in a technical drawing.

Wires and connections


Component Circuit Symbol Function of Component
Wire To pass current very easily from one part of a circuit to
another.
Wires joined A ‘blob’ should be drawn where wires are connected
(joined), but it is sometimes omitted. Wires connected
at ‘crossroads’ should be staggered slightly to form two
T-junctions, as shown on the right.

Wires not joined In complex diagrams it is often necessary to draw wires


crossing even though they are not connected. The simple
crossing on the left is correct but may be misread as a join
where the ‘blob’ has been forgotten. The bridge symbol
on the right leaves no doubt.

Power Supplies
Component Circuit Symbol Function of Component
Cell Supplies electrical energy.
The larger terminal (on the left) is positive (+).
A single cell is often called a battery, but strictly, a battery
is two or more cells joined together.
Battery Supplies electrical energy. A battery is more than one cell.
The larger terminal (on the left) is positive (+).
Solar Cell Converts light to electrical energy.
The larger terminal (on the left) is positive (+).

366
DC supply Supplies electrical energy.
DC = Direct Current, always flowing in one direction.
AC supply Supplies electrical energy.
AC = Alternating Current, continually changing direction.
Fuse A safety device which will ‘blow’ (melt) if the current flow-
ing through it exceeds a specified value.
Transformer Two coils of wire linked by an iron core. Transformers are
used to step up (increase) and step down (decrease) AC
voltages. Energy is transferred between the coils by the
magnetic field in the core. There is no electrical connec-
tion between the coils.
Earth A connection to earth. For many electronic circuits this is
(Ground) the 0V (zero volts) of the power supply, but for main elec-
tricity and some radio circuits, it really means the earth. It
is also known as ground.

Output Devices: Lamps, Heater, Motor, etc.


Component Circuit Symbol Function of Component
Lamp (lighting) A transducer which converts electrical energy to light.
This symbol is used for a lamp providing illumination,
e.g., a car headlamp or torch bulb.
Lamp (indicator) A transducer which converts electrical energy to
light. This symbol is used for a lamp and serves as an
indicator, e.g., a warning light on a car dashboard.
Heater A transducer which converts electrical energy to heat.
Motor A transducer which converts electrical energy to
kinetic energy (motion).
Bell A transducer which converts electrical energy to
sound.
Buzzer A transducer which converts electrical energy to
sound.
Inductor A coil of wire which creates a magnetic field when
(Coil, Solenoid) current passes through it. It may have an iron
core inside the coil. It can be used as a transducer
converting electrical energy to mechanical energy by
pulling on something.

Switches
Component Circuit Symbol Function of Component
Push Switch A push switch allows current to flow only
(push-to-make) when the button is pressed. This is the
switch used to operate a doorbell.
Push-to-Break This type of push switch is normally closed
Switch (on); it is open (off ) only when the button is
pressed.

367
On-Off Switch SPST = Single Pole, Single Throw.
(SPST) An on-off switch allows current to flow only
when it is in the closed (on) position.
2-way Switch SPDT = Single Pole, Double Throw.
(SPDT) A two-way changeover switch directs the
flow of current to one of two routes accord-
ing to its position. Some SPDT switches
have a central off position and are de-
scribed as ‘on-off-on’.
Dual On-Off DPST = Double Pole, Single Throw.
Switch A dual on-off switch which is often used to
(DPST) switch mains electricity, because it can iso-
late both the live and neutral connections.
Reversing DPDT = Double Pole, Double Throw.
Switch This switch can be wired up as a reversing
(DPDT) switch for a motor. Some DPDT switches
have a central off position.
Relay An electrically operated switch, e.g., a 9V
battery circuit connected to the coil can
switch a 230V AC mains circuit.
NO = Normally Open, COM = Common,
NC = Normally Closed.

Resistors
Component Circuit Symbol Function of Component
Resistor A resistor restricts the flow of current, for ex-
ample to limit the current passing through
an LED. A resistor is used with a capacitor in
a timing circuit. Some publications use the
old resistor symbol:
Variable Resistor This type of variable resistor with two con-
(Rheostat) tacts (a rheostat) is usually used to control
current. Examples include: adjusting lamp
brightness, adjusting motor speed, and
adjusting the rate of flow of charge into a
capacitor in a timing circuit.
Variable Resistor This type of variable resistor with three con-
(Potentiometer) tacts (a potentiometer) is usually used to
control voltage. It can be used like this as a
transducer converting position (angle of the
control spindle) to an electrical signal.
Variable Resistor This type of variable resistor (a preset) is
(Preset) operated with a small screwdriver or similar
tool. It is designed to be set when the circuit
is made and then left without further ad-
justment. Presets are cheaper than normal
variable resistors so they are often used in
projects to reduce the cost.

368
Capacitors
Component Circuit Symbol Function of Component
Capacitor A capacitor stores electric charge. A
capacitor is used with a resistor in a
timing circuit. It can also be used as a
filter, to block DC signals but pass AC
signals.
Capacitor, polarized A capacitor stores electric charge. This
type must be connected the correct
way round. A capacitor is used with a
resistor in a timing circuit. It can also
be used as a filter, to block DC signals,
but pass AC signals.
Variable Capacitor A variable capacitor is used in a radio
tuner.
Trimmer Capacitor This type of variable capacitor (a trim-
mer) is operated with a small screw-
driver or similar tool. It is designed to
be set when the circuit is made and
then left without further adjustment.

Diodes
Component Circuit Symbol Function of Component

Diode A device which only allows current to


flow in one direction.

LED A transducer which converts electrical


Light Emitting Diode energy to light.

Zener Diode A special diode which is used to main-


tain a fixed voltage across its terminals.

Photodiode A light-sensitive diode.

Transistors
Component Circuit Symbol Function of Component

Transistor NPN A transistor amplifies current. It can be


used with other components to make
an amplifier or switching circuit.

Transistor PNP A transistor amplifies current. It can be


used with other components to make
an amplifier or switching circuit.

Phototransistor A light-sensitive transistor.

369
Audio and Radio Devices
Component Circuit Symbol Function of Component
Microphone A transducer which converts sound to electrical
energy.
Earphone A transducer which converts electrical energy to
sound.
Loudspeaker A transducer which converts electrical energy to
sound.
Piezo Transducer A transducer which converts electrical energy to
sound.
Amplifier An amplifier circuit with one input. Really it is a
(general symbol) block diagram symbol because it represents a
circuit rather than just one component.
Aerial A device which is designed to receive or transmit
(Antenna) radio signals. It is also known as an antenna.

Meters and Oscilloscope


Component Circuit Symbol Function of Component

Voltmeter A voltmeter is used to measure voltage.


The proper name for voltage is ‘potential differ-
ence,’ but most people prefer to say voltage.

Ammeter An ammeter is used to measure current.

Galvanometer A galvanometer is a very sensitive meter which


is used to measure tiny currents, usually 1mA or
less.

Ohmmeter An ohmmeter is used to measure resistance.


Most multimeters have an ohmmeter setting.

Oscilloscope An oscilloscope is used to display the shape of


electrical signals and it can be used to measure
their voltage and time period.

Sensors (input devices)


Component Circuit Symbol Function of Component
A transducer which converts brightness
LDR
(light) to resistance (an electrical property).
LDR = Light Dependent Resistor
A transducer which converts temperature
Thermistor
(heat) to resistance (an electrical property).

370
Logic Gates

Logic gates process signals which represent true (1, high, +Vs, on) or false (0, low, 0V, off ).
For more information, please see the Logic Gates page.
There are two sets of symbols: traditional and IEC (International Electrotechnical Commission).

Gate Traditional Symbol IEC Symbol Function of Gate


Type
NOT A NOT gate can only have one
input. The ‘o’ on the output means
‘not.’ The output of a NOT gate is
the inverse (opposite) of its input,
so the output is true when the
input is false. A NOT gate is also
called an inverter.
AND An AND gate can have two or more
inputs. The output of an AND gate
is true when all its inputs are true.
NAND A NAND gate can have two or more
inputs. The ‘o’ on the output means
‘not’ showing that it is a Not AND
gate. The output of a NAND gate is
true unless all its inputs are true.
OR An OR gate can have two or more
inputs. The output of an OR gate is
true when at least one of its inputs
is true.
NOR A NOR gate can have two or
more inputs. The ‘o’ on the out-
put means ‘not’ showing that it is
a Not OR gate. The output of a NOR
gate is true when none of its inputs
are true.
EX-OR An EX-OR gate can only have two
inputs. The output of an EX-OR gate
is true when its inputs are different
(one true, one false).
EX-NOR An EX-NOR gate can only have two
inputs. The ‘o’ on the output means
‘not’ showing that it is a Not EX-OR
gate. The output of an EX-NOR gate
is true when its inputs are the same
(both true or both false).
Source: http://electronicsclub.info/circuitsymbols.htm

371
Basic Elements
1. Schematic diagrams are used to show the details of a system using abstract, graphic symbols
rather than realistic pictures.

2. Charts are used to show data represented by symbols, such as bars in a bar chart, lines in a
line chart, or slices in a pie chart.

372
3. Block diagrams are used for a higher level, less detailed description aimed more at
understanding the overall concepts and less at understanding the details of implementation.

Altera Development Board


FPGA

PWM
Signal Pendulum interface
Ethernet
Cable
Pendulum Laptop
Hardware Encoder NDOS Core
Signal
UC Niche
Real- Ethernet
Time Stack
Os

4. Layout plans is a blue print or a master plan of a project.

Basic Computer Layout

ROM RAM

CPU
Input Device Output Device
Central Processing
Unit

Storage Device

Input Device Storage Device Input Device

373
5. Loop diagram is used to represent a detailed drawing showing a connection from one point to
control system.

Understanding Flow Chart


A flowchart is used to graphically show how a process works, showing, at a minimum, the
sequence of steps.

