Professional Documents
Culture Documents
Unit of
Competency : MAINTAIN AND REPAIR COMPUTER
SYSTEMS AND NETWORKS
If you have questions, don't hesitate to ask your facilitator for assistance. Recognition of
List of Competencies
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
LEARNING OUTCOMES:
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
LESSON CONTENT:
1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job
requirements.
2. Tools, equipment and testing devices needed for the maintenance are obtained and
checked for correct operation and safety
3. Materials necessary to complete the work are obtained in accordance with established
procedures and checked against job requirements.
4.OHS policies and procedures are followed in line with job requirements. S.Computer
systems and networks for maintenance are checked against job/service order or
instructions and specifications.
RESOURCES:
LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:
Reader view
Preventive maintenance can be described as maintenance of
equipment or systems before fault occurs.
It can be divided into two subgroups:
-Planned Maintenance -Conditioned-BasedMaintenance.
Overview
Corrective maintenance can include a wide variety of equipment, systems, and situations.
For example, if you are performing preventive maintenance on a line of production
equipment and notice significant wear on a critical part or component, you may initiate a
corrective maintenance order to repair or restore that part within the next month.
If you are responding to an emergency request to repair a heating system in the middle of
winter, you may notice that the HVAC system needs filters cleaned or replaced to
improve efficiency and prevent further heat loss. You can restore the heat during the
emergency call but you may schedule the corrective maintenance order to handle the filter
issue later.
In a public works situation, you may be performing routine roadway repairs when you
notice some signage damage from a recent storm. You can initiate a corrective
maintenance order to restore that signage at a later date.
Benefits of corrective
maintenance
Computer labs are more than just rooms with lots of computers. Care must be taken to
ensure that the lab is easy to access and fulfills its purpose. Learn about the four most
popular computer laboratory layouts and designs used in High Schools and universities.
Many high schools and colleges use computer labs to allow student access to the software
necessary to complete coursework. Computer labs are also used to instruct students on
computer use, programming, and related subjects. However, many institutions give little
thought to the design and layout of the lab. Too often, they simply fill a room with
computers and set up the machines any way they fit inside the room.
The classic classroom computer lab design CUtiroom Computer Lab Layout
serves as the default layout in many High
School and Colleges.
However, it does have two major
advantages. First, it serves as a great • ••• ••••
instruction room where students learn
computer topics from an instructor at the
front of the room. • ••• ••••
With everyone facing the same direction, it
allows instructors to see the faces of the
students with which to read non-verbal • ••• ••••
cues as to whether students are learning
the material or need more help. Second, it
is similar to the layout of other classroom • ••• ••••
environment emphasizing that the students
are there to learn.
One disadvantage of the classroom layout is the need to disturb other students along
the rows of computers as students enter and exit the lab. For labs where students are
coming and going, the classroom layout is not ideal. In addition, the classroom layout
is not conducive to team work. It is difficult for students to work together, especially
on collective projects and in peer-assist teaching models.
design is not compatible with test taking and requires many assistants to monitor
students. Furthermore, this design often takes up more space that other layouts.
INVERTED U-SHAPED COMPUTER LAB LAYOUTS
is reduced if students are entering and exiting individually as in an open lab paradigm
where students can come and go as they please. In addition, this layout takes up the same
amount of space as the U-shaped design. If space is not a consideration, either of the U-
shaped layouts is appropriate.
. CONCLUSION
There are many options when designing the layout of a computer lab. The key is to make
sure form is following function. Thought and planning at the beginning of designing the
lab ensures that students and instructors are satisfied with what the lab offers. Choosing a
sub-optimal layout can negatively affect student learning and reduce the engagement
between instructors and students.
SELF-CHECK 1.1-1
1.
2.
2.
3.
4.
TASK SHEET 1.1-1
Steps / Procedure:
YES NO
CRITERIA
Did you......
Wear your ppe
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
gear" applies to items such as pads, guards, shields, or masks, and others. PPE suits can
be similar in appearance to a cleanroom suit.
The purpose of personal protective equipment is to reduce employee exposure to hazards
when engineering controls and administrative controls are not feasible or effective to
reduce these risks to acceptable levels. PPE is needed when there are hazards present.
PPE has the serious limitation that it does not eliminate the hazard at the source and may
result in employees being exposed to the hazard if the equipment fails.[1]
Any item of PPE imposes a barrier between the wearer/user and the working
environment. This can create additional strains on the wearer; impair their ability to carry
out their work and create significant levels of discomfort. Any of these can discourage
wearers from using PPE correctly, therefore placing them at risk of injury, ill-health or,
under extreme circumstances, death. Good ergonomic design can help to minimise these
barriers and can therefore help to ensure safe and healthy working conditions through the
correct use of PPE.
Practices of occupational safety and health can use hazard controls and interventions to
mitigate workplace hazards, which pose a threat to the safety and quality of life of
workers. The hierarchy of hazard controls provides a policy framework which ranks the
types of hazard controls in terms of absolute risk reduction. At the top of the hierarchy are
elimination and substitution, which remove the hazard entirely or replace the hazard with
a safer alternative. If elimination or substitution measures cannot apply, engineering
controls and administrative controls, which seek to design safer mechanisms and coach
safer human behavior, are implemented. Personal protective equipment ranks last on the
hierarchy of controls, as the workers are regularly exposed to the hazard, with a barrier of
protection. The hierarchy of controls is important in acknowledging that, while personal
protective equipment has tremendous utility, it is not the desired mechanism of control in
terms of worker safety.
