Professional Documents
Culture Documents
Do you have a wish that one day you will become a successful computer technician and run
your own computer business? Having knowledge and skills in the use of tools and equipment in
computer hardware servicing will help you a lot in achieving this dream of yours.
Get Ready
In computer hardware servicing, you use tools and materials. Knowing the various uses of these
tools and how to operate them are basic skills which should be learned before handling any job.
Aside from acquiring the basic knowledge and skills, one needs practice in using all of these tools
before he/she can operate it effectively with ease and confidence.
Tools used in computer hardware servicing include hardware tools, software tools, organization
tools, and miscellaneous tools.
HARDWARE TOOLS
There are four types of hardware tools used in computer hardware servicing, they are as follows:
A. Electro-static Discharge (ESD) tools
B. Hand tools
C. Cleaning tools
D. Diagnostic tools
345
2. Anti-static mat or ground mat is used by laying the mat on the
working table and clipping the cord to the computer case. This
way the mat will to absorb static electricity, which can cause
damage to computer components.
B. Hand Tools
Hand tools are needed to perform jobs like computer assembling and computer repair. It
can be used manually using a hand or electrically powered. Below are examples of hand tools
used in computer hardware servicing.
1. Needle-nose Pliers, also called long-nose pliers, are
used for gripping, bending, re-positioning and stripping
insulated wire. It is available with or without cutters. Its
uses is not only limited to wire work, because it can also
be used to hold small parts and can go to hard to reach places.
2. Wire Cutter is used to cut and strip insulated wires.
3. Screw Drivers are used to loosen or tighten screws during
cleaning and repair. This is made up of a head or tip, a
mechanism to apply torque by rotating the tip, and some
way to position and support the screwdriver. There are
five types of screwdrivers. These are Flathead, Phillips 1
and 2, 5 Star, and Torx.
Torx Screwdriver
346
7. Flashlight is a hand-held portable powered light source used as a
source of light during repair.
9. Part Retriever is used to hold very small parts that are quite difficult
to be held by the hand.
C. Cleaning Tools
Cleaning is essential in the maintenance and repair of computers.
It is, therefore, very important to familiarize oneself with the cleaning
tools available for use.
1. Soft Cloth is used to wipe dirt around the surface of computer.
Cotton cloth is preferred. Old rags, stiff cloth, and paper towels are not
recommended for use as it may scratch the surface of computer or laptop.
2. Compressed Air is used to remove dust and debris, especially on places that
are narrow or hard to reach.
4. Part Organizer is used to hold small parts like screw, jumpers, and
fasteners and to prevent them from being mixed with other parts or
from being lost.
D. Diagnostic Tools
Diagnostic tools are useful tools for diagnosing computer
problems. Below are examples of diagnostic tools.
347
3. Toner Probe is a two-part tool used to trace and locate cables.
SOFTWARE TOOLS
Software tools or programming tools are considered as the intangible part of a computer
system. It is used to create, debug, maintain, or otherwise support other programs and applications.
These tools are as important as hardware tools in diagnosing computer problems. There are two
software tools used in computer hardware servicing the disk management tools and protection
software tools.
B. Protection Software Tools is used to protect operating system and hardware for possible
damaged caused by malicious attacks. Protection software includes: Windows 7 action center,
anti-virus program, anti-spyware program, and Windows 7 firewall.
348
Organizational Tools
As a computer technician, it is always a challenge to look for ways on how you keep records and
journal on all the services and repairs you have done. The records can be used for future reference.
Part also of good customer service is to provide your customer with detailed list of problems and
repairs done.
Aside from keeping records, Internet is also a very good source of information in looking for
specific hardware problems and possible solutions.
Organizational tools include: personal reference tools such as notes, journal, and history repair
and internet reference tools such as Internet search engines, news groups, manufacturer FAQs, online
computer manuals, online forums and chat, and technical websites.
Miscellaneous Tools
As you go on with your journey towards being a computer technician you will discover
additional items to be added to your toolkit. Examples of these tools are miscellaneous tools that
include:
• Masking tape used for labeling parts during repair;
• Working computer which can be used for downloading, researching, and communicating
with other technicians;
• New computer parts for replacement of worn-out parts during repair; and
• Peripherals.
Complaints:
Action Taken:
Please Evaluate Our Service(kindly check):
Excellent Very Satisfactory Satisfactory
Poor
Comments:
349
Performed by:___________________________
Signature over Printed Name
Requested by:___________________________
Signature over printed Name
Approved by :___________________________
Signature over printed Name
Borrower’s Slip
350
Maintain Hand Tools, Equipment, and Peripherals
Tools, equipment and peripherals used in computer hardware servicing should be maintained
to make sure of its efficiency and for keeping its life long. Below are simple ways on how one can
achieve success in taking care of tools while working and storing.
Hand Tools:
• Clean dirt and debris from tools after each use.
• Lightly sand rough wooden handles and apply linseed oil.
• Replace loose handles.
• Replace cracked or broken handles on files, hammers, or screwdrivers before storing.
• Protect surfaces of cutting tools in storage.
• Store hand tools in a clean, dry storage area
• Perform basic preventive maintenance
Power tools:
• Read and follow the maintenance schedule in the owner’s manual for each piece of power
equipment.
351
• All portable hand-held electrical tools and equipment should be grounded or double-
insulated
• Check electric cords and connections on electric-powered tools. Repair or replace
damaged wiring or frayed cords promptly.
• Store power tools in a clean, dry storage area when not in use.
Equipment:
• Store equipment in a clean dry storage area.
• Clean equipment after each use.
352
Remember These
1. Tools used in computer hardware servicing include hardware tools, software tools,
organization tools, and miscellaneous tools.
2. There are four types of hardware tools used in computer hardware servicing. They are:
Electro-static discharge (ESD) tools, hand tools, cleaning tools, and diagnostic tools.
3. There are two software tools used in computer hardware servicing the disk management
tools and protection software tools.
4. Organizational tools include: personal reference tools, such as notes, journal and history
repair, and Internet reference tools, such as Internet search engines, news groups,
manufacturer FAQs, online computer manuals, online forums and chat, and technical
websites.
5. Miscellaneous tools are additional items to be added to your toolkit which include:
masking tape used for labeling parts during repair; working computer, which can be used
for downloading, research, and communicate with other technicians; new computer
parts for replacement of worn-out parts during repair and computer peripherals.
6. A job order or work order form is a written contract stating work to be done according
to specified requirements, within specified time frame and cost estimates issued by a
technician or a company to the customer.
7. Requisition and a borrower slip are official forms used by technician or company either in
monitoring or inventory of tools borrowed and materials used during repair.
8. Tools, equipment, and paraphernalia used in computer hardware servicing should be
maintained to make sure of its efficiency and for keeping its life long.
9. To prevent hazards associated with the use of tools and equipment one must observe
safety precautions.
1. ____________________
____________________________________________________
2. ____________________
____________________________________________________
____________________________________________________
353
3. ______________________
____________________________________________________
4. ______________________
____________________________________________________
5. ______________________
____________________________________________________
6. ______________________
____________________________________________________
7. ______________________
____________________________________________________
8. ______________________
____________________________________________________
9. ______________________
____________________________________________________
10. ______________________
____________________________________________________
B. Explain:
1. How do you maintain the efficiency of each tool in computer hardware servicing?
2. Why is it important to know the functions of each tool in computer hardware servicing
and how they are handled properly?