Use of Flow Chart:


• It tell how things are currently working and how could this be improved.
• It tells where the key elements of a process are.
• It tells where one process ends and the next one starts.
• It tells if the steps are redundant or misplaced.
• It helps to identify appropriate manpower for the job.

Types of Flow Chart


1. High-level or Top-down Flowchart is used to show the major step in a process.

374
2. Detailed Flowchart is used to provide a detailed picture of a process by mapping all of the steps
and activities that occur in the process.

3. Deployment or Matrix Flowchart is used to map out the process by identifying who is doing the
steps. It is done in the form of a matrix, showing the various participants and the flow of steps
among these participants

375
Basic Symbols Used in Flow Charting

Source: http://www.tenouk.com/Module6.html

Remember These
1. Drafting is the visual language of industry and engineering.
2. Electronic symbol is a pictogram used to represent various electrical and electronic devices in
a technical drawing.
3. Schematic diagrams are used to show the details of a system using abstract, graphic symbols
rather than realistic pictures.
4. Charts are used show data represented by symbols, such as bars in a bar chart, lines in a
line chart, or slices in a pie chart.
5. Block diagrams are used for a higher level, less detailed description aimed more at understanding
the overall concepts and less at understanding the details of implementation.
6. Layout plans is a blue print or a master plan of a project.
7. Loop diagram is used to represent a detailed drawing showing a connection from one point to
control system.
8. A flowchart is used to graphically show how a process works, showing, at a minimum, the
sequence of steps.
9. Three types of flow chart are high-level or top-down flowchart, detailed flowchart, and
deployment or matrix flowchart.

376
Check Your Understanding
A. Identification.
Identify the name of the symbols being asked for. Write the correct answer on the space
provided for.

_________________1.

_________________2.

_________________3.

_________________4.

_________________5.

_________________6

_________________7.

_________________8.

_________________9.

_________________10.

377
B. Explain.
1. Why is it important to know the different symbols used in electricity and electronics?
2. How do high-level or top-down flowchart, detailed flowchart, and deployment or matrix
flowchart differ from each other?

Research To Do
1. Divide the class into small groups of four students or five students. Then plan on a role
play/dramatization showing the three types of flow chart. Allow the audience to give
their observations after the play.
2. Ask the students to make an album showing the common symbols used in electronics
and electricity.

378
Lesson 4
Installing Computer Systems and Networks (CN)

Get Ready
Now that you learned about computer parts and systems, it is easy to put everything together.
Installing computer systems and networks is easy but can be challenging as well.
In this lesson, you will understand and learn the planning, installing, and testing of computer
systems and networks. You will be able to demonstrate the correct process of it.

Get Ready

Installation or the so-called “set up” of a computer is the process to perform of having the
program ready for execution. This process varies for every computer and every program. Operating
systems comes with an installer which is a specialized program responsible for doing the installation
process. It also involves code being generated from the installation files to be transferred to a new file
on a particular computer.
Regardless of the size of the computer, it is only hardware without software. Like a car without
fuel, hardware remains immobile and unproductive without programs to tell it what to do.
In general, there are two categories of software: system software and applications software.
Both types of software are necessary for the computer’s operation.

COMPUTER SOFTWARE
System oftware
S Application Software
operating systems application packages
language translators customized programs
utilities

379
System software oversees the internal operations of the various hardware components and
is usually supplied by the computer manufacturer. Application software directs the computer to
execute specific jobs. It is a set of programs that directs the computer to solve particular problems
or applications. Application software is said to be user oriented. This means that it responds to what
the user wants done. System software is more computer-oriented since it takes care of what must be
done in order for the computer to work. It is not concerned with the user’s requests; it only deals with
the functioning of the computer.

Plan and Prepare for Installation


With the rapid advance of technology, particularly in the area of computer, the need has
become apparent for comprehensive state of the art process.
Follow these safety precautions when installing:
• Wear a grounding strap attached to a grounded device to avoid damage from static
electricity.
• Discharge static electricity by touching the metal case of a
safely grounded object before working.

• Leave components in the static-proof bags.

• Always remove the AC power by unplugging the power cord


from the power outlet before installing or removing hardware
or other components.

Workplace Hazards
Hazard is anything that makes potential harm in the workplace. Common types are:

Slips, trips, and falls Being electrified

Fire and explosions Short circuit

Confined spaces Health hazards


380
Computer Peripherals/Devices/Systems
Input
Computers can process data at incredible speeds. First, though, the data has to get into main
memory. Only then can the processing occur. Getting data into the computer is called input. The
mechanism that is used to get the data into the computers is called an input device.

There are scores of input devices. New ones are being developed and old ones are being refined
constantly. Any list of input devices will be incomplete. But input devices are crucial.

Keyboards
Keyboard input is used for all sizes of computers from the largest supercomputers to the
smallest laptops. The data entry process is just like typing on a typewriter. The arrangement of keys is
the same, and many people are most comfortable with this traditional form of input.

Touch Screens
A variation on that type of menu requires the user to merely touch the option that is to be used.
This is touch screen input. Touch screens are easy to use, and they are less threatening than asking
the user to type in data. But their use is limited. A person’s finger is large compared to the size of a
character on the screen; and the only input allowed is a choice of items on the screen. If the user
wants respond in some other terms, it is not allowed.

Joy Stick, Mouse, or Track Ball


Familiar to all arcade game players is the joystick. Computers are sometimes used to play games.
A joystick can then steer a plane or tank, fire a rocket, or point the way in a treasure hunt. That’s input.
The mouse is a close cousin of the joystick. Its applications, however, are more varied. A mouse
can be used to move the cursor around on the screen. The cursor is the blinking line or a square or
other indicator of the current position on the screen. Rolling the mouse around on the desk moves
the cursor to the desired location; then a button on the mouse is “clicked” to make a selection.

Light Pen and Digitizer Pad


A light pen is a pencil-shaped device attached to the computer by a wire. With light pen in
hand, the user points to a position on the screen. The pen detects light from the characters on the
screen at that points and sends a message to the computer indicating the position to which the user
is pointing.

381
A digitizer pad is attached to the computer terminal. The pad is a flat surface often marked off
in a grid. The “puck” is moved over this pad until it is positioned at a necessary point. Then a button
on the puck is pushed or clicked. The point appears on the screen. Another point is selected and line
appears between them.

Other Input Devices


The grocery store scanner is a familiar sight. Some retail stores have hand-held scanners. Both
work sensing the Universal Product Code or UPC symbol which resembles lines of varying thickness
arranged in a rectangular pattern. Optical Character Recognition or OCR devices are able to read
those strangely shaped numbers and letters that are printed on certain items.
Another input scheme that you’ve most likely come in contact with is Magnetic Ink Character
Recognition. Touch Tone Phones can provide input. Voice recognition is a developing technology
with tremendous potential. This device represents the ultimate in user-friendliness. It analyzes
spoken commands and converts them to data.
Even TV camera can be an input device. There are many other input devices which transmit
images in coded form to a computer program as input.

Output
The term output refers to the information that comes from computers. Output can appear in
various forms. Computer output can be permanent or temporary or it can take the form of an action
performed. Perhaps the most common forms of output are screen displays and printouts. Screen
displays are temporary; they are referred to as soft copy. Printouts are considered permanent, and
are sometimes termed hard copy.

Temporary
A computer screen is often called CRT screen. CRT stands for Cathode Ray Tube. Another type of
computer screen is LCD. Another type of temporary output is voice response system. The computer
system actually speaks its output through a speech synthesizer. The voice of the computer is output
from the program.

Permanent
The major output device of this type is the printer. You’ve seen a lot of computer generated
printing, and you’ve noticed that some of it look better than others. This quickly leads you to conclude
that there are different kinds of printers.

Impact Printers
Impact printers function like typewriters. A mechanical hammer presses against a ribbon, and
this leaves an inked impression on the paper which is on the other side of the ribbon. The most
common impact printers are dot matrix printers.
A daisy wheel printer is named for the shape of the printing element. The letters are fully
formed and positioned at the end of flexible fingers radiating from a central hub. Band printers have
the letters and symbols arranged on a continuous loop that spins at very high speed. Drum printers
are line printer with characters arranged in circles around a cylinder or drum.

382
Non-impact Printers
Electronic or photographic techniques are used by non-impact printers. These printers use
thermal, electrostatic, laser and other methods to create their images. Generally, non-impact printers
are quieter and faster than impact printers. They form images without using a ribbon.

Other Output Devices


In addition to printers, hard copy can be produced by plotters. A plotter moves a pen across a
piece of paper to produce a graphic output. Large amounts of information can be output on rolls
of film called microfilm or on sheets of film called microfiche. This high-capacity film allows user to
access large numbers of full page images.

Personal Computer Systems and Devices


We have seen that computers come in many models, and sizes. No matter how large or small
the computer is, it requires other components to produce results. Matching the computer with the
correct elements results in a computer system. A computer system is a collection of components that
interact to satisfy a need or solve a problem.
A computer system is composed o machines (referred to as hardware), programs and operating
aids (referred to as software), data processing personnel, data files, and procedures. Some texts
define computer systems simply as hardware and software, but the recent trend is to include the
other elements which are truly necessary for a computer system to function.

Software
The sets of instructions that describe to computers the operations they are to perform are
called software. Software may also be called computer programs. Specific software is designed to
instruct the computer in the method of solution for specific problems. Other software may be more
general and can be used in several different situations.

Procedures
Procedures are systematic courses of action that help people use data and equipment. With
clearly stated procedures, people know what needs to be done and how to do it. New users can refer
to the procedures to learn how the work of the computer system is done.