PPE means personal protective equipment or equipment you use to guarantee your
(own) safety.
Use PPE always and anywhere where necessary. Observe the instructions for use,
maintain them well and check regularly if they still offer sufficient protection. But when
do you use what type of protection?
These 7 tips will help you on your way
The eyes are the most complex and fragile parts of our body.
Each day, more than 600 people worldwide sustain eye
injuries during their work. Thanks to a
good pair of safety glasses, these injuries could be prevented. Do you come into contact
with bright light or infrared radiation? Then welding goggles or a shield offer the ideal
protection!
3. HEARING PROTECTION
n
Do you work in an environment with high sound levels? In that
case it is very important to consider hearing protection.
Earplugs are very comfortable, but earmuffs are convenient on
the work floor as you can quickly put these on or take them off.
WORST-CASE SCENARIO
Prevention is better than cure. A smart thing is to be prepared for the worst.
A classic first-aid kit is no luxury but a first-aid kit for the eyes can also be an essential
first aid. If the employee comes into contact with chemicals, a safety shower is
mandatory, so that he can rinse the substances off his body at any moment.
PREVENTING ACCIDENTS: PICTOGRAMS
Not only is preparing your workshop for accidents a smart thing to do, it is even smarter
to organise your workshop in such a way that no serious accidents can take place. A
simple way to make your workshop safer is to use pictograms: indicating flammable
materials, the necessary use of hearing protection, indicating emergency exits ...
You can find all pictograms in the ‘Labels & decals’ catalogue under ‘Safety’.
observing the safety requires little effort, but it can have a big influence on your health.
Even at TVH, we work hard every day to create a safe working environment. Our SHE-
advisors put our safety first. They take training courses on a regular basis in order to keep
their knowledge up-to-date. From our expertise, we have composed an assortment of
safety products that contribute to a safe working environment. We offer your protective
equipment from your head to your toes, because TVH also takes care of your safety!
Workplace Safety is one of the major concerns that has been successfully driving the
international industrial protective clothing fabric market. Today, from hard hats to steel-
toed boots, personal protective equipment, often known as PPE, is keeping workers safe
from head to toe. PPE has also been successful in keeping employees safe and has also been
acting as the last line of defence against injury or death.
Development of new products are expected to give the market growth a boost and the
progress is driven by various factors such as growing concern towards workers’ safety
along with stringent governmental regulations, persistent growth in demand for protective
clothing from various end-user industries, and extensive investments in research and
development.
However, the high price of protective clothing and a constant threat of substitution can act
against the growth of the market during the forecast period. Protective clothing in
industries such as oil and gas and pharmaceuticals will offer significant opportunities for
manufacturers and an upsurge in demand from emerging economies such as South Korea,
China, India and Brazil are expected to thrust the growth.
Industrial protective clothing market analysis
Growing workplace hazards and increasing worker safety are the major factors that are
expected to drive industry growth for the next decade in various industrial sectors such as
oil and gas, manufacturing, chemical, and food processing. Plus, increasing industrial
fatalities and awareness towards the health and safety of workers’ is also expected to
contribute to the market growth. In fact, for many industries, it is mandatory to comply
with rules regarding workers’ safety at the workplace. Europe and North America are the
major drivers for industrial protective clothing along with the Asia Pacific and the Middle
East. The stringent regulations to follow the rules and guidelines in these countries are
making it mandatory for industries to take care of their worker’s safety on account of
increasing hazards. Additionally, upper management in most of the industrial firms is
taking proactive measures to uphold workers’ safety at the respective workplace.
Today many companies are putting emphasis on raw materials that offer material features
such as lightweight, higher heat resistance, comfort, and wear and tear resistance. This
initiative is to achieve multi-functionality of protective clothing and increase its
application scope. However, one of the challenging factors can be the rising costs of
crucial materials such as aramid fiber, carbon fiber, and silicates.
In 2015, the global protective clothing market was valued at $8 million. This is expected
to reach $10.2 million by 2022, supported by Compound Annual Growth Rate (CAGR) of
3.6% during the forecast period 2016 to 2022.
Innovative trends in the market
Protective clothing is manufactured from fabrics that help in protecting the workers daily
from being exposed to extreme heat, flame, molten metal, and arc flash. The protective
clothes are designed to prevent contact with hazards or adverse elements of the
environments. Protective clothing markets are mostly categorized based on the material
type, namely, polyamide, aramid and blends, PBI, Polyolefin and blends, UHMW
polyurethane and others. Let’s now take a look at some of the innovative trends in the
industrial protecting market.
Soaring Demand for non-woven PPE: Breathability, comfort, high-tensile strength, and
fire and water resistance are some of the qualities that nonwovens offer. They have also
been playing a pivotal role in protecting medical professionals against the exposure to
bloodborne pathogens, and shielding trained professionals against the risk of chemical
exposure and hazardous materials and conditions.