3. How do requisition slip, job order slip, and borrower’s slip differ from each other?
4. Why is it important to check tools and their parts before and after using them?
354
5. Why is cleaning tools and equipment important before storing it?
6. Why is it necessary to observe precautionary measures while working?
Research To Do
1. Divide the class into small groups of four students or five students. Then plan on a role
play or dramatization showing the functions and uses of each tool. Allow the audience to
give their observations after the play.
2. Ask the students to make an album showing the common tools, equipment, and materials
used in computer hardware servicing.
3. Divide the class into small groups of four students or five students. Then plan on a role
play or dramatization showing how to accomplish the job order slip, borrower’s slip, and
requisition slip. Allow the audience to give their observations after the play.
4. Role-play practices in (a) checking, (b) storing, and (c) maintenance of tools and equipment.
Allow each group to write their own script highlighting how each process is carried out in
an actual setting. Create scenarios on actual checking, storing, and maintenance of tools
and equipment.
355
Lesson 2
Perform Mensuration and Calculation
This lesson emphasizes the importance of knowing the types of computer components to be
measured and knowing how to use the correct specifications as specified in the operating system of
the computer.
356
2. Hit the Command+Space bar to open the Spotlight search field.
4. Look at the bottom of the “Activity Monitor” screen. Click on the tab that says “CPU.”
Information about the central processing unit will appear.
Memory is the shortened or other term for high-speed microchip-based data storage of
a computing device. A computer comes with a memory (referred to as main memory) known as
random-access memory or RAM which only stores the data temporarily, then comes its secondary
storage like magnetic hard disks and floppies, or optical storage like CDs and DVDs.
357
RAM is “volatile,” which means it will only retain data as long as your computer is on. On the
other hand, the micro-chip memories used in flash drives and removable card memories are non-
volatile, requiring no power source to retain data.
RAM is necessary to access and run programs. It comes in different types, like DDR3 (double
data rate, third generation) SDRAM, DDR2 (double data rate, second generation) SDRAM, and DDR
(double data rate, first generation) SDRAM. Many older systems use SD (single data rate) SDRAM, fast
page mode (FM), or extended data out (REDO).
ROM or Read-only Memory is used to store a small piece of software called “boot up” program.
It is non volatile meaning the data it contains will never be lost even if there is no power source.
The storage capacity of memory is measured in bytes. RAM has the capacity to hold millions of
bytes of data shown below:
• Megabytes (MB) or 1,000,000 (1 million) Bytes
• Gigabytes (GB) or 1,000,000,000 (1 billion) Bytes
This only means that, if a computer has 2GB of RAM, it can hold up to 2 billion bytes of data and
instructions at any time.
If you want to know your computer’s memory or RAM (Windows users only), here are the steps
to follow:
1. Open System by clicking the Start button, clicking Control Panel, clicking System and
Maintenance, and then clicking System.
2. Under System, you can view the processor type and speed, as well as the number of
processors installed, if your computer uses multiple processors.
Storage vice
De Data apacity
C
358
A megabyte (MB) is 1024 kilobytes, or 1,048,576 bytes…
… about enough to hold a digital picture.
Here is how to compute if you want to determine the bytes being used for in a file or folder:
1. How many bytes are there if a file is 60 KB in size?
1 KB = 1,024 bytes
60* 1,024 = 61,440
2. If a 60 KB file is stored in a 1 MB folder how many files of the same size can be stored in
that folder?
1MB = 1,048,576 bytes
1,048,576/ 61,440 = 17 files
You can use the succeeding tables below as reference for conversion.
bit bit 0 or 1
byte B 8 bits
kibibit Kibit 1024 bits
kilobit kbit 1000 bits
kibibyte (binary) KiB 1024 bytes
kilobyte (decimal) kB 1000 bytes
megabit Mbit 1000 kilobits
mebibyte (binary) MiB 1024 kibibytes
megabyte (decimal) MB 1000 kilobytes
gigabit Gbit 1000 megabits
gibibyte (binary) GiB 1024 mebibytes
gigabyte (decimal) GB 1000 megabytes
terabit Tbit 1000 gigabits
tebibyte (binary) TiB 1024 gibibytes
terabyte (decimal) TB 1000 gigabytes
petabit Pbit 1000 terabits
359
pebibyte (binary) PiB 1024 tebibytes
petabyte (decimal) PB 1000 terabytes
exabit Ebit 1000 petabits
exbibyte (binary) EiB 1024 pebibytes
exabyte (decimal) EB 1000 petabytes
Storage Devices includes: Magnetic storage devices, optical storage devices, and solid-state storage
devices.
A. Magnetic Storage Devices uses tiny magnetized dots to store data.
• Hard drive can be used to store large amount of information up to 1TB.
• Portable hard drive is used to store large amounts of data that can be transported from
one computer to another.
• Floppy Disc is a low capacity removable portable storage medium that can store data up
to 1.44 MB.
360
B. Optical Storage Devices uses patterns of dots that can be read using a light source called a
laser beam to store data. Below are examples of optical storage devices:
• CD-ROM (Compact Disc Read-only Memory) can store up 800MB of data and is used to
hold data that cannot be deleted like software applications or games, music, and e-books.
• DVD-ROM (Digital Versatile Disc Read-only Memory) can store up to 4.7 GB of data and
is used same with CD-ROM but is more popularly used in storing high-quality video
because of its high capacity in storing data.
• BLU-RAY – this is made as replacement for DVDs, which can hold data 25 to 50GB. A dual
layer can hold twice as the single layer.
• HD-DVD (High-density DVD) – this has the capacity to hold data up to 15GB while a dual
layer can hold twice.
• CD-R (CD-Recordable) and DVD-R (DVD-Recordable) – data can be written (burnt) into
the CD-R or DVD-R using a special disc drive called a burner. You can add more data into
the CD-R but you cannot erase these data.
• CD-RW and DVD-RW – one can burn or erase data using this disc, so the disc is reusable.
C. Solid-state Storage Devices uses electronic circuit with no moving parts on it to store data. In
storing data solid-state storage devices uses a special type of memory called flash memory.
• USB Memory Stick or thumb-drives can hold up 16GB of data.
361
Computer Number System
Computer has a unique language that represents data using a binary numeral system. All
information like text, numbers, pictures, audio, etc. can be converted into a computer language
called bits or binary digits, which can either be at two states, 0 or 1. Bit is the basic unit of data the
computer recognizes. Bits are being grouped together to a byte. A byte is equal to 8 bits.
This number is in
base 10
The power indicates
the position of
the number
362
25 / 2 = 12, remainder 1
12 / 2 = 6, remainder 0
6 / 2 = 3, remainder 0
3 / 2 = 1, remainder 1
1 / 2 = 0, remainder 1→ leftmost bit
103dec = 1 1 0 0 1 1 1bin
note: dec=decimal, bin=binary
Here’s another way of converting decimal to binary using binary conversion.
Look at the table below. It shows that DECIMAL 44 is composed of one 32, one 8, and one 4.
The blanks are filled with zeros giving 101100 as the binary equivalent of decimal 44.
Binary Conversion 64 32 16 8 4 2 1
Decimal 44 1 0 1 1 0 0
Refer to the table below for conversion of binary, decimal, and hexadecimal.