Hardware
Hardware is the actual computing equipment. It’s the physical machinery. The computer itself
is hardware. Other types of hardware are used to enter data into the system, to record the results of
the calculations, and to store the data and the programs. The hardware components of a computer
system are interconnected. They may be a combination of electronic and mechanical services. The
hardware is the most evident part of the system, since it is concrete and readily visible. It may appear
to be the most expensive part of the system, but there are other costs that can’t be measured as easily
as the price of hardware.
383
Data
Data are facts and figures or unprocessed information. Data items are not very meaningful
until they are combined and processed to form information. The raw data is fed into the computer
which follows the software directions for processing it. The result should be usable information.
Complete and correct data are essential to produce valid information. People use computers to
obtain information. The foundation of information is data. Examples of data would include a school’s
records of subjects taken by a student and grades earned in those subjects. It is easy to see the data
is essential for business to function. In fact, collections of data are major assets in large organizations
and for individuals.
People
People build and control computers systems which are used in making decisions and solving
problems. People make decisions about what the components of the computer system will be. They
select both the hardware and the software. The procedures are written by people. People supply the
data to the system. People are often referred to as users because they utilize the system.

Networking Devices
LAN is a collection of computers interconnected to communicate and share resources, such as disk
storage, printers and modems. LAN stands for Local Area Network.

LAN Terms:
Network Node – a device connected to a network.

Workstation – users of computer which runs every day application.

Network Card (NIC) – card install in the machine to make the


physical connection to the network. A socket at the back of the card
provides connection to the network.

Wire – could be coaxial cable, twisted-pair wire, fiber


optic cabling, or even packet radio transmitted to a
workstation.

Network Software – individual workstation operating system.

File Server – the machine the network software runs


on; it is where the file that are stored on the network
physically placed.

384
Print Server – a network software running on a computer dedicated
to printing or is specialized network interface device (a small box
which connects one or more printers to the network cable.

Tools, Equipment, and Testing Devices


• Necessary Tools
Phillips screw (screwdriver)
This is a tool used for driving screws or bolts with special slots, and occasionally for
turning other machine elements. This is made up of a head or tip, a mechanism to apply torque
by rotating the tip, and some way to position and support the screwdriver.

Needle-nose pliers
These are also called as long-nose pliers, pinch are cutting and
gripping pliers used by electricians and other tradesmen to bend, re-
position, and cut wire.

Anti-static wrist strap


Antistatic device used to safely ground a person working on
very sensitive electronic equipment, to prevent the buildup of static
electricity on their body, which can result in electrostatic discharge.

Work space
This refers to the area that contains a space wherein the repair takes place.
• Useful and Optional Tools

Mat (used for grounding or anti-static) a term for


a piece of fabric or flat material, normally placed on a
floor or other flat surface, that has a lot of purposes.

Electrical tape – a sort of pressure-sensitive tape used to shield electrical


wires and other materials that carry out electricity.

Flashlight – a hand-held portable powered light source, in here


this is used a source of light for repairing

Compressor – used for collecting dust in


computer. Vacuum cleaner is the better cleaning
tool but quite expensive.

385
Tester – used for testing and diagnosing hardware failure. This is
especially useful in testing power supply failure by reading the
amount of voltage that it gives in a computer.

Drivers/CDs for booting – refers to the


diagnostic CDs compilation used for computer
configuration. This will able to troubleshoot
software issues in a computer.

Install Equipment/Devices and Systems


Today, there are literally thousands of business application programs available for computers
of all sizes. The choice of a specific software package is not an easy one. To make informed software-
buying decisions, users must be familiar with the capabilities of available application software.
Some common software operations for installations guide:

Check the necessary system requirements and existing


version of the software needed.

Create or update program files/folders.

Add data for configuration of files, Windows registry, and others.

Creating links, shortcuts for software to be accessible for the user.

Configure components to run automatically.

Steps in Computer Assembly:

386
Read the manual and follow directions.

Remember the connections.

Handle each board properly.

Plan cabling.

Check and recheck connection before turning the computer on.

Use only the right tools for the job.

Attach the computer monitor and associated peripherals.

Back up the configuration.

Use precautions when removing boards and drives.

Keep small parts organized and troubleshoot if necessary.

387
Systems Specification

CPU Type of processors


Chipset AMD Chipset
Intel Chipset
Memory DIMM/UDIMM sockets that support the motherboard
Graphics Onboard/Using video card
*To use the onboard graphics ports, you must install the necessary
software with integrated graphics.
Audio High Definition Audio/Codec/Realtek/Support for S/PDIF Out
*To configure 7.1 channel audio, you have to use an HD front panel audio
module and enable the multi-channel audio feature through the audio
driver.
LAN LAN chip in the motherboard (10/100/1000 Mbit)
Expansion Slots PCI/PCIE
USB Up to 8 USB 2.0/1.1 ports (4 ports on the back panel, 4 ports available
through the internal USB headers)
Internal Connectors 24 pin ATX main power connector
8 pin ATX 12V power connector
Sata 3 Gb/s connectors
CPU fan header
System fan header
Front panel header
Front panel audio heard
S/PDIF out header
USB 2.0/1.1 headers
Serial port header
Clear CMOS jumper
Back Panel PS/2 or USB keyboard port
Connectors PS/2 or USB mouse port
D-sub port
DVI-D port
USB 2.0/1.1 ports
RJ-45 port
Audio jacks (line in/line out/Microphone)
I/O Controller Controller Chip
Hardware Monitor System voltage detection
System temperature detection
System fan speed detection
Overheating warning
System fan fail warning
System fan speed control

388
BIOS System that support the hardware parameters of the system in the CMOS
on the motherboard

Basic Computer Configuration Set Up


• Requirements
First ensure that the computer meets the requirements. Read the user’s manual. Requirements
for working with the computer sometimes are in the websites.

• Installing System
After checking that your system meets the requirements, install the software according to the
instructions found in the user’s manual. The first step is to insert the bootable disk in the media.
Next, download, unpack, and install necessary program. When you reach the step that instructs
to start the Set-up Wizard, proceed to the next section of the installation.
• Installing Windows
After checking installing the system, install the software according to instructions and set up
wizard of the disk.
• Installing Other Programs
After the Windows has finished with the installation, it is now time to install the programs that
you need.

Networking
Several computers can be connected in a network. The computers share data files and peripherals
and can communicate with each other. While networking and timesharing both involve multiple
users and sharing peripherals, they are totally different concepts. Timesharing use one computer and
connects multiple terminals. But the users are all accessing a single computer. Networking links a
number of computers together. There are several different ways to organize a network, but the user
is always working on an independent computer which can access information and peripheral devices
through the network.

389
Designing a LAN
• To design a useful network, you must figure out what you need and predict what you will need
in the future.
• Rule suggests that good network design always builds in a little extra horse power for increased
demands.
• Try analyzing what the organization actually does and what the employee do.

LAN Cables

390
Two Simple Rules:
1. When the devices are the same, then crossover cable is used.
2. When devices are different, straight cable is used.

Source: http://www.computercablestore.com/straight-through_crossover_rollover.aspx

Types of Ethernet cabling


To start off, you should remember that not all Ethernet cabling is the same. If you go to a store
you may find a variety of “categories” of cabling. These categories tell you the quality of the cabling.
The quality determines, essentially, how much the cable can handle. Here are the categories that you
need to know:
Cat 3 – used for voice cabling and 10Mb Ethernet
Cat 5 – used for 10/100Mb Ethernet and works for voice as well
Cat 5E – Enhanced Cat 5 cabling that helps to prevent cross-talk, works for 10/100Mb and
1000Mb (or Gigabit Ethernet)
Cat 6 – Like Cat 5E but with larger gauge wires, works for 10/100/1000Mb. This cable is better
than Cat 5E for Gigabit Ethernet.
Cat 7 – Also called Class F, this is fully shielded cabling and supports up to 600Mhz. This is a
relatively new type of cabling and isn’t used much.

Source: http://www.petri.co.il/csc_the_basics_of_ethernet_cabling.htm
Steps in Putting up a LAN
1. Plan the physical layout and do the wiring.
2. Prepare the hardware.
3. Install the server software.
4. Generate the shells for the workstation and install them.

391
5. Create the entire user and set up their security and trustee rights.
6. Finally, document the network.

Conduct Test on the Installed Computer System


Conducting a test is a method by which individual units or sets of two or more computers
are tested to determine if it is fit to use. A bad CPU can cause different issues on the computer. It is
important to know these issues listed below.
ü Computer will not boot.
ü Computer crashes messaging different errors.
ü Computer will randomly reboot.
Computer systems normally include a combination of hardware and software components,
application programs, systems programs, processors, buses, memory, input/output devices, and
others. In doing testing, checking the circuits should be the first move.
After the post, the computer then check drives A: and C for two hidden system files (IO, SYS
and MSDOS.SYS) and the COMMAND.COM to load the operating system, then it will look in the root
directory for two system configuration files (CONFIG.SYS & AUTOEXEC.BAT).
The BIOS (Basic Input and Output System) displays the system’s configuration status and
provides you with options to set system parameters. The parameters are stored in battery backed up
CMOS RAM that saves this information when the power is turned off. When the system is turned back
on, the system is configured with the values you stored in CMOS.

Steps in Testing and Checking Installed System:


1. Check the computer for jumper.
2. Check the CPU cooler fan if properly installed.
3. Check that the 12V power or ATX connectors are fully inserted into the motherboard connectors.
Make sure the latches of the cable and connector are locked in place.
4. Check the hard drive, optical drive, or memory installed.
5. Check whether there is any bulked up electrolytic capacitor or abnormal component.

Remember These

1. The accomplishment of a person is greatly depends on a definite set of character.


2. Software is absolutely essential for modern computer operations.
3. Without software, a computer is just a marvelous device with great potential, but it can’t
do very much.