Wearable technology: Wearable technology is becoming increasingly prevalent in PPE to
enhance safety management and increase productivity at the worksite. The sensors that
monitor gas, chemical, heat, sound, and UV are integrated into PPE and clothing to
improve workplace safety. The technology alerts the users to danger in time for
preventative steps. Wearable technology is also successful in offering long-term cost
savings by preventing accidents on site.
Coldwear, a clever jacket: This jacket developed in Norway, monitors workers’ health
levels when they work in extreme cold. The readings of body temperature, humidity, and
perspiration both inside and outside the suit, along with tracking the location of the
worker are recorded. Coldwear, designed for arctic oil fields, goes a long way in
protecting the workers in a harsh environment by sending information back to a central
point. Furthermore, the clothing can detect gas leaks and other harmful substances which
may endanger your workers.
Multifunctional textile for advanced personal protective equipment: In partnership with
Luna Innovations and Vertical Source, Inc., the Department of Homeland Security
Science and Technology Directorate (S&T) developed a lightweight base ensemble that
could be worn on a daily basis. This protective equipment is capable of providing
protection against multiple hazards for a limited period of time. The multilayer textile
system consists of:
• An antimicrobial textile treatment, a protection against a range of bacteria.
• A chemical protective membrane
• Flame resistance textile layer
• Tear protection layer
Lightweight and breathable clothing: Workers often carry around a lot of gear, and the
last thing they need is a hot and heavy coat. The lighter protective apparel and
equipment is a strong need for most workers across the globe. In fact, this need has
been the driving force behind a significant number of innovations in the textile,
garment and face-shield design. Today, environmentally controlled PPE is another
developing technology that helps in keeping the body’s core temperature
consistent while ensuring that workers are comfortable. These environmentally
controlled PPE have been successful in protecting the workers from heatstroke to
frostbite.
Besides, lightweight garments have gained significance in recent times. The textile
innovations and the availability of high-performance yarns and treatments have
made it possible to produce technically proficient PPE with different levels of
thermal and chemical protection and water and fire resistance. For those
considering cost-effective solutions, the durability of these testifies while ensuring
value for money.
Soaring demand for disposable protective clothing: Used for protection from low to
medium level hazards such as fluid handling in a cleanroom or laboratories,
disposable industrial protective clothing is expected to generate revenue exceeding
$1.3 million by 2022. These products are designed to comply with all the
environmental standards and can be easily disposed of. Some of the areas where
disposable protective clothing can be used are disaster response, hazardous waste
management, specialist laboratories, emergency services, sewage treatment, and
drainage construction.
Choosing not to wear PPE can be dangerous in the workplace when it could keep you
protected. Workplace safety is essential and in-depth knowledge of these various
protection devices can help in preventing hazardous injury.
SELF-CHECK 2.1-1
B.ENUMERATION: List down the PPE 7 tips will help you on your way and
Explain brief of it.
1.
2.
3.
4.
5.
6.
7.
TASK SHEET 2.1-1
ff.
Steps / Procedure:
2.Observe safety and proper sanitation 3.Gather the necessary materrials and
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1
YES NO
CRITERIA
Did you......
Wear your ppe
Put on gloves
UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
2. Voltage Regulator and power supply could cause power failure in the computer
unit.
3. Check the power cords and cable connectors in your computer unit.
5. Check the boot sequence configuration in the advance BIOS (Basic Input /Output
Unit) setup.
• First check the cable connecting to the network card into the network hub.
• Check the back of the computer to see if the network card light is on
Computer diagnostics tools are pieces of software that give you the knowledge you need
to be able to potentially repair your own computer. Some of these tools come built in to
your operating system while others come from 3rd party software developers. Either
way, these tools help save you time and money.
Computer diagnostic tools can be used scan your computer’s hard drive, check your ram
for errors, check cpu temp and give you information about any other devices connected to
your computer. These tools are made to find problems that may be disrupting your
computer’s normal performance. Once a problem is found, you can then plan your repair.
CPU
AMD A6-6400K APU with Radeon(tm) HD Graphics
CPU
% Utilization
Memory
2.7/72 GB (Wo)
Disk 1 (E:)
Ethernet
Not connected
Utilization
Maximum speed:
Ethernet S: 272 R: Sockets:
56.0 Kbps
Cores:
Processes Threads Handles
Logical processors:
0:05:44:13
(2) Fewer details (§) Open Resource Monitor
The first one on our list is built right in to Windows operating systems.
The performance monitor gives you a quick view of vital information related your
computers hardware. From here, you can check out your CPU, Memory,
Disk info and Ethernet information. You can use Performance Monitor to examine
the effects of your running applications in both real time and by collecting data to
check out for later analysis.