363
1010 10 A
1011 11 B
1100 12 C
1101 13 D
1110 14 E
1111 15 F
10000 16 10
Remember These
1. A computer’s processor speed describes the maximum number of calculations per second
the processor can perform, and is given in megahertz (MHz) or gigahertz (GHz).
2. It is said that the larger the number, the faster and more powerful the processor is.
3. A computer comes with a memory referred to as main memory known as random-access
memory or RAM which only stores the data temporarily.
4. RAM is necessary to access and run programs.
5. Different types of RAM are DDR3 (double data rate, third generation) SDRAM, DDR2
(double data rate, second generation) SDRAM, and DDR (double data rate, first generation)
SDRAM.
6. ROM or Read-only Memory is used to store a small piece of software called “boot up”
program.
7. The storage capacity of memory is measured in bytes.
8. Storage devices include: Magnetic storage devices, optical storage devices, and solid-
state storage devices.
9. A magnetic storage device uses tiny magnetized dots to store data.
10. Optical storage devices uses patterns of dots that can be read using a light source called
a laser beam to store data.
11. Solid-state storage devices uses electronic circuit with no moving parts on it to store
data. In storing data solid-state storage devices uses a special type of memory called flash
memory.
12. Computer has a unique language that represents data using a binary numeral system.
13. Binary digits are at two states, 0 or 1.
14. Bit is the basic unit of data the computer recognizes.
15. A byte is equal to 8 bits.
364
Check Your Understanding
A. Matching Type.
Match column A with column B. Write the letter of your answer on the blank before each
number.
A B
_____ 1. 7 A. 1000B
_____ 2. 1kB B. Main memory
_____ 3. 1GB C. 111
_____ 4. Magnetic storage device D. terabyte
_____ 5. Byte E. Basic unit of data the computer recognizes
_____ 6. TB F. It uses tiny magnetized dots to store data
_____ 7. RAM G. Binary digit
_____ 8. Bits H. 1,000,000,000B
_____ 9. 1 or 0 J. 8 bits
_____ 10. 14 I. 1110 K. Binary system
B. Explain.
1. Why does everyone like to have fast processor?
2. What is a bit? A byte?
3. How are data being represented in a computer system?
Research To Do
1. Ask the students to make an album showing the common storage devices or media used
in computer.
2. Find out the following:
a. Name and memory storage capacity of personal computer or laptop you have at
home.
b. Capacity of storage devices or media you have at home.
365
Lesson 3
Prepare and Interpret Technical Drawing
Technical drawing, also known as drafting, is the act and discipline of composing plans that
visually communicate how something functions or has to be constructed. Drafting is the visual
language of industry and engineering.
People who communicate with technical drawings may use technical standards that define
practical symbols, perspectives, units of measurement, notation systems, visual styles, or layout
conventions. These enable a drafter to communicate more concisely by using a commonly understood
convention. Together, such conventions constitute a visual language, and help to ensure that the
drawing is easy to understand.
Power Supplies
Component Circuit Symbol Function of Component
Cell Supplies electrical energy.
The larger terminal (on the left) is positive (+).
A single cell is often called a battery, but strictly, a battery
is two or more cells joined together.
Battery Supplies electrical energy. A battery is more than one cell.
The larger terminal (on the left) is positive (+).
Solar Cell Converts light to electrical energy.
The larger terminal (on the left) is positive (+).
366
DC supply Supplies electrical energy.
DC = Direct Current, always flowing in one direction.
AC supply Supplies electrical energy.
AC = Alternating Current, continually changing direction.
Fuse A safety device which will ‘blow’ (melt) if the current flow-
ing through it exceeds a specified value.
Transformer Two coils of wire linked by an iron core. Transformers are
used to step up (increase) and step down (decrease) AC
voltages. Energy is transferred between the coils by the
magnetic field in the core. There is no electrical connec-
tion between the coils.
Earth A connection to earth. For many electronic circuits this is
(Ground) the 0V (zero volts) of the power supply, but for main elec-
tricity and some radio circuits, it really means the earth. It
is also known as ground.
Switches
Component Circuit Symbol Function of Component
Push Switch A push switch allows current to flow only
(push-to-make) when the button is pressed. This is the
switch used to operate a doorbell.
Push-to-Break This type of push switch is normally closed
Switch (on); it is open (off ) only when the button is
pressed.
367
On-Off Switch SPST = Single Pole, Single Throw.
(SPST) An on-off switch allows current to flow only
when it is in the closed (on) position.
2-way Switch SPDT = Single Pole, Double Throw.
(SPDT) A two-way changeover switch directs the
flow of current to one of two routes accord-
ing to its position. Some SPDT switches
have a central off position and are de-
scribed as ‘on-off-on’.
Dual On-Off DPST = Double Pole, Single Throw.
Switch A dual on-off switch which is often used to
(DPST) switch mains electricity, because it can iso-
late both the live and neutral connections.
Reversing DPDT = Double Pole, Double Throw.
Switch This switch can be wired up as a reversing
(DPDT) switch for a motor. Some DPDT switches
have a central off position.
Relay An electrically operated switch, e.g., a 9V
battery circuit connected to the coil can
switch a 230V AC mains circuit.
NO = Normally Open, COM = Common,
NC = Normally Closed.
Resistors
Component Circuit Symbol Function of Component
Resistor A resistor restricts the flow of current, for ex-
ample to limit the current passing through
an LED. A resistor is used with a capacitor in
a timing circuit. Some publications use the
old resistor symbol:
Variable Resistor This type of variable resistor with two con-
(Rheostat) tacts (a rheostat) is usually used to control
current. Examples include: adjusting lamp
brightness, adjusting motor speed, and
adjusting the rate of flow of charge into a
capacitor in a timing circuit.
Variable Resistor This type of variable resistor with three con-
(Potentiometer) tacts (a potentiometer) is usually used to
control voltage. It can be used like this as a
transducer converting position (angle of the
control spindle) to an electrical signal.
Variable Resistor This type of variable resistor (a preset) is
(Preset) operated with a small screwdriver or similar
tool. It is designed to be set when the circuit
is made and then left without further ad-
justment. Presets are cheaper than normal
variable resistors so they are often used in
projects to reduce the cost.
368
Capacitors
Component Circuit Symbol Function of Component
Capacitor A capacitor stores electric charge. A
capacitor is used with a resistor in a
timing circuit. It can also be used as a
filter, to block DC signals but pass AC
signals.
Capacitor, polarized A capacitor stores electric charge. This
type must be connected the correct
way round. A capacitor is used with a
resistor in a timing circuit. It can also
be used as a filter, to block DC signals,
but pass AC signals.
Variable Capacitor A variable capacitor is used in a radio
tuner.
Trimmer Capacitor This type of variable capacitor (a trim-
mer) is operated with a small screw-
driver or similar tool. It is designed to
be set when the circuit is made and
then left without further adjustment.
Diodes
Component Circuit Symbol Function of Component
Transistors
Component Circuit Symbol Function of Component
369
Audio and Radio Devices
Component Circuit Symbol Function of Component
Microphone A transducer which converts sound to electrical
energy.
Earphone A transducer which converts electrical energy to
sound.
Loudspeaker A transducer which converts electrical energy to
sound.
Piezo Transducer A transducer which converts electrical energy to
sound.