392
Check Your Understanding
A. Choose your answers from the box. Identify each question.
__________ 1. Generally defined as instructions that direct a computer to process data.
__________ 2. A type of system software which oversees coordination and control of
computer system’s resources.
__________ 3. Local Area Network
__________ 4. A computer is the process to perform of having the program ready for
execution.
__________ 5. Oversees the internal operations of the various hardware components and is
usually supplied by the computer’s manufacturer.
__________ 6. Said to be user oriented.
__________ 7. Performs standard processing tasks.
__________ 8. Card install in the machine to make the physical connection to the network.
__________ 9. A device connected to a network.
__________ 10. A user’s computer which runs everyday application.

installation LAN operating system software


system software application software utility software network card
network node workstation

B. Explain.
What are the two major types of software? Why is software needed?

Research To Do
Make a diagram or illustration on the simplest type of connection with a LAN attached to a
computer.

393
Lesson 5
Diagnosing and Troubleshooting Computer Systems (DT)

In this lesson, you’ll take a closer look at how a computer works. Specifically, you’ll be
introduced to computer diagnosing and troubleshooting. The computer is present in everyday life
to an unprecedented degree. When we talk about computer, we refer to the physical equipment that
makes up a computer system.
By the end of this lesson, you’ll have expanded both your vocabulary and your understanding
of computer systems.

Read and Learn

After assembling the computer for the first time you will experience some start-up problems.
Before calling for technical support or returning for warranty, this lesson may help you address some
of the common questions using some basic troubleshooting tips.
Plan and prepare for diagnosis of computer systems errors

394
POST (Power-on Self-test) – a series of diagnostic test that run automatically when a computer is
turned on. The actual tests can differ depending on how the BIOS is configured.
BIOS – contains all the codes required to control the keyboard, display adapter and screen, disk
drives, serial communication ports and a number of miscellaneous functions.

Types of Computer System Errors


Power-on Self-test or in BIOS listing, POD (Power-on Diagnostics) – a short diagnostic routing
runs on the computer every time it is powered up, runs a memory test, and checks to see that the
basic important hardware exist.
1. Test the registers and flags (system halts or failure)
2. Computes and checks the checksum for the memory card installed (system halts or
failure)
3. Checks the controller (system halts or failure)
4. Test the Interrupt Controller (system creates a long beep and a short beep then halts on
failure)
5. Test the timer: is it running at the right speed? (If it is not, the system does a long, then a
short beep sound. The code actually jumps to the same point as for the error message for
the above)
6. Performs a checksum test on the BASIC ROM (if the ROM fails, there is a long and a short
beep then a halt)
7. Test the video (if the video controller defective or there is no video card, there is one long
and two short beeps)
8. Ask installed adapters if they must initialize themselves, i.e. hard disk controllers, LAN
adapters (if the boards respond yes, POST lets them initialize. When they finish, POST
returns to BIOS start up).
9. Tests monitor interface lines (if the horizontal and vertical sweep don’t appear, there are
two long and a short beeps. If everything is okay, the cursor on the computer will blink.
10. Test the memory and all the system RAM.
11. Tests the keyboard (stuck keys are detected here, any keyboard problems are indicated
by a code on the screen followed by a short beep, the system is not halted)
12. Test the disk adapter and drive; then attempts to reset the drive and activate the drive
motor (sounds a short beep then goes to BASIC).
13. Determines how many printers, ports, etc. are attached (it issues a short beep, loads the
boot record, and transfers control to it).

General Errors
Ø Power and grounding
Ø Cable error
Ø Controllers
Ø Slowing down system speed or bus speed
Ø RFI problem
Ø Media scan and reformat, sparing out all previous and new hard errors

395
Diagnose and Configure Computer Systems and Networks

Basic Concepts of Electricity


A plain perspective of how an electrical system works is important when starting an electrical
work. An electrical technique is required to have a safe and secure electrical connection. Wiring
correctly is fairly simple. In most cases, using the right technique is faster and easier than doing
something the wrong way.

Use the Right Tools


Before beginning electrical work have the basic set of tools designed for wiring.

pliers Stripper Lineman’s

Safety While Working


Electrical work is safe if you always follow the most important safety measure:
ü Shut off power and test to make sure power is off before you start the project.
ü Review safety tips before beginning any wiring project.

Techniques for diagnosing computer systems


1. POST checks CPU registers and flags. Chipset reset the CPU (system completely halts on
failure).
2. POST checks the video card and locates and executes the program in the cards.
3. POST checks other adapter’s BIOSes and executes the codes/programs in them, such as
hard disk BIOS, LAN adapters, etc.
4. POST tests the LCD interface lines (if the horizontal and vertical sweep fails, a series of
errors tones are generated, if okay, however, the cursor on the screen blinks).
5. BIOS display the start-up screen.

These are the contents of a typical BIOS start-up process


• The BIOS Manufacturer and Version Number.
• The BIOS date: the date of the BIOS can be important in determining its
capabilities
• Set-up Program Key: The key or keys to press to enter the BIOS set-up
program. (This is usually (Del), sometimes (F2), and sometimes, another
key combination.)

396
• System Logo: the logo of the BIOS company, or in some cases, the
computer maker or motherboard manufacturer
• The BIOS Serial Number: this is normally located at the bottom of the
screen since BIOSes are highly customized to the particular motherboard,
this serial number can be used in many cases to determine the specific
motherboard and BIOS version being used.

6. POST tests the memory and all the system.


7. POST checks the keyboard (any keyboard problems are detected and errors are displayed
on the screen together with some beeps).
8. POST checks the disk adapter and drive A.
9. POST determines how many printer and play devices and configures them.
10. BIOS display a summary screen about the system’s configuration.

Typical contents of summary screen:


• Processor (CPU) Type: this is usually the general family of processor, like
AMD, Pentium, etc.
• Clock Speed: the speed of the processor in MHz. Some BIOSes put the
speed of the processor together with the processor type display (the first
line)
• IDE/ATA Drives: most BIOSes will show an entry for each of the four devices
on and IDE system the primary slave and master, and the secondary slave
and master. For each drive installed in the system, the screen will show its
size and what sort of modes it is using for access. Some BIOSes will also
detect and show IDE (ATAPI) CD ROMs.
• Base Memory Size: this is also called conventional memory.
• Extended Memory Size: this indicates the total amount of extended
memory installed in the system.
• Cache Size: The amount of cache memory in the systems.
• Memory Type and Configuration: most newer systems will display how
many banks of memory have been found and what memory technology
is in use.
• Display Type: this will normally say “VGA/EGA.”
• Serial Ports: the I/O port addresses the serial or COM ports. Normally there
are two, with addresses but can be three or four as well.
• Parallel (ports): the I/O port addresses of the parallel or LPT ports, normally
there is one.
• Plug and play devices: some BIOSes will report the descriptions of any
plug and play expansion cards they identify during the boot process.

397
Computer Systems and Network Configuration

Typical Network Connection

Client Server
Security Protection
Allow to unload a lot of file server overhead
Allow to unload a lot of printing overhead
Reduce both network traffic and processing time to retrieve
information from the database

Peer to Peer network Printer sharing


File transfer from workstation to workstation
Electronic mail
Popular peer to peer LAN can do all those three jobs mentioned
above
Tend to be simpler requiring little maintenance or management
Using peer-to-peer network might choose to additional hard drive
space in one or more stations that will be heavily loaded with shared
files
Use single user or network version of traditional PC style database
Don’t provide security protection.

List of Network Connection Methods and Connection Paths

Connection
PC Connection Path
Method
Serial port (ppp0) PPP ⇔ modem ⇔ POTS ⇔ dial-up access point ⇔ ISP
Ethernet port (eth0) PPPoE/DHCP/Static ⇔ BB-modem ⇔ BB service ⇔ BB access point ⇔ ISP
Ethernet port (eth0) DHCP/Static ⇔ LAN ⇔ BB-router with network address translation
(NAT) (⇔ BB-modem …)

List of Network Connection Configurations

Connection Method Configuration Backend Package(s)


PPP pppconfig to create deterministic chat pppconfig, ppp
PPP (alternative) wvdialconf to create heuristic chat ppp, wvdial
PPPoE pppoeconf to create deterministic chat pppoeconf, ppp
DHCP described in “/etc/dhcp/dhclient.conf” isc-dhcp-client
static IP (IPv4) described in “/etc/network/interfaces” iproute or net-tools (obsolete)
static IP (IPv6) described in “/etc/network/interfaces” iproute

398
List of Network Connection Acronyms

acronym meaning
POTS plain, old telephone service
BB broadband
BB-service e.g., the digital subscriber line (DSL), the cable TV, or the fiber to the premises
(FTTP)
BB-modem e.g., the DSL modem, the cable modem, or the optical network terminal (ONT)
LAN local area network
WAN wide area network
DHCP dynamic host configuration protocol
PPP point-to-point protocol
PPPoE point-to-point protocol over Ethernet
ISP Internet service provider

Inspect and Test Configured Computer Systems and Networks


Determining Defective Components

Systems do not power up and the fans are not running:


• Disassemble the computer to remove the VGA adaptor card, DDR memory, LAN, USB,
and other peripherals, including the keyboard and mouse. Leave only the motherboard,
CPU with CPU cooler, and power supply connected. Make sure the power cord is plugged
into the wall socket and the switch on the power supply unit is turned on as well. Turn on
again to see if the CPU and power supply fans are running.
• Make sure to remove any unused screws or other metal objects such as screwdrivers from
the inside computer case. This is to prevent damage from short circuit.
• Check the CPU fan connector is connected to the motherboard.
• Check the 12V power connector is connected to the motherboard.
• Check that the 12V power and ATX connectors are fully inserted into the motherboard
connectors. Make sure the latches of the cable and connector are locked into place.