100%
1 1 Image PID Description Status Threads CPU Average CPU 's
1 1 ShellExperienceHost.exe 5720 Windows Sh... Suspended 30 0 0,00 "
1 1 SearchUl.exe 6254 Search and C... Suspended 21 0 0,00
n SkypeHost.exe 6233 Microsoft Sk... Suspended 10 0 0,00
1 1 perfmon.exe 7608 Resource an... Running 19 3 7,03
1 1 OpenHardwareMonitor.exe 3152 Open Hardw... Running 6 2 2,11
1 1 OpenHardwareMonitor.exe 5292 Open Hardw... Running 6 2 2,10
□ lnssatt.exe 2320 GFI LanGuar... Running 1,79 60 Seconds 0% 1
12 0
MB/sec
-
Disk ■ 4 KB/sec Disk I/O ■ 1% Highest Active Time
Image PID File Read (B/sec) Write (B/s... Total (B/sec) I/O Priority Response,.. *
System 4 C:\5Mft (M... 0 3,6213,621 Normal 2
perfmon.exe 7603 C:\Windo,., 514 0614 Normal
WMiw'MW'WKImmmlmM
2
perfmon.exe
System
7608
4
C:\Windo,.,
C:\Windo,.,
728
0
0728
953953
Normal
Normal
2
2
o
Network 1 Mbps
SB™ i BBS! SB I,
-
Network ■ 87 Kbps Network I/O P 0% Network Utilization
Image PID Hard Faults/sec Commit (KB) Working Set Shareable [KB] Private (KB) 's
EndpointService. exe 2304 0 226,612 197,496 71,704 125,792
svchost.exe (NetworkService) 816 0 114,632 143,128 63,964 79,164
chrome.exe 5735 0 84,355 146,768 78,340 58,428
chrome.exe 7215 0 75,580 265,452 210,208 55,244
System 4 0 272 49,976 104 49,872
chrome.exe 7528 0 66,876 79,568 30,964 48,604
chrome.exe 2900 0 75,276 114,556 58,548 46,008
chrome.exe 4332 0 73,836 137,472 96,836 40,636
chrome.exe 5924 64,972 107,640 71,768 35,872
0
Windows Resource Monitor is number two on our list. This diagnostic tool is more robust
that Windows Performance Monitor. It is better suited for tracking individual aspects of
CPU, Network, memory and disk usage. This tool gives you an in depth look at what
processes are affecting your CPU, how much memory is being used what is using it,
individual process disk activity and network information like current TCP connections and
what processes are listening on what port.
II. 8% 11.8 %
31.0 *C 31.0 *C
71.3 % 71.3 %
Open Hardware Monitor is a free open source application that runs on Windows and
Linux systems. This diagnostic tool monitors your computers temperature sensors, fan
speeds, voltages, load and clock speeds. If your computer is shutting down by itself,
hanging or crashing, this tool can come in real handy by telling you that your system is
overheating or the fans aren’t working properly
4.Speccy
I Piriform Speccy File View
Help
D =PU
1 Summary
Operating System - AMD A6-6400K Cores
ft Threads Name
CPU Code Name Package
m Technology Specification AMD A6-6400K Richland
Family Socket FM2 (904)
rjvRAM Extended Family Model 32nm
IP Motherboard Extended Model Stepping AMD A6-6400K APU with Radeon HD Graphics
Revision Instructions
Virtualization
Graphics Hyperthread i ng Fan
t§l Storage Speed Bus Speed Stock
Core Speed Stock Bus
Speed
Optical Drives
0
RL-A1
&Audio MMX (+), SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, SSE4A, AMD 64
Supported, Disabled
Not supported
9 Peripherals
1762 RPM
S[ Network 99.8 MHz J
3900 MHz
100 MHz
Average Temperature 59 °C
- Caches
LI Data Cache Size LI Instructions 2x16 KBytes 64
Cache Size L2 Unified Cache Size KBytes 1024 KBytes
— Cores
5.HD Tune
HD Tune Pro is a great tool for HDD and SSD diagnostics . This utility allows you to
benchmark your storage device showing you the minimum, maximum and average
transfer rates along with many other useful tools. The other features of HD Tune include
detailed drive info, error scanning, & drive health. The pro version allows you to check
the health status of multiple drives, offers folder usage info, secure erase, file benchmark,
disk monitor, cache test & extra tests.
Computer diagnostics are meant to serve a vital purpose. They are important tools which
work automatically, with very little effort necessary from the end user. They help you
discover and fix problems within your hard disks and network configurations. Rather
than manually searching for small, hard-
to-find problems on your own, you can simply allow computer diagnostics tools to take
care of your problems for you!
Some PC's have more than one Ethernet (network) connector . Check also the second
link.
2. Router
Common causes of problems:
• router-crash
• failure of router
• interference in a wireless network
The first case is the simplest. If Yours internet connection slowed drastically, or it doesnt
exist, try turn off the router by disconnecting him from power system for several seconds
and plug again. If reboot doesn't help, go to the second point- router failure.
You can very simply and independently verify if the router has failed. Just unplug the
Internet cable from the router (look at the description of the cable connection on the
router) and connect it to the network adapter in your computer. If the computer, was
register in our web, you should see page which you wanted to visit, if not, you will see our
welcome page „Welcome to Sloneczko.net”. These two cases show the router failure. If
nothing show up, it means a breakdown of the network - please contact us immediately.
Another cause of problems with the router is so wide that we will describe it in a separate
chapter.