Amplifier An amplifier circuit with one input. Really it is a
(general symbol) block diagram symbol because it represents a
circuit rather than just one component.
Aerial A device which is designed to receive or transmit
(Antenna) radio signals. It is also known as an antenna.
370
Logic Gates
Logic gates process signals which represent true (1, high, +Vs, on) or false (0, low, 0V, off ).
For more information, please see the Logic Gates page.
There are two sets of symbols: traditional and IEC (International Electrotechnical Commission).
371
Basic Elements
1. Schematic diagrams are used to show the details of a system using abstract, graphic symbols
rather than realistic pictures.
2. Charts are used to show data represented by symbols, such as bars in a bar chart, lines in a
line chart, or slices in a pie chart.
372
3. Block diagrams are used for a higher level, less detailed description aimed more at
understanding the overall concepts and less at understanding the details of implementation.
PWM
Signal Pendulum interface
Ethernet
Cable
Pendulum Laptop
Hardware Encoder NDOS Core
Signal
UC Niche
Real- Ethernet
Time Stack
Os
ROM RAM
CPU
Input Device Output Device
Central Processing
Unit
Storage Device
373
5. Loop diagram is used to represent a detailed drawing showing a connection from one point to
control system.
374
2. Detailed Flowchart is used to provide a detailed picture of a process by mapping all of the steps
and activities that occur in the process.
3. Deployment or Matrix Flowchart is used to map out the process by identifying who is doing the
steps. It is done in the form of a matrix, showing the various participants and the flow of steps
among these participants
375
Basic Symbols Used in Flow Charting
Source: http://www.tenouk.com/Module6.html
Remember These
1. Drafting is the visual language of industry and engineering.
2. Electronic symbol is a pictogram used to represent various electrical and electronic devices in
a technical drawing.
3. Schematic diagrams are used to show the details of a system using abstract, graphic symbols
rather than realistic pictures.
4. Charts are used show data represented by symbols, such as bars in a bar chart, lines in a
line chart, or slices in a pie chart.
5. Block diagrams are used for a higher level, less detailed description aimed more at understanding
the overall concepts and less at understanding the details of implementation.
6. Layout plans is a blue print or a master plan of a project.
7. Loop diagram is used to represent a detailed drawing showing a connection from one point to
control system.
8. A flowchart is used to graphically show how a process works, showing, at a minimum, the
sequence of steps.
9. Three types of flow chart are high-level or top-down flowchart, detailed flowchart, and
deployment or matrix flowchart.
376
Check Your Understanding
A. Identification.
Identify the name of the symbols being asked for. Write the correct answer on the space
provided for.
_________________1.
_________________2.
_________________3.
_________________4.
_________________5.
_________________6
_________________7.
_________________8.
_________________9.
_________________10.
377
B. Explain.
1. Why is it important to know the different symbols used in electricity and electronics?
2. How do high-level or top-down flowchart, detailed flowchart, and deployment or matrix
flowchart differ from each other?
Research To Do
1. Divide the class into small groups of four students or five students. Then plan on a role
play/dramatization showing the three types of flow chart. Allow the audience to give
their observations after the play.
2. Ask the students to make an album showing the common symbols used in electronics
and electricity.
378
Lesson 4
Installing Computer Systems and Networks (CN)
Get Ready
Now that you learned about computer parts and systems, it is easy to put everything together.
Installing computer systems and networks is easy but can be challenging as well.
In this lesson, you will understand and learn the planning, installing, and testing of computer
systems and networks. You will be able to demonstrate the correct process of it.
Get Ready
Installation or the so-called “set up” of a computer is the process to perform of having the
program ready for execution. This process varies for every computer and every program. Operating
systems comes with an installer which is a specialized program responsible for doing the installation
process. It also involves code being generated from the installation files to be transferred to a new file
on a particular computer.
Regardless of the size of the computer, it is only hardware without software. Like a car without
fuel, hardware remains immobile and unproductive without programs to tell it what to do.
In general, there are two categories of software: system software and applications software.
Both types of software are necessary for the computer’s operation.
COMPUTER SOFTWARE
System oftware
S Application Software
operating systems application packages
language translators customized programs
utilities
379
System software oversees the internal operations of the various hardware components and
is usually supplied by the computer manufacturer. Application software directs the computer to
execute specific jobs. It is a set of programs that directs the computer to solve particular problems
or applications. Application software is said to be user oriented. This means that it responds to what
the user wants done. System software is more computer-oriented since it takes care of what must be
done in order for the computer to work. It is not concerned with the user’s requests; it only deals with
the functioning of the computer.
Workplace Hazards
Hazard is anything that makes potential harm in the workplace. Common types are:
There are scores of input devices. New ones are being developed and old ones are being refined
constantly. Any list of input devices will be incomplete. But input devices are crucial.
Keyboards
Keyboard input is used for all sizes of computers from the largest supercomputers to the
smallest laptops. The data entry process is just like typing on a typewriter. The arrangement of keys is
the same, and many people are most comfortable with this traditional form of input.
Touch Screens
A variation on that type of menu requires the user to merely touch the option that is to be used.
This is touch screen input. Touch screens are easy to use, and they are less threatening than asking
the user to type in data. But their use is limited. A person’s finger is large compared to the size of a
character on the screen; and the only input allowed is a choice of items on the screen. If the user
wants respond in some other terms, it is not allowed.
381
A digitizer pad is attached to the computer terminal. The pad is a flat surface often marked off
in a grid. The “puck” is moved over this pad until it is positioned at a necessary point. Then a button
on the puck is pushed or clicked. The point appears on the screen. Another point is selected and line
appears between them.
Output
The term output refers to the information that comes from computers. Output can appear in
various forms. Computer output can be permanent or temporary or it can take the form of an action
performed. Perhaps the most common forms of output are screen displays and printouts. Screen
displays are temporary; they are referred to as soft copy. Printouts are considered permanent, and
are sometimes termed hard copy.
Temporary
A computer screen is often called CRT screen. CRT stands for Cathode Ray Tube. Another type of
computer screen is LCD. Another type of temporary output is voice response system. The computer
system actually speaks its output through a speech synthesizer. The voice of the computer is output
from the program.
Permanent
The major output device of this type is the printer. You’ve seen a lot of computer generated
printing, and you’ve noticed that some of it look better than others. This quickly leads you to conclude
that there are different kinds of printers.
Impact Printers
Impact printers function like typewriters. A mechanical hammer presses against a ribbon, and
this leaves an inked impression on the paper which is on the other side of the ribbon. The most
common impact printers are dot matrix printers.
A daisy wheel printer is named for the shape of the printing element. The letters are fully
formed and positioned at the end of flexible fingers radiating from a central hub. Band printers have
the letters and symbols arranged on a continuous loop that spins at very high speed. Drum printers
are line printer with characters arranged in circles around a cylinder or drum.
382
Non-impact Printers
Electronic or photographic techniques are used by non-impact printers. These printers use
thermal, electrostatic, laser and other methods to create their images. Generally, non-impact printers
are quieter and faster than impact printers. They form images without using a ribbon.
Software
The sets of instructions that describe to computers the operations they are to perform are
called software. Software may also be called computer programs. Specific software is designed to
instruct the computer in the method of solution for specific problems. Other software may be more
general and can be used in several different situations.