When the power is on, fans are running but there is no display:
§ Make sure the monitor is turned on and the monitor cable is properly connected to the
computer.
§ Check the VGA adapter card is inserted properly.
§ Listen for beep sounds. If you are using internal PC speaker, make sure it is connected.
o Continuous 3 short beeps: memory not detected
o 1 long beep and 8 short beeps: VGA not detected

399
The computer suddenly shuts down while booting up:
§ The CPU may experience overheating so it will shutdown to protect itself. Apply the
thermal grease onto the CPU heat sink and ensure the CPU fan is well-connected with
the CPU heat sink. Check if the CPU fan is working properly while the system is running.
§ From the BIOS setting, try to disable the fan function to let the fan run at default speed.
Doing a load optimized default will also disable the fan.

Repairing/Replacing Different Components

Wiring Techniques
• Before you can build or design, you will need to recognize how to use proper wiring
techniques in order to start connecting simple circuits.
• Learning these techniques will ensure that you are following proper electrical safety
procedures.

Tools and Materials

Soldering Iron Solder

Crimping tool Wire Nuts

Choosing Gauges:
• The most important wiring practice is to observe proper wiring sizes.
• Failure to choose the correct size can result in marginal performance of your circuit or
even overheating of your wires or connectors.
• Always use one size larger, if possible.

400
Wire Size for a 3% Voltage Drop in 12 Volt circuits

Wire Color Selection:


• Properly choosing the colors for your wires can
help you decipher your wiring configurations.
• To the right is a picture of a bad configuration
and a good configuration.
• For low DC voltages use the following color
codes:
Black – Negative
Red – Positive
Green - Ground

Conductors:
• Conductors are defined as materials that allow
the flow of electric current.
• Metals are usually good conductors while non-
metals are not.
• The most common conductor used in electrical
wiring is copper.

Insulators:
• An insulator is materials that has few, if any, free
electrons and resists the flow of electrons.
• No material has been found to be a perfect
insulator, but common insulators include air,
glass, rubber, plastic, paper, and porcelain.
• An advantage of using insulators in circuits is
that they provide the ability to place wires close
together without the risk of a short circuit.

401
Wire Terminals and “Quick Connects”:
• Terminals are used to safely and easily connect
wires to a device or load.
• They are usually crimped onto the ends of wires,
or soldered directly onto the terminal.

Single pole wire connectors


• Allows a clean connection between the wires.
• They can be “crimped” on instead of having to
be soldered together.
• You can safely separate the wires without having
to cut or splice.

Power Supplies

Voltages

WARNING!!!
Do not attempt to open the power supply case while the power is on, hazardous voltage are present
on the filter capacitors.

402
Power Supply Connectors

Properties of Good Power Supply


Low Noise – make sure that the fan is not excessively noisy.
Initializing Pulse – be sure it has proper initializing pulse in pin 1 (some have a different value).
Automatic overload and open circuit shutdown – must have “overload protect,” save itself from being
damaged by automatic shut off.
Switchable Voltage – can be switched to 110 to 220 voltage to accommodate foreign standards.

Symptoms of Power Problem


1. The computer freezes up with the cause not being traced
2. Random memory errors
3. Lost data on the hard disk
4. Damaged chips on the circuit board
5. Data transmission noise and peripherals error

Testing System and Networks


Check the computer’s IP configuration. Windows systems offer a command-line tool, called
ipconfig that lets you find out your computer’s IP configuration. The output of this command gives
the IP configuration for each interface; a computer with two network cards and one wireless adapter
has three interfaces each with its own configuration.
To view your computer’s IP configuration, simply enter the following command (Start/run):
cmd/kipconfig/all

403
The output of such a command looks like this:
Windows IP Configuration
Host name..........: CCM
Primary DNS suffix ...... :
Node type..........: Broadcast
IP routing enabled ........: No
WINS proxy enabled ........: No

Ethernet adapter wireless network connection:


Connection-specific DNS suffix:
Description ...........: Intel(R) PRO/Wireless LAN 2100 3A Mini PCI Adapter
Physical address .........:00-0C-F1-54-D5-2C
DHCP enabled...........: No
IP address......... ...:192.168.1.3
Subnet mask... ...:255.255.255.0
Default gateway... ...:192.168.1.1
DNS servers..........:193.19.219.210
193.19.219.211

Ethernet adapter local area connection:


Media status.........: Media disconnected
Description ...........: Broadcom 570x Gigabit Integrated Controller
Physical address .........: 0F-0F-1F-CB-99-87

Testing the Connection


To test the proper functioning of a network, there is a highly practical utility provided as a
standard feature with most operating systems; this is the ping utility. Ping lets you send a data packet
to a network computer and let you evaluate the response time. The ping command is explained in
detail at the following address:
• Network tools - Ping command
To test the network thoroughly, simply open a command-line window, and then
successively carry out the following steps:
• ping the loopback address (127.0.0.1), representing your computer:
ping -t 127.0.0.1
• ping the IP addresses of the network’s computers, for example:
ping -t 192.168.0.3
• ping the computer names, for example:
ping -t Mickey

404
• ping the computer used as gateway on the local area network, that is, the computer
sharing its Internet connection. It usually has the address 192.168.0.1:
ping -t 192.168.0.1
• ping the service provider’s gateway. The address of the service provider’s gateway can be
retrieved using the ipconfig command on the computer being used as gateway on the
local area network;
• ping the service provider’s name servers . The address of the service provider’s DNS
servers can be retrieved using the ipconfig command on the computer being used as
gateway on the local area network;
• ping a machine on the internet network, for example:
ping -t 193.19.219.210
• ping a domain name, for example:
ping -t www.commentcamarche.net

Remember These

1. A fundamental concept of memory is that memory is divided into many storage areas.
2. The control unit may need to retrieve or read the data from an address more than one in
the process of executing program instruction.
3. In choosing a network operating system; look for market acceptance and market share
above else.
4. It is best to use the same configuration in all machines.
5. It is best to use same brand of card in the entire network.

Check Your Understanding


A. Enumeration.
1–4. Properties of a good power supply
5–10. Computer General Errors
10–15. Symptoms of Power Problem

B. Explain.
1. Why is it suggested to use same brand of card for the entire network?
2. Why is it best to use the same configuration in all machines?
3. Why is it important not to open the power supply case while the power is on?

405
Research To Do
Do the following at home.

Directions: Write in the provided blank space the correct answers after determining the output
voltages of the following. Write down your observation.
1. Switch on the power supply. Check the output voltage.
1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________

2. Connect disk drive to power supply. Check the output voltage.


1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________

3. Connect the motherboard to the power supply without the two drives. Check the output
voltage.
1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________

4. Set up the computer parts accordingly. Check the output voltage.


1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________

Write your OBSERVATION here:

406
Lesson 6
Configuring Computer Systems and Networks (CC)

With the previous lesson, it is hoped that you learned the basic of installing computers systems
and networks, common computer errors, installing equipment/devices and system, and conducting
test, diagnosing, and troubleshooting.
In this lesson, you will be able to demonstrate understanding of the underlying concepts and
principles in configuring computer systems and networks.

Read and Learn


Plan and Prepare for Configuration

Standard Operating Procedures


Computer systems planning and implementation are essential ingredients for smooth and
efficient operation of any computer system. Planning is a required prerequisite when installing a new
computer system or upgrading an existing computer system to address new requirements. Planning
marks the first stage of the life cycle of computer systems. The input for computer systems planning
is a set of requirements and the output is a plan for the computer system that will be implemented.
The plan would typically include the types of physical machines and software to be acquired, the
topology in which they would be interconnected, and the attributes such as capacity or processing
power required of the hardware and software.

Procedures in Using the Tools and Equipment

What is a Screwdriver?
A screwdriver intensifies the tool designed for turning an object that is placed into the screw’s
head. This consists of several tip designs for special function. There are two most common type of
screwdriver: the standard (also called flat, flared, or straight) and the Phillips screw(X-shaped).

407
Using a Screwdriver
First, select the appropriate tip and size of the object to use the screwdriver. Inserting the driver
tip into the head of the screw to be pulled out and turning it clockwise while applying pressure on
the handle.

What is a Pliers?
An instrument used for bending wires, holding small objects and is small with a long jaws.

Using a Pliers
Choosing the right tool for the job should be of good quality; this kind of common hand tool is
for gripping, bending, locking, and cutting.

What is an Anti-static Wrist Strap?


Sometimes call as ESD wrist strap or the so-called ground bracelet, it is an anti-static device
used for grounding safely a person working in sensitive electronic equipment.

Using an Anti-static Wrist Strap


Easy using of anti-static wrist strap is to look for an AC ground. It should be possible to take
precautions first to avoid static and not to damage the components you are repairing.

Maintain Hand Tools


Hand tools provide simple and portable means for completing a repairing project. Learn how
to safely use and maintain hand tools.
1. Hardware Tools
o You will want to have an anti-static strap to avoid electrostatic discharge, a Philips
head screwdriver, a can of compressed air to clean the keyboard and remove dust,
a flashlight or penlight, and tweezers.
o Additional helpful items: thumb drive or external drive, power strip, and cable ties.
2. Hardware Diagnostic Tools
o For free hardware diagnostic testing tools, you can use Memtest for testing memory
problems and Sea tools to test your hard drive.
o Tip: Always test and repair the hardware first as it is pretty much black or white. Your
hardware is the foundation of your computer and the software runs on top. Think
of it this way: If a house is built on top of a sagging foundation, everything will run
downhill.
3. Software Tools
o When it comes to software, there are many variables to consider if your computer
will not boot, you can’t find a file or one application will not open. However, the
most important software tool is an antivirus program. Because no antivirus
program will catch 100 percent of the problems, it’s important to run more than
one such program when repairing a computer. Malwarebytes is a free malware-
removal program that is favored by technicians. Microsoft Security Essentials is also
recommended. Run each program until it cannot find any more threats.