3. Interferences
Wireless network, so-called wifi is very nice but also very imperfect thing. Theoretically
reach of the wireless network in open space and without any noise is only 150 meters!
Obstacles such as walls, windows and doors cause high damping and decrease of signal
quality. Also interferences of energy networks and other wireless networks (e.g. of our
neighbours) could be possible source of problems.
So what to do to make sure that the problem with speed is caused by weak wifi signal?
• Plug in to the router via cable - plug in the ethernet cable to your computer then plug in
that cable to one of the LAN ports of the router (check description of cable pluging to the
router). If there's no problem on the cable, surely you have problem with wifi connection.
• Plug in ethernet cabel directly to the computer ommiting the router (check the
description of diagnosing of the router’s damage ). If you
see our welcome page “Welcome sloneczko.net” fill in the form on there and
send it to us. When we register your computer as active device you will be able
to check your speed without a router. If it's ok - you have a problem with wifi
• The third method requires some knowledge about the system. You
can check the response time of the router using commend “ping”. You must
know its address to do this. Router address is the address of a gateway on your
computer. Checking the IP address of the router we described in the article
about configuring dhcp in router TP-Link
Now, when you know IP address, type commend “ping” into the dos window
(which is described in the article). You can stop commend executing by pressing
ctrl + c.
If the router was configured by us, surely you received from us the access data. If not ask
person configuring the router for login and password.
After logging into the router go to wireless settings. Remember that in different models of
routers managing panel will be slightly different. In our example, click on the Wireless
(4) then the wireless settings (5).
In the channel menu select the wireless channel. Sometimes before we can find the
channel on which our network is working well we will need to check a few other
channels. Avoid channel 6 (very often used by equipment manufacturers as a default
channel), and extreme ones. You can also select the network at 11 Mbps (b), instead of the
network at 54 Mbps (g). It will increase the transmitter power in our router.
We check our work effect on each channel by checking router response time with the
command “ping” or checking connection speed at network speedtest.
II .Problems with internet when the user doesn't use router.
If you don't have a router in your home you can check external causes described in
chapter I.1. cables. If there aren't any problems with operator's network, the cause of
problems with connecting to the internet may be your computer.
SELF-CHECK 2.1-2
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
List down common Trouble shooting for Computer Units
B.
1.
2.
4.
C.
1.
2.
3.
4.
TASK SHEET 2.1-2
able to diagnosis of computer systems and network function ff. Standard operating
Steps / Procedure:
procedures below
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-2
YES NO
CRITERIA
Did you......
Wear your ppe
Is it hardware or software
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-3
LEARNING OBJECTIVES:
If you have the opportunity, make a full disk image (a 'snapshot' of your entire hard
drive) immediately after reloading the OS and all your programs. This gives you a clean
starting point to go back to if you need to reload everything
again, and will be much faster than redoing everything manually. Acronis True Image 11
is good for the job.
Beyond just getting the dust out, here are some other steps to
consider: Dust often collects inside the CPU and video card
heatsinks, consider disassembling and cleaning them if you're
comfortable doing so, or at least using compressed air to
specifically blow them out. While the case is open, plug in the
computer and turn it on long enough to make sure all the fans
are still spinning. Replace any that are dead or noisy (a
common sign of a worn-out fan). If there is sticky residue or
dirt on the circuit boards, it can be removed with a cotton
swab dipped in rubbing alcohol, which will evaporate cleanly.
(Make sure the computer is unplugged first!) If you're not
comfortable with working inside your computer or suspect
your computer has
chronic overheating issues, Puget Systems or another professional repair service can help
you out.
3. Clean up your cabling, and everything else too.
There are probably two things behind your computer: a mess of cables, and dust bunnies.
If you're moving your computer, take the opportunity to clean your desk and floor as
well. While I can't claim that a clean work area will improve your computer's
performance or lifespan, it will certainly improve your peace of mind, and clean cabling
will help prevent snags and stresses on your computer ports. If you have a lot of
peripherals, consider using cable management of some type. Twist ties work fine, or
make a trip to any large office supply store. You can use a full out cable solution, but
even a five dollar cable wrap can neaten up your desk considerably.
> While you're wiping down your desk, wipe down the monitor too. CRT screens can
be cleaned with any mild glass cleaner, but LCD screens can't tolerate it. Use a
dampened cloth or a
product specifically made for LCD screens.
> Keyboards can be turned upside down to dump out crumbs and dirt, or keys can be
pried off and the whole assembly cleaned with compressed air. There are some good
step-by-step guides available on Lifehacker. Take a picture first so you can put the
keys back in the right place! If you're feeling adventurous (or just have a really
disgusting keyboard), some people advocate running it through the dishwasher.
>
This is a good time to take a look at where your computer is located. Is there adequate
ventilation? Is the computer out of direct sunlight, and away from heat sources? What
is it plugged in to? There's no excuse for not having a good surge protector (not just a
plastic power strip!), and battery backup units have become affordable for most users.
This will affect the lifespan of your computer.
Smoking will make a mess of a computer faster than anything else I know of. While we at
Puget Systems have never seen one quite this bad, we can always identify a smoker's
computer as soon as we unbox it. Electronics absorb the smell very easily, and even an
all-metal case will retain the odor after all the components have been removed. Plus,
there's usually a layer of dust and tar on the circuitry that tends to be a giveaway as
well. Please, if I can't convince you to quit smoking all together, at least take it
somewhere away from the computer!