Procedures
Procedures are systematic courses of action that help people use data and equipment. With
clearly stated procedures, people know what needs to be done and how to do it. New users can refer
to the procedures to learn how the work of the computer system is done.
Hardware
Hardware is the actual computing equipment. It’s the physical machinery. The computer itself
is hardware. Other types of hardware are used to enter data into the system, to record the results of
the calculations, and to store the data and the programs. The hardware components of a computer
system are interconnected. They may be a combination of electronic and mechanical services. The
hardware is the most evident part of the system, since it is concrete and readily visible. It may appear
to be the most expensive part of the system, but there are other costs that can’t be measured as easily
as the price of hardware.
383
Data
Data are facts and figures or unprocessed information. Data items are not very meaningful
until they are combined and processed to form information. The raw data is fed into the computer
which follows the software directions for processing it. The result should be usable information.
Complete and correct data are essential to produce valid information. People use computers to
obtain information. The foundation of information is data. Examples of data would include a school’s
records of subjects taken by a student and grades earned in those subjects. It is easy to see the data
is essential for business to function. In fact, collections of data are major assets in large organizations
and for individuals.
People
People build and control computers systems which are used in making decisions and solving
problems. People make decisions about what the components of the computer system will be. They
select both the hardware and the software. The procedures are written by people. People supply the
data to the system. People are often referred to as users because they utilize the system.
Networking Devices
LAN is a collection of computers interconnected to communicate and share resources, such as disk
storage, printers and modems. LAN stands for Local Area Network.
LAN Terms:
Network Node – a device connected to a network.
384
Print Server – a network software running on a computer dedicated
to printing or is specialized network interface device (a small box
which connects one or more printers to the network cable.
Needle-nose pliers
These are also called as long-nose pliers, pinch are cutting and
gripping pliers used by electricians and other tradesmen to bend, re-
position, and cut wire.
Work space
This refers to the area that contains a space wherein the repair takes place.
• Useful and Optional Tools
385
Tester – used for testing and diagnosing hardware failure. This is
especially useful in testing power supply failure by reading the
amount of voltage that it gives in a computer.
386
Read the manual and follow directions.
Plan cabling.
387
Systems Specification
388
BIOS System that support the hardware parameters of the system in the CMOS
on the motherboard
• Installing System
After checking that your system meets the requirements, install the software according to the
instructions found in the user’s manual. The first step is to insert the bootable disk in the media.
Next, download, unpack, and install necessary program. When you reach the step that instructs
to start the Set-up Wizard, proceed to the next section of the installation.
• Installing Windows
After checking installing the system, install the software according to instructions and set up
wizard of the disk.
• Installing Other Programs
After the Windows has finished with the installation, it is now time to install the programs that
you need.
Networking
Several computers can be connected in a network. The computers share data files and peripherals
and can communicate with each other. While networking and timesharing both involve multiple
users and sharing peripherals, they are totally different concepts. Timesharing use one computer and
connects multiple terminals. But the users are all accessing a single computer. Networking links a
number of computers together. There are several different ways to organize a network, but the user
is always working on an independent computer which can access information and peripheral devices
through the network.
389
Designing a LAN
• To design a useful network, you must figure out what you need and predict what you will need
in the future.
• Rule suggests that good network design always builds in a little extra horse power for increased
demands.
• Try analyzing what the organization actually does and what the employee do.
LAN Cables
390
Two Simple Rules:
1. When the devices are the same, then crossover cable is used.
2. When devices are different, straight cable is used.
Source: http://www.computercablestore.com/straight-through_crossover_rollover.aspx
Source: http://www.petri.co.il/csc_the_basics_of_ethernet_cabling.htm
Steps in Putting up a LAN
1. Plan the physical layout and do the wiring.
2. Prepare the hardware.
3. Install the server software.
4. Generate the shells for the workstation and install them.
391
5. Create the entire user and set up their security and trustee rights.
6. Finally, document the network.
Remember These
392
Check Your Understanding
A. Choose your answers from the box. Identify each question.
__________ 1. Generally defined as instructions that direct a computer to process data.
__________ 2. A type of system software which oversees coordination and control of
computer system’s resources.
__________ 3. Local Area Network
__________ 4. A computer is the process to perform of having the program ready for
execution.
__________ 5. Oversees the internal operations of the various hardware components and is
usually supplied by the computer’s manufacturer.
__________ 6. Said to be user oriented.
__________ 7. Performs standard processing tasks.
__________ 8. Card install in the machine to make the physical connection to the network.
__________ 9. A device connected to a network.
__________ 10. A user’s computer which runs everyday application.
B. Explain.
What are the two major types of software? Why is software needed?
Research To Do
Make a diagram or illustration on the simplest type of connection with a LAN attached to a
computer.
393
Lesson 5
Diagnosing and Troubleshooting Computer Systems (DT)
In this lesson, you’ll take a closer look at how a computer works. Specifically, you’ll be
introduced to computer diagnosing and troubleshooting. The computer is present in everyday life
to an unprecedented degree. When we talk about computer, we refer to the physical equipment that
makes up a computer system.
By the end of this lesson, you’ll have expanded both your vocabulary and your understanding
of computer systems.
After assembling the computer for the first time you will experience some start-up problems.
Before calling for technical support or returning for warranty, this lesson may help you address some
of the common questions using some basic troubleshooting tips.
Plan and prepare for diagnosis of computer systems errors
394
POST (Power-on Self-test) – a series of diagnostic test that run automatically when a computer is
turned on. The actual tests can differ depending on how the BIOS is configured.
BIOS – contains all the codes required to control the keyboard, display adapter and screen, disk
drives, serial communication ports and a number of miscellaneous functions.
General Errors
Ø Power and grounding
Ø Cable error
Ø Controllers
Ø Slowing down system speed or bus speed
Ø RFI problem
Ø Media scan and reformat, sparing out all previous and new hard errors
395
Diagnose and Configure Computer Systems and Networks
396
• System Logo: the logo of the BIOS company, or in some cases, the
computer maker or motherboard manufacturer
• The BIOS Serial Number: this is normally located at the bottom of the
screen since BIOSes are highly customized to the particular motherboard,
this serial number can be used in many cases to determine the specific
motherboard and BIOS version being used.
397
Computer Systems and Network Configuration
Client Server
Security Protection
Allow to unload a lot of file server overhead
Allow to unload a lot of printing overhead
Reduce both network traffic and processing time to retrieve
information from the database
Connection
PC Connection Path
Method
Serial port (ppp0) PPP ⇔ modem ⇔ POTS ⇔ dial-up access point ⇔ ISP
Ethernet port (eth0) PPPoE/DHCP/Static ⇔ BB-modem ⇔ BB service ⇔ BB access point ⇔ ISP
Ethernet port (eth0) DHCP/Static ⇔ LAN ⇔ BB-router with network address translation
(NAT) (⇔ BB-modem …)
398
List of Network Connection Acronyms
acronym meaning
POTS plain, old telephone service
BB broadband
BB-service e.g., the digital subscriber line (DSL), the cable TV, or the fiber to the premises
(FTTP)
BB-modem e.g., the DSL modem, the cable modem, or the optical network terminal (ONT)
LAN local area network
WAN wide area network
DHCP dynamic host configuration protocol
PPP point-to-point protocol
PPPoE point-to-point protocol over Ethernet
ISP Internet service provider
When the power is on, fans are running but there is no display:
§ Make sure the monitor is turned on and the monitor cable is properly connected to the
computer.