408
Configure Computer Systems and Networks

Network Devices, Media, and Connectors

HUB
Networks using a Star topology require a central point for the devices to connect. Originally,
this device was called a concentrator since it consolidated the cable runs from all network devices.
The basic form of concentrator is the hub. As shown
in Figure; the hub is a hardware device that contains
multiple; independent ports that match the cable type of
the network. Most common hubs interconnect Category
3 or 5 twisted-pair cable with RJ-45 ends, although Coax
BNC and Fiber Optic BNC hubs also exist. An active hub
strengthens and regenerates the incoming signals before
sending the data on to its destination. Passive hubs do
nothing with the signal.

Ethernet Hubs
An Ethernet hub is also called a multiport repeater. A
repeater is a device that amplifies a signal as it passes through
it, to counteract the effects of attenuation. If, for example, you
have a thin Ethernet network with a cable segment longer
than the prescribed maximum of 185 meters, you can install
a repeater at some point in the segment to strengthen the
signals and increase the maximum segment length. This type
of repeater only has two BNC connectors and is rarely seen
these days.

8-Port Mini Ethernet Hub


The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45
ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub
amplifies the signal and transmits it out through all of the other ports. This enables a star network to
have a shared medium, even though each computer has its own separate cable. The hub relays every
packet transmitted by any computer on the network to all of the other computers, and also amplifies
the signals.

Multi-station Access Unit


A Multi-station Access Unit (MAU) is a special
type of hub used for token ring networks. The word “hub”
is used most often in relation to Ethernet networks, and
MAU only refers to token ring networks. On the outside,
the MAU looks like a hub. It connects to multiple network
devices, each with a separate cable.

409
Unlike a hub that uses a logical bus topology over a physical star, the MAU uses a logical ring
topology over a physical star.
When the MAU detects a problem with a
connection, the ring will beacon. Because it uses a
physical star topology, the MAU can easily detect which
port the problem exists on and close the port, or “wrap” it.
The MAU does actively regenerate signals as it transmits
data around the ring.

Switches
Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-
layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This
information allows switches to repeat incoming data frames only to the computer or computers to
which a frame is addressed. This speeds up the network and reduces congestion.

Bridges
A bridge is used to join two network segments together;
it allows computers on either segment to access resources
on the other. Bridges can also connect networks that
run at different speeds, different topologies, or different
protocols. But they cannot, join an Ethernet segment
with a Token Ring segment, because these use different
networking standards. Bridges operate at both the
Physical Layer and the MAC sub-layer of the Data Link
layer.

Routers
Routers are networking devices used to extend
or segment networks by forwarding packets from one
logical network to another. Routers are most often used
in large internetworks that use the TCP/IP protocol suite
and for connecting TCP/IP hosts and local area networks
(LANs) to the Internet using dedicated leased lines.

Routing Tables
Routers contain internal tables of information called routing tables that keep track of all known
network addresses and possible paths throughout the internetwork, along with cost of reaching each
network. Routers route packets based on the available paths and their costs, thus taking advantage
of redundant paths that can exist in a mesh topology network.

410
A router can’t forward a packet to all possible destinations in the way that a bridge can.
• Static routers: These must have their routing tables configured manually with all network
addresses and paths in the Internet work.
• Dynamic routers: These automatically create their routing tables by listening to network
traffic.
• Routing tables are the means by which a router selects the fastest or nearest path to the
next “hop” on the way to a data packets final destination. This process is done through the
use of routing metrics.
• Routing metrics which are the means of determining how much distance or time a
packet will require to reach the final destination. Routing metrics are provided in different
forms.
• Hop is simply a router that the packet must travel through.
• Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the
router selects a route based on tick and hop metrics, it chooses the one with the lowest
number of ticks first.
You can use routers, to segment a large network, and to connect local area segments to a single
network backbone that uses a different physical layer and data link layer standard. They can also be
used to connect LANs to a WANs.

Brouters
Brouters are a combination of router and bridge.
This is a special type of equipment used for networks
that can be either bridged or routed, based on the
protocols being forwarded. Brouters are complex, fairly
expensive pieces of equipment and as such are rarely
used. A Brouter transmits two types of traffic at the exact
same time: bridged traffic and routed traffic. For bridged
traffic, the Brouter handles the traffic the same way a
bridge or switch would, forwarding data based on the
physical address of the packet.

Gateways
A gateway is a device used to connect networks using different protocols. Gateways operate at
the network layer of the OSI model. In order to communicate with a host on another network, an IP
host must be configured with a route to the destination network
Examples:
• E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol
(SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its destination
• Gateway Service for NetWare (GSNW), which enables a machine running Microsoft
Windows NT Server or Windows Server to be a gateway for Windows clients so that they
can access file and print resources on a NetWare server
• Gateways between a Systems Network Architecture (SNA) host and computers on a TCP/
IP network, such as the one provided by Microsoft SNA Server
• A packet assembler/disassembler (PAD) that provides connectivity between a local area
network (LAN) and an X.25 packet-switching network

411
CSU/DSU (Channel Service Unit / Data Service Unit)
A CSU/DSU is a device that
combines the functionality of a
channel service unit (CSU) and
a data service unit (DSU). These
devices are used to connect a LAN
to a WAN, and they take care of all
the translation required to convert
a data stream between these two
methods of communication. A DSU
provides all the handshaking and
error correction required to maintain a connection across a wide area link, similar to a modem. A CSU
is similar to a DSU except it does not have the ability to provide handshaking or error correction.

NICs (Network Interface Card)


Network Interface Card, or NIC is a hardware card
installed in a computer so it can communicate on a
network. The network adapter provides one or more
ports for the network cable to connect to, and it transmits
and receives data onto the network cable. Wireless LAN
card
Every networked computer must also have a
network adapter driver, which controls the network
adapter. Each network adapter driver is configured to run
with a certain type of network adapter.

Network Interface Adapter Functions


Network interface adapters perform a variety of functions that are crucial to getting data to and
from the computer over the network.
These functions as follows:

Data Encapsulation
The network interface adapter and its driver are responsible for building the frame around the
data generated by the network layer protocol, in preparation for transmission.

Signal Encoding and Decoding


The network interface adapter implements the physical layer encoding scheme that converts
the binary data generated by the network layer-now encapsulated in the frame-into electrical
voltages, light pulses, or whatever other signal type the network medium uses, and converts received
signals to binary data for use by the network layer.

Transmission and Reception


The primary function of the network interface adapter is to generate and transmit signals of
the appropriate type over the network and to receive incoming signals. The nature of the signals
depends on the network medium and the data-link layer protocol.

412
Data Buffering
Network interface adapters transmit and receive data one frame at a time, so they have built-in
buffers that enable them to store data arriving either from the computer or from the network until a
frame is complete and ready for processing.

Serial/Parallel Conversion
The communication between the computer and the network interface adapter runs in parallel,
that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications,
however, are serial (running one bit at a time), so the network interface adapter is responsible for
performing the conversion between the two types of transmissions.

Media Access Control


The network interface adapter also implements the MAC mechanism that the data-link layer
protocol uses to regulate access to the network medium. The nature of the MAC mechanism depends
on the protocol used.

Network Protocols
A networked computer must also have one or more
protocol drivers (sometimes called a transport protocol
or just a protocol). The protocol driver works between the
upper-level network software and the network adapter
to package data to be sent on the network.

ISDN (Integrated Services Digital Network) Adapters


Integrated Services Digital Network adapters can be used to send voice, data, audio, or video
over standard telephone cabling. ISDN adapters must be connected directly to a digital telephone
network. ISDN adapters are not actually modems, since they neither modulate nor demodulate the
digital ISDN signal.

WAPs (Wireless Access Point)


A wireless network adapter card with a transceiver,
sometimes called an access point, broadcasts and
receives signals to and from the surrounding computers
and passes back and forth between the wireless
computers and the cabled network.

Modems
A modem is a device that makes it possible for
computers to communicate over telephone lines. The word
modem comes from Modulate and Demodulate. Because
standard telephone lines use analog signals, and computers
digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the
receiving end must then demodulate the analog signals

413
into digital signals. Modems can be external, connected to the computers serial port by an RS-232
cable or internal in one of the computers expansion slots. Modems connect to the phone line using
standard telephone RJ-11 connectors.

Transceivers (media converters)


Transceiver is a short term for transmitter-receiver, a
device that both transmits and receives analog or digital
signals. The term is used most frequently to describe the
component in LANs that actually applies signals onto the
network wire and detects signals passing through the wire.
For many LANs, the transceiver is built into the network
interface card (NIC). Some types of networks, however,
require an external transceiver. In Ethernet networks, a
transceiver is also called a Medium Access Unit (MAU).
Media converters interconnect different cable type’s
twisted pair, fiber, and Thin or thick coax, within an existing network. They are often used to connect
newer 100-Mbps, Gigabit Ethernet, or ATM equipment to existing networks, which are generally
10BASE-T, 100BASE-T, or a mixture of both. They can also be used in pairs to insert a fiber segment
into copper networks to increase cabling distances and enhance immunity to electromagnetic
interference (EMI).

Firewalls
In computing, a firewall is a piece
of hardware and/or software which
functions in a networked environment to
prevent some communications forbidden
by the security policy, analogous to
the function of firewalls in building
construction. A firewall has the basic task
of controlling traffic between different
zones of trust.

There are three basic types of firewalls; it depends on:


• whether the communication is being done between a single node and the network, or
between two or more networks;
• whether the communication is intercepted at the network layer, or at the application
layer; and
• whether the communication state is being tracked at the firewall or not.

With regard to the scope of filtered communication, the firewalls are:


• Personal firewalls, a software application which normally filters traffic entering or leaving
a single computer through the Internet; and
• Network firewalls, normally running on a dedicated network device or computer
positioned on the boundary of two or more networks or DMZs (demilitarized zones).
Such a firewall filters all traffic entering or leaving the connected networks.