4. Organize your installation disks
Keep software, peripheral, and driver disks in a single location, preferably close to the
computer. A shoebox works fine. Make sure you have them handy before attempting
computer maintenance or repairs - it's amazing what can become
necessary in the middle of a lengthy troubleshooting session to not and it is common
know what you're missing until you need it!
5. Run antivirus and spyware scans regularly.
This item should go without saying, but I'll say it anyway.
Any computer that is connected to the internet needs to have some
sort of antivirus software. There is a tremendous variety available,
everything from AVG Free to enterprise-level solutions. Use
whichever you like best. Most antivirus software will monitor the
system for threats in real time, so a full daily scan probably isn't
necessary, but do make time to run a full scan every month at the
least. AVG
Anti-Virus System
Some antivirus programs also protect against adware and spyware, but not all. If yours
doesn't, or if you just want an extra layer of
security, AdAware and SpyBot are two of the best known (and free!) products available.
While they may not be as destructive as viruses, adware and spyware will compromise
privacy and slow your computer drastically. Run scans for them at the same time as your
antivirus.
6. Clean up your software.
Every few months, look through the 'Add or Remove Programs' interface that is found in
the control panel. If there's software on there that you don't use any more, remove it. This
goes triple for browser toolbars, free games, and other resource-eating bits of fluff. Be a
little cautious, though - some system drivers appear in this list, and can cause hardware to
stop working if you remove them.
There's an excellent scanning utility on Steffen Gerlach's website that gives a graphical
representation of the data stored on your hard drive. This will give you a good idea of just
how much room your music collection really takes, or how much space is going to old
games.
7. Clean up your OS
Windows is not the most efficient operating system, and sometimes needs attention itself.
It saves a large amount of unnecessary information, mostly in the form of 'temporary' files
(which never get deleted) lists of recently performed searches, and the like. There's an
excellent program called CCleaner, which will clear out most of the unneeded data
automatically. If you're interested in
further optimizing your OS, there's a wealth of information available online,
including an article on improving XP performance available here on Puget's website.
8. Update everything
Check for updates for your hardware and software. This includes running
Windows Updates, checking for updated drivers, and checking for software
patches. The easiest way to find these is to go to the manufacturer's website,
to their support section, and then look for a 'downloads' section or search for
your product's name. If you've been having problems with a piece of
hardware or software, be sure to check for patches or updates - if other
people have been
having similar problems, it's likely the manufacturer has released a fix for it.
The exception to this is motherboard BIOS updates. Flashing a BIOS can be difficult, and
if it's done incorrectly you may need to send the computer for professional repair to get it
working again. If the update was specifically released to address problems that you've
been dealing with, it's probably worth it. Follow the manufacturer's directions carefully!
Otherwise, leave it alone.
9. Defragment
Once your hard drive has been cleaned up, it's a good time to defragment. This organizes
your files, leading to faster disk access times and improved system performance. The
Windows defragmenting tool (Start > All Programs > Accessories > System Tools > Disk
Defragmenter) works well, or there's a list of open source and commercial defragmenting
software available on Wikipedia if you'd rather use something else.
10. Read more articles like this one
Last but not least, continue to read articles like this one, and anything else computer
related that catches your eye. The computer industry is constantly changing - even if you
have the same computer, there will be innovations that affect you. At the very least, you'll
go into your next computer purchase far better informed than you would be otherwise.
We at Puget Systems always encourage our customers to learn about computers in
general and their system in particular. Well educated users tend to have fewer difficulties
with their system, and besides, we love computers and think everyone else should too!
Our commitment is to create a computer to meet your needs and budget, using our
experience to assist you every step of the way from the first visit to our website to tech
support calls two years later. We accomplish this in part through friendly sales and
support reps, an
informative website, and publishing articles on a regular basis. Give us a call or email,
we'd love to hear from you!
Tags: Advice, Support, Maintainance
SELF-CHECK 2.1-3
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
B.Gives the sample of monitor plan?
TASK SHEET 2.1-3
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3
YES NO
CRITERIA
Did you......
Wear your ppe
Clean up your OS
> LEARNING OUTCOME NO.2
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-4
LEARNING OBJECTIVES:
"Over time, you'll get Windows updates, or a new version of macOS, and these things can
weigh heavily on the PC,” says Joe Silverman, owner of New York Computer Help. Even
some of your apps will update themselves over time, and the web pages you visit may just
require more resources than they used to.
(Remember what the web looked like in the 90s?). When the machine slows to a crawl,
you'll have to bite the bullet and spend your money on something better.
Before you shell out for a new set of RAM though, you should figure out what’s actually
causing the slowdown. This will tell you whether you really need a replacement, or you’ll
find it worthwhile to eke out more time with an incremental repair or upgrade.