§ Check the VGA adapter card is inserted properly.
§ Listen for beep sounds. If you are using internal PC speaker, make sure it is connected.
o Continuous 3 short beeps: memory not detected
o 1 long beep and 8 short beeps: VGA not detected
399
The computer suddenly shuts down while booting up:
§ The CPU may experience overheating so it will shutdown to protect itself. Apply the
thermal grease onto the CPU heat sink and ensure the CPU fan is well-connected with
the CPU heat sink. Check if the CPU fan is working properly while the system is running.
§ From the BIOS setting, try to disable the fan function to let the fan run at default speed.
Doing a load optimized default will also disable the fan.
Wiring Techniques
• Before you can build or design, you will need to recognize how to use proper wiring
techniques in order to start connecting simple circuits.
• Learning these techniques will ensure that you are following proper electrical safety
procedures.
Choosing Gauges:
• The most important wiring practice is to observe proper wiring sizes.
• Failure to choose the correct size can result in marginal performance of your circuit or
even overheating of your wires or connectors.
• Always use one size larger, if possible.
400
Wire Size for a 3% Voltage Drop in 12 Volt circuits
Conductors:
• Conductors are defined as materials that allow
the flow of electric current.
• Metals are usually good conductors while non-
metals are not.
• The most common conductor used in electrical
wiring is copper.
Insulators:
• An insulator is materials that has few, if any, free
electrons and resists the flow of electrons.
• No material has been found to be a perfect
insulator, but common insulators include air,
glass, rubber, plastic, paper, and porcelain.
• An advantage of using insulators in circuits is
that they provide the ability to place wires close
together without the risk of a short circuit.
401
Wire Terminals and “Quick Connects”:
• Terminals are used to safely and easily connect
wires to a device or load.
• They are usually crimped onto the ends of wires,
or soldered directly onto the terminal.
Power Supplies
Voltages
WARNING!!!
Do not attempt to open the power supply case while the power is on, hazardous voltage are present
on the filter capacitors.
402
Power Supply Connectors
403
The output of such a command looks like this:
Windows IP Configuration
Host name..........: CCM
Primary DNS suffix ...... :
Node type..........: Broadcast
IP routing enabled ........: No
WINS proxy enabled ........: No
404
• ping the computer used as gateway on the local area network, that is, the computer
sharing its Internet connection. It usually has the address 192.168.0.1:
ping -t 192.168.0.1
• ping the service provider’s gateway. The address of the service provider’s gateway can be
retrieved using the ipconfig command on the computer being used as gateway on the
local area network;
• ping the service provider’s name servers . The address of the service provider’s DNS
servers can be retrieved using the ipconfig command on the computer being used as
gateway on the local area network;
• ping a machine on the internet network, for example:
ping -t 193.19.219.210
• ping a domain name, for example:
ping -t www.commentcamarche.net
Remember These
1. A fundamental concept of memory is that memory is divided into many storage areas.
2. The control unit may need to retrieve or read the data from an address more than one in
the process of executing program instruction.
3. In choosing a network operating system; look for market acceptance and market share
above else.
4. It is best to use the same configuration in all machines.
5. It is best to use same brand of card in the entire network.
B. Explain.
1. Why is it suggested to use same brand of card for the entire network?
2. Why is it best to use the same configuration in all machines?
3. Why is it important not to open the power supply case while the power is on?
405
Research To Do
Do the following at home.
Directions: Write in the provided blank space the correct answers after determining the output
voltages of the following. Write down your observation.
1. Switch on the power supply. Check the output voltage.
1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________
3. Connect the motherboard to the power supply without the two drives. Check the output
voltage.
1. orange = _______________ 4. Yellow = _______________
2. red = __________________ 5. White= ________________
3. blue = _________________
406
Lesson 6
Configuring Computer Systems and Networks (CC)
With the previous lesson, it is hoped that you learned the basic of installing computers systems
and networks, common computer errors, installing equipment/devices and system, and conducting
test, diagnosing, and troubleshooting.
In this lesson, you will be able to demonstrate understanding of the underlying concepts and
principles in configuring computer systems and networks.
What is a Screwdriver?
A screwdriver intensifies the tool designed for turning an object that is placed into the screw’s
head. This consists of several tip designs for special function. There are two most common type of
screwdriver: the standard (also called flat, flared, or straight) and the Phillips screw(X-shaped).
407
Using a Screwdriver
First, select the appropriate tip and size of the object to use the screwdriver. Inserting the driver
tip into the head of the screw to be pulled out and turning it clockwise while applying pressure on
the handle.
What is a Pliers?
An instrument used for bending wires, holding small objects and is small with a long jaws.
Using a Pliers
Choosing the right tool for the job should be of good quality; this kind of common hand tool is
for gripping, bending, locking, and cutting.
408
Configure Computer Systems and Networks
HUB
Networks using a Star topology require a central point for the devices to connect. Originally,
this device was called a concentrator since it consolidated the cable runs from all network devices.
The basic form of concentrator is the hub. As shown
in Figure; the hub is a hardware device that contains
multiple; independent ports that match the cable type of
the network. Most common hubs interconnect Category
3 or 5 twisted-pair cable with RJ-45 ends, although Coax
BNC and Fiber Optic BNC hubs also exist. An active hub
strengthens and regenerates the incoming signals before
sending the data on to its destination. Passive hubs do
nothing with the signal.
Ethernet Hubs
An Ethernet hub is also called a multiport repeater. A
repeater is a device that amplifies a signal as it passes through
it, to counteract the effects of attenuation. If, for example, you
have a thin Ethernet network with a cable segment longer
than the prescribed maximum of 185 meters, you can install
a repeater at some point in the segment to strengthen the
signals and increase the maximum segment length. This type
of repeater only has two BNC connectors and is rarely seen
these days.
409
Unlike a hub that uses a logical bus topology over a physical star, the MAU uses a logical ring
topology over a physical star.
When the MAU detects a problem with a
connection, the ring will beacon. Because it uses a
physical star topology, the MAU can easily detect which
port the problem exists on and close the port, or “wrap” it.
The MAU does actively regenerate signals as it transmits
data around the ring.
Switches
Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-
layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This
information allows switches to repeat incoming data frames only to the computer or computers to
which a frame is addressed. This speeds up the network and reduces congestion.
Bridges
A bridge is used to join two network segments together;
it allows computers on either segment to access resources
on the other. Bridges can also connect networks that
run at different speeds, different topologies, or different
protocols. But they cannot, join an Ethernet segment
with a Token Ring segment, because these use different
networking standards. Bridges operate at both the
Physical Layer and the MAC sub-layer of the Data Link
layer.
Routers
Routers are networking devices used to extend
or segment networks by forwarding packets from one
logical network to another. Routers are most often used
in large internetworks that use the TCP/IP protocol suite
and for connecting TCP/IP hosts and local area networks
(LANs) to the Internet using dedicated leased lines.
Routing Tables
Routers contain internal tables of information called routing tables that keep track of all known
network addresses and possible paths throughout the internetwork, along with cost of reaching each
network. Routers route packets based on the available paths and their costs, thus taking advantage
of redundant paths that can exist in a mesh topology network.
410
A router can’t forward a packet to all possible destinations in the way that a bridge can.