414
In reference to the layers where the traffic can be intercepted, three main categories of firewalls
are:
• Network layer firewalls (e.g., IPtables);
• Application layer firewalls (e.g., TCP Wrapper); and
• Application firewalls, e.g, restricting FTP services through /etc/ftpaccess file.

Depending on whether the firewalls track packet states, two additional categories of firewalls
are:
• Stateful firewalls; and
• Stateless firewalls.

Network Layer Firewalls


Network layer firewalls operate at a (relatively low) level of the TCP/IP protocol stack as IP-packet
filters, not allowing packets to pass through the firewall unless they match the rules. The firewall
administrator may define the rules; or default built-in rules may apply (as in some inflexible firewall
systems).

Application-layer Firewalls
Application-layer firewalls work on the application level of the TCP/IP stack (i.e. all browser
traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They
block other packets (usually dropping them without acknowledgement to the sender). In principle,
application firewalls can prevent all unwanted outside traffic from reaching protected machines.

Proxies
A proxy device (running either on dedicated hardware or as software on a general-purpose
machine) may act as a firewall by responding to
input packets (connection requests, for example) in
the manner of an application, while blocking other
packets.
Proxies make tampering with an internal system
from the external network more difficult, and misuse
of one internal system would not necessarily cause
a security breach exploitable from outside the
firewall (as long as the application proxy remains
intact and properly configured).

Internet Protocols
Internet Connection options:
Ø Dedicated Internet access – an actual part of the Internet.
Ø LAN dial-up – dial into an internet access provider and become part of the internet for the
duration of the phone calls.

415
1. Individual PC Dial-up and Terminal Emulation:
The simplest and cheapest type of connection to make, all you need is a computer with
a modem (attached to phone line) and
any of the popular Internet it is a network of networks. telecommunications
packages such as procomm, crosstalk, or
telix.

2. PC or LAN Dial-up with SLIP Or PPP:


Ø PPP (Point to Point Protocol) – is a replacement for IP Protocol and can be multi-protocol.
Ø SLIP (Serial Line Internetworking Protocol) – is a non-standard serial line implementation
of IP Protocol or Substitutes for the IP Protocol.
SLIP and PPP Serial Line Protocol runs on ordinary phone lines using a standard modem,
or on high speed modem and a 56 kbps leased line.

Dial-up PPP Internet


Connection
Modem

Home User
ISP’s PPP
ISP’s
server
Modem Network
Telephone
Communication

3. Dedicated Internet Access:


Dedicated Internet access provides fast, unlimited access to the Internet, and easy to
access your computer as well.

416
After deciding what kind of Internet connection needed, it is now time to look for a service provider:
1. National Provider
Calling in from road to pick up mail message, this national provider is with toll-free
service.

2. Internet Service Provider (ISP)


An organization that supply Internet accessing which is this type of Internet services
will have Internet access, Internet transit, domain name registration, and web hosting.
Sample illustration of Internet service provider below is presented:

Network Security
Computer networks and remote access to computers greatly expanded the abilities of
the individual, business, and government by providing wide access to a very broad base of data.
Unfortunately, this tool, with its potential for so many beneficial uses, also provides ample opportunity
for uses that are questionable.
Network security consists of provisions and policies adopted by the network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of the computer network
and its network-accessible resources. Network security is the authorization of access to data in a
network, which is controlled by the network administrator. Users are assigned an ID and password
that allows them access to information and programs within their authority. Network security is
used on a variety of computer networks, both public and private, to secure daily transactions and
communications among businesses, government agencies, and individuals.

File and Printer Sharing


Make sure network discovery and printer sharing are on by following these steps:
1. Open Network and Sharing Center by clicking the Start button, clicking Control Panel,
clicking Network and Internet, and then clicking Network and Sharing Center.
2. If network discovery is off, click the arrow button to expand the section, click Turn on
network discovery, and then click Apply. If you are prompted for an administrator
password or confirmation, type the password or provide confirmation.

417
3. If file sharing is off, click the arrow button to expand the section, click Turn on file sharing,
and then click Apply. If you are prompted for an administrator password or confirmation,
type the password or provide confirmation.
4. If Public folder sharing is off and you want to share files by placing them in the Public
folder on your computer, click the arrow button to expand the section, click Turn on
sharing so anyone with network access can open files or Turn on sharing so anyone
with network access can open, change, and create files, and then click Apply. If you are
prompted for an administrator password or confirmation, type the password or provide
confirmation.
5. If printer sharing is off, and you have a printer you want to share, click the arrow button to
expand the section, click Turn on printer sharing, and then click Apply. If you are
prompted for an administrator password or confirmation, type the password or provide
confirmation.
6. Finally, share the file or printer by doing one of the following:
§ Right-click the file or folder you want to share, click Share, click the arrow, select
the people you want to share with, and then click Share. For more information,
see Share files with someone.
§ Copy the files or folders you want to share to the Public folder on your computer.
To find the Public folder, click the Start button, and then click Documents. In
the Navigation pane, under Favorite Links, click Public. For more information,
see Sharing files with the Public folder.
§ To share a printer, see Share a printer.

If you’re still having trouble sharing files or a printer on a network, make sure Windows Firewall
is not blocking File and Printer Sharing. Here’s how:
1. Open Windows Firewall by clicking the Start button, clicking Control Panel,
clicking Security, and then clicking Windows Firewall.
2. Click Allow a program through Windows Firewall. If you are prompted for an
administrator password or confirmation, type the password or provide confirmation.
3. In the Program or port list, make sure the File and Printer Sharing check box is selected,
and then click OK.

Inspect and Test Configured Computer System Networks


Safety Precautions
1. Shut down and unplug the computer before you make any attempts to assemble.
2. Take off any metal objects on your arms or fingers such as bracelets, rings, or watches.
Even if your unit is unplugged, there may still be some remaining electric charge.
3. Make sure your hands are completely dry to avoid damaging any mechanical parts as well
as to avoid electrocution.
4. Work in a cool area to avoid perspiration.
5. Before touching any part, put your hands against another metal surface (such as the
computer casing) to remove static charge, which may damage sensitive devices.
6. Prepare a place to keep any screws you may remove.
7. Handle all parts with care.
418
8. If a component does not come out easily, do not forcefully remove it. Instead, check that
you are removing it correctly and that no wires or other parts are in the way.
9. Be careful when holding the motherboard.
10. Never attempt to remove the power source, a box attached to the side or bottom of the
unit to which all cables are connected.
11. When removing any cables, wires or ribbons, make sure to grasp the wire at the base or
head to keep it from breaking.
12. Be careful not to drop any small parts (particularly screws) into unreachable areas such as
into the computer fan or disk drive.
13. Take note that the three of the most damaging things to a computer are moisture, shock
and dust.

Remember These
1. A properly maintained computer will run smoothly in a substantial high speed regardless
of hardware setup and configurations.
2. Pay special attention to the CPU heat sink, fan and also power supply fan, make sure it is
working.
3. Replace the fan if it stops spinning, try to lubricate the bearing.
4. Be extra careful in plugging USB, LAN cables, speakers, printer and other into the
computer, ports can be easily damaged if does not handle with care.

Check Your Understanding


A. Identification.
In the space provided, identify the name of the network devices, media, and connectors.

1. ______________ 2. ______________

3. _____________ 4. ______________

419
5. _____________ 6. ______________

7. _____________ 8. _____________

9. _____________ 10. ____________

B. Explain.
1. If a component does not come out easily, why is it recommended not to forcefully remove
it?
2. Why is it important to always handle all parts with care during repair and troubleshooting?

Research To Do
Demonstrate the steps in file and printer sharing.

420
Lesson 7
Maintaining Computer and Network Systems (MN)

Maintaining computer system and network increases effectiveness and save you the hassle
and cost associated with major repairs. However, it is important to be aware of how to implement it
accordingly.
In this lesson, by learning when maintenance is practical and developing a scheduling strategy,
you can set up maintenance strategies that are useful to your computer system and network.

Read and Learn


Maintenance of Computer Systems and Networks

Procedures in Planning and Conducting Maintenance


ü Check power or grounding.
ü Check all cables.
ü Controllers are susceptible to noise, do not install next to power supply.
ü Do a thorough media scan and reformat, sparing out all previous and new hard errors.
ü Scan for virus infection.
ü Consider the use of diagnostic and maintenance software.

Identification and Diagnosis of Faulty Computer and Network Systems


A computer network may fail to function properly for many different reasons. Understanding
basic network troubleshooting methods in various situations will help you recover quickly on home
networks and elsewhere.
1. Identify the symptoms and potential causes. Identify and determine the nature of the
problem.
2. Identify the affected area. Gather detailed information.

421
3. Establish what has changed. Find any connectivity problem or error that appears.
4. Establish the most probable cause. Use diagnostic tools if required.
5. Determine if escalation is necessary. If connectivity error is outside of the scope call for
the needed entity.
6. Document the solution and process by describing the error conditions and steps that has
taken for a solution.