First, make sure it isn't a software issue. "It's always good to run a virus or malware test,
and make sure there are no infections in the background," says Silverman. You can also
check programs' resource usage: On a PC, open the Windows Task Manager (hit
Ctrl+Shift+Esc) and click More Details; on a Mac, open Spotlight (press Command+Space)
and search for Activity Monitor instead. If you see one program gobbling up all the CPU or
RAM, uninstalling it and replacing it with an alternative may speed things up.
“Check the operating system, too—there could be corruption somewhere,” says Silverman.
“If you haven’t reinstalled the operating system in five years, it might be time.”
If you can't narrow the issue down to just one program—or the problem lies with an
essential one, like your web browser—then you may need to upgrade your hardware.
During the next slowdown, open up that same Task Manager, head to the Performance tab,
and look at your CPU and memory usage. If either of those graphs shows particularly high,
sustained usage, you know which part probably requires an upgrade.
It's also possible that one of your components is failing entirely. "Do a hard drive test with a
program like HD Tune, which has a free trial," says Silverman. "It will let you know how
slow or abnormal some of the read-write activities are, and if your hard drive is failing." I
also like CrystalDiskInfo, which isn't as thorough as HD Tune, but will give you a basic,
clear idea of your hard drive's health for free.
While you're running through potential trouble areas, check your RAM as well. "Failing
RAM could cause slowness, but it can also stop your computer from turning on, or it may
shut down randomly," says Silverman. "So run a RAM
test like Memtest, which will check each stick and see if it's good or not. If you have a bad
stick, you want to make sure you replace it.”
You don’t have to run to the repair shop every time your PC ends up with an issue. Many
of the common PC problems have a rather simple solution, and you can fix them yourself
with a few simple steps.
To help you troubleshoot common PC problems yourself, I have listed 15 most common
PC hardware problems and what your options are if you face any of them.
| Read Also: How to Fix Corrupted Windows System with System File Checker
1. PC Overheating
A heating PC slows down the whole system and leads to frequent crashes.
Additionally, PC components may also get permanently damaged due to constant
exposure to heat.
There are two main reasons your PC heats up, i.e. either the cooling system isn’t working
properly or the PC is heating to the point your cooling system can’t handle it anymore. In
either case, I have written a comprehensive article on different
solutions to handle an overheating PC. Do check it out.
1. Press Windows + R keys and enter devmgmt.msc in the Run dialog to open the
Device Manager.
2. Here, expand Universal Serial Bus controllers option.
3. Now right-click the entry USB Host Controller and then click on Uninstall.
4. Repeat this for all entries with USB Host Controller to uninstall drivers for all the
USB ports.
5. Once deleted, restart the PC and Windows will automatically reinstall the drivers
and fix any driver issues.
USB Selective Suspend is a Windows power saving feature that suspends unused or idle
USB ports to conserve power. Sometimes it could stop a USB port from working. Here is
how to disable it: 1
1. Press Windows + R keys and type powercfg.cpl in the Run dialog to open
Windows Power options.
2. Here click on Change plan settings next to your current plan and then click on
Change advanced power settings.
3. Now, expand USB settings and disable USB selective suspend setting.
4. Restart the PC to see if it fixes the USB port issue.
Note: This option should be kept enabled if you want to save battery power. If it doesn’t
fix the USB port issue, then enable it again.
If your Wi-Fi is working fine but your PC keeps disconnecting from it, then your PC’s
network card may not be receiving full power. Windows has a built-in power saver option
that gives less power to the network card. You need to disable this feature: 1 2 3
1. Take out the RAM completely and clean any dirt inside the slot using a
cotton bud.
2. Now insert back the RAM and put enough pressure on both ends to ensure it is
fully inside.
3. Afterward, close the clips and make sure they’re properly locked. Even a slightly
loose RAM will be unable to work.
Any time a computer component stops working, or just becomes unstable -- as we all
know will happen from time to time -- we have to decide whether to replace it, have
it repaired, or just get by as is with perhaps a temporary fix. Repair or just getting
by will nearly always be the cheapest solution, at least in the short run. Replacement,
however, will usually provide a good opportunity to upgrade. In fact, given the rate
at which the various technologies behind computer hardware are advancing, unless
you replace something a week after you buy it, you may almost be forced to
upgrade.Following are a few items which, if replaced (and generally upgraded), can
provide excellent benefits, from an enhanced user experience to additional
compatibility, greater longevity, and stability for the whole system.
#1: Power supply
One of the most overlooked pieces of computer hardware is the power supply unit
(PSU). Computer enthusiasts often brag about their blazing fast processors, top-of-
the- line video cards, and gigs upon gigs of RAM, but rarely about their great PSUs.
The truth is, the power supply is the last thing we should skimp on when choosing
components for our system. If a computer's brain is its processor, its heart is the
power supply. And having one that is worn out, underpowered, unstable, or just
generally cheap can be a major cause of hardware failure.
Every computer's power requirements are different, but a good minimum for a
modern PC is 450 watts. Some systems, especially those with multiple high-end video
cards or lots of add-on cards and peripherals may require a PSU rated at 800 watts
or more. Replacing a failing or inadequate power supply can make a previously
unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A common
cause of "unexplained" lockups and system crashes is a drop in voltage supplied to
the system when under load, caused by a poorly
manufactured PSU. The easiest way to find a quality PSU is to stick to the consistently top
brands such as Antec, EnerMax, and PC Power & Cooling.