• Static routers: These must have their routing tables configured manually with all network
addresses and paths in the Internet work.
• Dynamic routers: These automatically create their routing tables by listening to network
traffic.
• Routing tables are the means by which a router selects the fastest or nearest path to the
next “hop” on the way to a data packets final destination. This process is done through the
use of routing metrics.
• Routing metrics which are the means of determining how much distance or time a
packet will require to reach the final destination. Routing metrics are provided in different
forms.
• Hop is simply a router that the packet must travel through.
• Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the
router selects a route based on tick and hop metrics, it chooses the one with the lowest
number of ticks first.
You can use routers, to segment a large network, and to connect local area segments to a single
network backbone that uses a different physical layer and data link layer standard. They can also be
used to connect LANs to a WANs.
Brouters
Brouters are a combination of router and bridge.
This is a special type of equipment used for networks
that can be either bridged or routed, based on the
protocols being forwarded. Brouters are complex, fairly
expensive pieces of equipment and as such are rarely
used. A Brouter transmits two types of traffic at the exact
same time: bridged traffic and routed traffic. For bridged
traffic, the Brouter handles the traffic the same way a
bridge or switch would, forwarding data based on the
physical address of the packet.
Gateways
A gateway is a device used to connect networks using different protocols. Gateways operate at
the network layer of the OSI model. In order to communicate with a host on another network, an IP
host must be configured with a route to the destination network
Examples:
• E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol
(SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its destination
• Gateway Service for NetWare (GSNW), which enables a machine running Microsoft
Windows NT Server or Windows Server to be a gateway for Windows clients so that they
can access file and print resources on a NetWare server
• Gateways between a Systems Network Architecture (SNA) host and computers on a TCP/
IP network, such as the one provided by Microsoft SNA Server
• A packet assembler/disassembler (PAD) that provides connectivity between a local area
network (LAN) and an X.25 packet-switching network
411
CSU/DSU (Channel Service Unit / Data Service Unit)
A CSU/DSU is a device that
combines the functionality of a
channel service unit (CSU) and
a data service unit (DSU). These
devices are used to connect a LAN
to a WAN, and they take care of all
the translation required to convert
a data stream between these two
methods of communication. A DSU
provides all the handshaking and
error correction required to maintain a connection across a wide area link, similar to a modem. A CSU
is similar to a DSU except it does not have the ability to provide handshaking or error correction.
Data Encapsulation
The network interface adapter and its driver are responsible for building the frame around the
data generated by the network layer protocol, in preparation for transmission.
412
Data Buffering
Network interface adapters transmit and receive data one frame at a time, so they have built-in
buffers that enable them to store data arriving either from the computer or from the network until a
frame is complete and ready for processing.
Serial/Parallel Conversion
The communication between the computer and the network interface adapter runs in parallel,
that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications,
however, are serial (running one bit at a time), so the network interface adapter is responsible for
performing the conversion between the two types of transmissions.
Network Protocols
A networked computer must also have one or more
protocol drivers (sometimes called a transport protocol
or just a protocol). The protocol driver works between the
upper-level network software and the network adapter
to package data to be sent on the network.
Modems
A modem is a device that makes it possible for
computers to communicate over telephone lines. The word
modem comes from Modulate and Demodulate. Because
standard telephone lines use analog signals, and computers
digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the
receiving end must then demodulate the analog signals
413
into digital signals. Modems can be external, connected to the computers serial port by an RS-232
cable or internal in one of the computers expansion slots. Modems connect to the phone line using
standard telephone RJ-11 connectors.
Firewalls
In computing, a firewall is a piece
of hardware and/or software which
functions in a networked environment to
prevent some communications forbidden
by the security policy, analogous to
the function of firewalls in building
construction. A firewall has the basic task
of controlling traffic between different
zones of trust.
414
In reference to the layers where the traffic can be intercepted, three main categories of firewalls
are:
• Network layer firewalls (e.g., IPtables);
• Application layer firewalls (e.g., TCP Wrapper); and
• Application firewalls, e.g, restricting FTP services through /etc/ftpaccess file.
Depending on whether the firewalls track packet states, two additional categories of firewalls
are:
• Stateful firewalls; and
• Stateless firewalls.
Application-layer Firewalls
Application-layer firewalls work on the application level of the TCP/IP stack (i.e. all browser
traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They
block other packets (usually dropping them without acknowledgement to the sender). In principle,
application firewalls can prevent all unwanted outside traffic from reaching protected machines.
Proxies
A proxy device (running either on dedicated hardware or as software on a general-purpose
machine) may act as a firewall by responding to
input packets (connection requests, for example) in
the manner of an application, while blocking other
packets.
Proxies make tampering with an internal system
from the external network more difficult, and misuse
of one internal system would not necessarily cause
a security breach exploitable from outside the
firewall (as long as the application proxy remains
intact and properly configured).
Internet Protocols
Internet Connection options:
Ø Dedicated Internet access – an actual part of the Internet.
Ø LAN dial-up – dial into an internet access provider and become part of the internet for the
duration of the phone calls.
415
1. Individual PC Dial-up and Terminal Emulation:
The simplest and cheapest type of connection to make, all you need is a computer with
a modem (attached to phone line) and
any of the popular Internet it is a network of networks. telecommunications
packages such as procomm, crosstalk, or
telix.
Home User
ISP’s PPP
ISP’s
server
Modem Network
Telephone
Communication
416
After deciding what kind of Internet connection needed, it is now time to look for a service provider:
1. National Provider
Calling in from road to pick up mail message, this national provider is with toll-free
service.
Network Security
Computer networks and remote access to computers greatly expanded the abilities of
the individual, business, and government by providing wide access to a very broad base of data.
Unfortunately, this tool, with its potential for so many beneficial uses, also provides ample opportunity
for uses that are questionable.
Network security consists of provisions and policies adopted by the network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of the computer network
and its network-accessible resources. Network security is the authorization of access to data in a
network, which is controlled by the network administrator. Users are assigned an ID and password
that allows them access to information and programs within their authority. Network security is
used on a variety of computer networks, both public and private, to secure daily transactions and
communications among businesses, government agencies, and individuals.
417
3. If file sharing is off, click the arrow button to expand the section, click Turn on file sharing,
and then click Apply. If you are prompted for an administrator password or confirmation,
type the password or provide confirmation.
4. If Public folder sharing is off and you want to share files by placing them in the Public
folder on your computer, click the arrow button to expand the section, click Turn on
sharing so anyone with network access can open files or Turn on sharing so anyone
with network access can open, change, and create files, and then click Apply. If you are
prompted for an administrator password or confirmation, type the password or provide
confirmation.
5. If printer sharing is off, and you have a printer you want to share, click the arrow button to
expand the section, click Turn on printer sharing, and then click Apply. If you are
prompted for an administrator password or confirmation, type the password or provide
confirmation.
6. Finally, share the file or printer by doing one of the following:
§ Right-click the file or folder you want to share, click Share, click the arrow, select
the people you want to share with, and then click Share. For more information,
see Share files with someone.
§ Copy the files or folders you want to share to the Public folder on your computer.
To find the Public folder, click the Start button, and then click Documents. In
the Navigation pane, under Favorite Links, click Public. For more information,
see Sharing files with the Public folder.
§ To share a printer, see Share a printer.