Tools and Testing Equipment

Computer System Anti-static strap

Philips Screw Driver Long Nose Pliers

Flat Screw Driver Software Installer

Precision Screw Driver Antivirus Installer

PC Specifications
Personal computer specification covers the most important parts of the new system. Below is a
sample specification:

Manufacturer Type: Dell, Compaq, HP or other good brands


Operating system Windows XP, Windows Vista, Windows 7
Processor Manufacturer: Intel or AMD Processor
Type: Intel Core Duo Processor
Speed: 2.0GHZ
Bus Speed: 1000MHZ
Motherboard Form Factor: ATX, Micro-ATX
Chipset: Intel 945G Express
No of PCI Slots: 4
Peripheral Connectors USB 2.0 (2), headphone/speaker out
(Front):
Peripheral Connectors USB 2.0 (5), VGA out, Ethernet (Rj-45), Stereo
(Back): Line-in, Microphone, Speaker/Line out, Serial
and Parallel ports

422
Storage Drives Hard Drive Capacity: 200GB
Hard Drive Interface SATA, 7200RPM
Memory Memory Type DDR2 SDRAM
Installed memory 1GB
Upgradable Up to 4GB
CD/DVD Drives Optical Drive Type DVD-RW
CD Read Speed 52x and so on
DVD Read Speed 8x, 16x and so on
Monitor (Display) Screen type: LCD or CRT Screen
Resolution: 1280 X 1024 or more
Refresh Rate: 60HZ or more
Diagonal size: 17” or more
Video Card Type: Intel Graphics Media Accelerator
Interface Type: Integrated
Video card memory: 256MB
Sound Card Type: Integrated Digital Audio
Interface Type: Integrated
Keyboard USB Enhanced QWERTY keyboard
Mouse PS2/USB Optical 2-Button
Scroll mouse
Speakers Built in Speaker, Integrated
sound speaker
Power Supply Type: 24 pin ATX

Maintain Computer System

Diagnosis and Identification of Faulty Systems


When a network host cannot connect to a desired resource, the following procedures will help
narrow down the cause of the problem:
§ Ping the local loopback address of the network adapter. If there is a reply, the TCP/IP
protocol suite is installed and functioning properly. If not, it might be the drivers are
corrupted or the network adapter is not working.
§ Ping the IP address. Use the command ipconfig to determine the IP address.
§ Ping the IP address of known good host in the subnet to determine the IP address and
subnet mask are valid or the switch or adapter of the router is functioning properly.
423
§ Ping the IP address of the default gateway on a local area network (LAN) if it send data
traffic to remote networks.
§ Run a tracert or any network diagnostic tool and path ping analysis to verify the routers
between the destinations hosts are operating correctly.

Diagnostics Software
Diagnostic Tools is a collection of generic utilities, for day-to-day management of the system
and network. The tools can be used to troubleshoot, debug connectivity issues, packet loss, and
latency in a LAN environment.

Ping : Utility to determine whether a specific IP is accessible in the network. It helps in discovery
of the status of a network device; whether the device is alive or not. Before you ping a device
you can configure the ping settings like number of packets, time to live, size, and timeout.

Ping Scan : Utility to scan a range of IP’s to check if the given range of IP addresses is accessible.
The tool displays the IP Address, the response time, and the DNS name of the discovered device.
This tool uses the basic PING function as a base to perform the scan.

SNMP Ping : Utility to check if a specific IP is SNMP enabled. It helps the network engineers to
know the availability of a device and also provides basic information like DNS name, system
name, location, system type, and system description. Following the SNMP discovery, if required,
more details of the node can be retrieved using SNMP Tools like SNMP walker, MIB Browser, and
SNMP Graph

SNMP Scan: Utility to scan a range of IP addresses to check if the IP Addresses are SNMP enabled
or not. The tool displays the IP address, response time, DNS name, system name, and system type.
Proxy Ping: Utility to remotely initiate a PING test from a router to another IP which is remotely
located. The router acts as the proxy for the target device and responds to the ping request.

Trace Route : Utility to record the route (route is calculated in terms of hops, i.e. number of
routers it crosses) through the network between the sender’s IP and a specified destination IP.
The user can configure the settings, such as number of hops and timeout value.

Repair and Replacement of Faulty System


1. Find out the specific model of your computer.
2. Find the specific network driver you need and see to it that it is an updated version.
3. Run the installer for the driver, overwriting the existing one. Restart the computer and
test the connection.
4. You may opt in manual way in installing the driver which is to remove first the existing
driver configuration.
5. Right click “My computer” and go to “Properties.”
6. Go to the “Hardware” tab and click “Device Manager.”
7. Find the network card device that is not working and click “Uninstall.”
8. The new hardware will prompted immediately that is found, restart the computer if not.
9. It’s always possible that the hardware itself on the network card is faulty. The first thing to
try is simply re-seating the card.

424
Maintenance of Computer Systems
Your computer, like any electrical appliance, requires proper care and maintenance. Here are
some basic PC care tips to help prolong the life of the motherboard and keep it running as best as it
can.
1. Keep your computer in a well-ventilated area. Leave some space between the PC and the
wall for sufficient airflow.
2. Keep your computer in a cool dry place. Avoid dusty areas, direct sunlight and areas of
high moisture content.
3. Routinely clean the CPU cooler fan to remove dust and hair.
4. In places of hot and humid weather you should turn on your computer once every other
week to circulate the air and prevent damage from humidity.
5. Add more memory to your computer if possible. This not only speeds up the system, but
also reduces the loading of your hard drive to prolong its life span.
6. If possible, ensure the power cord has an earth ground pin directly from the wall outlet.
This will reduce voltage fluctuation that may damage sensitive devices.

Procedures in Cleaning Hardware Components


Defragment
ü Reorganizes the file on the disk to optimize disk performance
ü This should not be done when windows is running
ü Cannot be used to optimize network drives or drives created by interlink
ü Should only be started from MS-DOS

Scandisk
ü A disk analysis and repair tool
ü Checks a drive for errors and corrects any problem that it finds
ü Checks and fixes the following areas of the disk

Deleting Temporary Files


1. Click on Start and then Run.
2. In the text box in the Run window, type %Temp% and click OK. A folder full of files and
other folders will appear.
All of the folders and files you see in this Temp folder are no longer being used by Windows
XP and can safely be deleted.
3. To remove individual folders or files, hold down your Ctrl key while left-clicking on each
item you want delete. Release the Ctrl key when you’re finished.
To delete these items, hit your Delete key or choose File and then Delete from the menu.
4. Confirm that you want to delete the files by clicking Yes on the Confirm Multiple File Delete
window that opens.
5. If you’d instead like to remove everything inside the Temp folder, choose Edit and then
Select All from the menu.
425
Note: If you’re prompted that there are hidden files in this folder, just click on OK to
bypass the message. A few hidden files hanging out in the Temp folder probably aren’t
important enough to worry about.
6. Now that all of the files and folders are selected, hit your Delete key or choose File and
then Delete from the menu.
7. Confirm that you want to delete the files by clicking Yes on the Confirm Multiple File Delete
window that opens.
8. After all of the files have been deleted you can close the window and empty your Recycle
Bin, permanently removing the files from your PC.

Tips:
You may receive a Error Deleting File or Folder message while the files are being deleted.
This just means that one of the files is in use by a program right now. Click OK, close all
open programs, and repeat the steps above. If you still receive the message, try restarting
your PC and repeating the process again.

Uninstall Unused Programs


· Click Start, point to Settings, select Control Panel
· Double click on the Add/Remove Programs icon
· Select the unused program and click on the Remove
button

Procedures in Maintaining Network Systems


Repair or Replace of Faulty Systems and Cables
For Systems:
1. Clean out all the junk left behind by browsers. Cookies and cache left behind by browsers
can add up the wasted space in the computer.
2. Search and destroy spyware or viruses on the computer by using anti-virus software.
3. Defragment the hard drive monthly to keep the computer running efficiently.
4. Uninstall programs that are no longer use and other files that are visible in the computer
but not important.
5. Use the msconfig command in the RUN command prompt to open up a window that will
allow to uncheck start up programs that is not in use.
6. Use computers disk management systems.

For Cables:
1. Check cable and wire plug to the computer.
2. Check switch, router, modem and others that is connected to the system, ensuring that
the system function properly.
3. Check the installed hardware and software to the system.

426
Burn in Test Computer System
1. Check the computer parts accordingly.
2. Turn on the computer.
3. Executes command in networking.
4. Test hardware and software installed.
5. Document all the errors.

Inspect and Test Configured/repaired Computer Systems and Networks

Internet Connectivity
Internet connectivity is the connection that connects computers to the Internet enabling users
to access Internet services. There are various type of Internet connectivity. They are the following:
Ø Gateway Access
Ø Dial-up Connection
Ø Leased Connection
Ø DSL/WIFI/Broadband
Ø Cable Modem Connection
Ø VSAT

Troubleshooting Internet connection problems can be a challenge, because there are so many
possible causes. First, try these steps:
• Open Network Diagnostics by right-clicking the network icon in the notification area, and
then clicking Diagnose and repair.
• Make sure that all wires are connected (for example, make sure your modem is connected
to a working phone jack or cable connection, either directly or through a router).
• Reset your modem and router. Remove the power cord from the modem and/or router,
wait at least 10 seconds, and then plug the modem and/or router back in.
• Check your router. Because of the new networking features in Windows Vista, some older
network routers are not fully compatible with Windows Vista and can cause problems.
Source: http://windows.microsoft.com/en-ph

Documentation Tasks
1. Create an equipment maintenance schedule.
2. Create a maintenance checklist.

427
Sample Maintenance Inspection Checklist

MAINTENANCE INSPECTION CHECKLIST


Equipment Type:
Property Code:
Location:
Yes No Inspected Item
1.
2.
3.
4.
5.
6.
7.

3. Perform the computer maintenance task regularly.

Remember These

1. Freeing more space will make your computer perform faster.


2. Know the basic computer maintenance task schedule.
3. Assessment is done through regular inspections.
4. A program varies and may change the computer’s settings and functionality.

Check Your Understanding


A. Demonstrate the following. You will obtain five (5) points for each item.
1. Defragment
2. Scandisk
3. Delete Temporary Files
4. Uninstalled Unused Program

B. Explain.
How is computer maintenance done? Why is there a need to do it regularly?

Research To Do
Using the documentation tasks in the lesson; create a maintenance inspection checklist on the
repaired/inspected computer.

428

You might also like