If you’re still having trouble sharing files or a printer on a network, make sure Windows Firewall
is not blocking File and Printer Sharing. Here’s how:
1. Open Windows Firewall by clicking the Start button, clicking Control Panel,
clicking Security, and then clicking Windows Firewall.
2. Click Allow a program through Windows Firewall. If you are prompted for an
administrator password or confirmation, type the password or provide confirmation.
3. In the Program or port list, make sure the File and Printer Sharing check box is selected,
and then click OK.
Remember These
1. A properly maintained computer will run smoothly in a substantial high speed regardless
of hardware setup and configurations.
2. Pay special attention to the CPU heat sink, fan and also power supply fan, make sure it is
working.
3. Replace the fan if it stops spinning, try to lubricate the bearing.
4. Be extra careful in plugging USB, LAN cables, speakers, printer and other into the
computer, ports can be easily damaged if does not handle with care.
1. ______________ 2. ______________
3. _____________ 4. ______________
419
5. _____________ 6. ______________
7. _____________ 8. _____________
B. Explain.
1. If a component does not come out easily, why is it recommended not to forcefully remove
it?
2. Why is it important to always handle all parts with care during repair and troubleshooting?
Research To Do
Demonstrate the steps in file and printer sharing.
420
Lesson 7
Maintaining Computer and Network Systems (MN)
Maintaining computer system and network increases effectiveness and save you the hassle
and cost associated with major repairs. However, it is important to be aware of how to implement it
accordingly.
In this lesson, by learning when maintenance is practical and developing a scheduling strategy,
you can set up maintenance strategies that are useful to your computer system and network.
421
3. Establish what has changed. Find any connectivity problem or error that appears.
4. Establish the most probable cause. Use diagnostic tools if required.
5. Determine if escalation is necessary. If connectivity error is outside of the scope call for
the needed entity.
6. Document the solution and process by describing the error conditions and steps that has
taken for a solution.
PC Specifications
Personal computer specification covers the most important parts of the new system. Below is a
sample specification:
422
Storage Drives Hard Drive Capacity: 200GB
Hard Drive Interface SATA, 7200RPM
Memory Memory Type DDR2 SDRAM
Installed memory 1GB
Upgradable Up to 4GB
CD/DVD Drives Optical Drive Type DVD-RW
CD Read Speed 52x and so on
DVD Read Speed 8x, 16x and so on
Monitor (Display) Screen type: LCD or CRT Screen
Resolution: 1280 X 1024 or more
Refresh Rate: 60HZ or more
Diagonal size: 17” or more
Video Card Type: Intel Graphics Media Accelerator
Interface Type: Integrated
Video card memory: 256MB
Sound Card Type: Integrated Digital Audio
Interface Type: Integrated
Keyboard USB Enhanced QWERTY keyboard
Mouse PS2/USB Optical 2-Button
Scroll mouse
Speakers Built in Speaker, Integrated
sound speaker
Power Supply Type: 24 pin ATX
Diagnostics Software
Diagnostic Tools is a collection of generic utilities, for day-to-day management of the system
and network. The tools can be used to troubleshoot, debug connectivity issues, packet loss, and
latency in a LAN environment.
Ping : Utility to determine whether a specific IP is accessible in the network. It helps in discovery
of the status of a network device; whether the device is alive or not. Before you ping a device
you can configure the ping settings like number of packets, time to live, size, and timeout.
Ping Scan : Utility to scan a range of IP’s to check if the given range of IP addresses is accessible.
The tool displays the IP Address, the response time, and the DNS name of the discovered device.
This tool uses the basic PING function as a base to perform the scan.
SNMP Ping : Utility to check if a specific IP is SNMP enabled. It helps the network engineers to
know the availability of a device and also provides basic information like DNS name, system
name, location, system type, and system description. Following the SNMP discovery, if required,
more details of the node can be retrieved using SNMP Tools like SNMP walker, MIB Browser, and
SNMP Graph
SNMP Scan: Utility to scan a range of IP addresses to check if the IP Addresses are SNMP enabled
or not. The tool displays the IP address, response time, DNS name, system name, and system type.
Proxy Ping: Utility to remotely initiate a PING test from a router to another IP which is remotely
located. The router acts as the proxy for the target device and responds to the ping request.
Trace Route : Utility to record the route (route is calculated in terms of hops, i.e. number of
routers it crosses) through the network between the sender’s IP and a specified destination IP.
The user can configure the settings, such as number of hops and timeout value.
424
Maintenance of Computer Systems
Your computer, like any electrical appliance, requires proper care and maintenance. Here are
some basic PC care tips to help prolong the life of the motherboard and keep it running as best as it
can.
1. Keep your computer in a well-ventilated area. Leave some space between the PC and the
wall for sufficient airflow.
2. Keep your computer in a cool dry place. Avoid dusty areas, direct sunlight and areas of
high moisture content.
3. Routinely clean the CPU cooler fan to remove dust and hair.
4. In places of hot and humid weather you should turn on your computer once every other
week to circulate the air and prevent damage from humidity.
5. Add more memory to your computer if possible. This not only speeds up the system, but
also reduces the loading of your hard drive to prolong its life span.
6. If possible, ensure the power cord has an earth ground pin directly from the wall outlet.
This will reduce voltage fluctuation that may damage sensitive devices.
Scandisk
ü A disk analysis and repair tool
ü Checks a drive for errors and corrects any problem that it finds
ü Checks and fixes the following areas of the disk
Tips:
You may receive a Error Deleting File or Folder message while the files are being deleted.
This just means that one of the files is in use by a program right now. Click OK, close all
open programs, and repeat the steps above. If you still receive the message, try restarting
your PC and repeating the process again.
For Cables:
1. Check cable and wire plug to the computer.
2. Check switch, router, modem and others that is connected to the system, ensuring that
the system function properly.
3. Check the installed hardware and software to the system.
426
Burn in Test Computer System
1. Check the computer parts accordingly.
2. Turn on the computer.
3. Executes command in networking.
4. Test hardware and software installed.
5. Document all the errors.
Internet Connectivity
Internet connectivity is the connection that connects computers to the Internet enabling users
to access Internet services. There are various type of Internet connectivity. They are the following:
Ø Gateway Access
Ø Dial-up Connection
Ø Leased Connection
Ø DSL/WIFI/Broadband
Ø Cable Modem Connection
Ø VSAT
Troubleshooting Internet connection problems can be a challenge, because there are so many
possible causes. First, try these steps:
• Open Network Diagnostics by right-clicking the network icon in the notification area, and
then clicking Diagnose and repair.
• Make sure that all wires are connected (for example, make sure your modem is connected
to a working phone jack or cable connection, either directly or through a router).
• Reset your modem and router. Remove the power cord from the modem and/or router,
wait at least 10 seconds, and then plug the modem and/or router back in.
• Check your router. Because of the new networking features in Windows Vista, some older
network routers are not fully compatible with Windows Vista and can cause problems.
Source: http://windows.microsoft.com/en-ph
Documentation Tasks
1. Create an equipment maintenance schedule.
2. Create a maintenance checklist.
427
Sample Maintenance Inspection Checklist
Remember These
B. Explain.
How is computer maintenance done? Why is there a need to do it regularly?
Research To Do
Using the documentation tasks in the lesson; create a maintenance inspection checklist on the
repaired/inspected computer.
428