#2: Fans
As computers have gotten more powerful over the last decades, they have also gotten hotter.
Gone are the days of a passively cooled Pentium 100; now we have fans on our massive
CPU heatsinks, on our monster video cards, and on intake and outtake vents to our
computer cases. All of these fans are playing important roles by keeping our computers
safely cooled, and we should try to ensure that they continue doing so.
Fans are one of the few parts that when replaced will not usually be replaced with
something better. But they deserve mention because:
• As one of the few moving parts in our system, they are one of the most likely to actually
break.
• When they break, it's likely to pass unnoticed or not cause much concern. Also, fans are
cheap and easy to replace. It generally takes about 10 dollars, 15 minutes, and a
screwdriver to install a new one, so there's really no good excuse for not doing so.
#3: Surge protector / UPS
This is another item that keeps our computers safe and should not be neglected. A surge
protector can be a stand-alone power strip, but one is also built into virtually every
Uninterruptible Power Supply (UPS). The surge protector guards our devices against
spikes in energy that occur in our circuits at the home or office, usually due to lightning or
the powering up of high-powered devices, such as hair dryers or refrigerators. Repairing a
surge protector would be difficult and expensive at best; replacement is almost always the
best option.
It can be tricky to know when it's time to replace a surge protector, because the component
inside that diverts excess power from surges to the ground simply wears out with repeated
use. However, there is often no interruption of power or other indication that it's done. You
may still have juice but not be protected. The cheapest protectors may wear out after fewer
than 10 small surges, while the better ones can last through hundreds. The safest thing to
do is to get higher quality protectors but still replace them occasionally.
#4: Video card
The video card is one of the most important elements in the performance of your system
and overall user experience. Even though it is also one of the priciest components, there are
two good reasons to replace it should your old one bite the dust.
First, video cards are one of the components that are being improved upon seemingly every
day. Just like with CPUs, a video card that's two years old simply isn't as fast as a current
one and won't have the newest features (such as support for DirectX 10).
Also, the video card is the number one hardware stopgap as we migrate to Vista.
Manufacturers just aren't providing new Vista-compatible drivers for lots of their old video
cards. This means that many of us will have to replace our video cards whether they are
broken or not, if we plan to switch to Vista.
#5: Flash media reader
All kinds of devices use flash cards these days: cameras, MP3 players, even cell phones.
These small devices let us take our data anywhere easily. Since it seems as if every device
uses a different format of flash media, most of us have all-in-one type card readers. If the
reader breaks or gets lost (which seems to happen a lot), there are two excellent reasons for
upgrading to a newer model instead of trying to repair the old one.
First, many old card readers are USB 1.1. The newer ones use USB 2.0 instead, which is 40
times faster. This is more than enough reason to replace an old reader, even if it's not
broken.
In addition, new formats are constantly coming out for flash cards, and when they do, you
need a new reader to use them. For example, Secure Digital High Capacity (SDHC) and xD
from Fujifilm are not supported by older readers.
#6: CD/DVD drives
Considering that it has moving, spinning parts, the average CD/DVD drive is actually fairly
robust. Because of that, however, many people are still using old read-only (or CD RW)
drives instead of amazingly cheap (and handy) DVD writers. If you're still using an old
drive and it finally gives up the ghost, you'll probably be glad it did when you replace it
with a DVD/CD RW combo drive for less than 50 dollars.
#7: Hard drives
The computer component we all least want to fail is the hard drive. It's easier to cope with
the loss of the much more expensive processor or video card as long as we still have our
precious data, so your first instinct is to try to repair it. But if you've been practicing good
backup habits, you can actually come out of the situation better off when you replace the
old drive with something bigger and faster.
The "giant" 100-GB hard drive of a few years ago is no longer so large. Today, you can get
750 GB for less than 200 bucks. In addition to being much, much larger, newer hard drives
will generally be Serial ATA II (SATA II), which has a
maximum data transfer rate of about 300 MB/s as opposed to SATA I's 150 MB/s and the
older Parallel ATA (PATA) rate of 133 MB/s. SATA II is fairly new, so many motherboards
don't support it. But even if yours doesn't, the SATA II drives generally have a jumper that
can put them in SATA I mode.
TIP: Right now, most SATA II hard drives ship with this limiting jumper in place by
default, so if your board does support SATA II, be sure to change the jumper before you
install the drive.
#8: Monitor
With the exception of servers, a computer isn't much good without a monitor. Monitors
rarely make it all the way to the stage of completely not working, because we replace them
when they start to fade. If you replace a monitor that's more than a few years old, the new
will likely not much resemble the old.
Any reluctance you may have had to switch from the giant 50-pound cathode ray tube
(CRT) monitor to a slim and featherweight liquid crystal display (LCD) should be gone by
now. The gap in performance in terms of color rendering and refresh rates between CRTs
and LCDs is very small. Unless you're a graphics designer who needs a multi-thousand
dollar large screen CRT, the benefits of size, weight, power consumption, and less eye
fatigue that LCDs enjoy will far outweigh any small performance advantages of a CRT.
With the exception of the extremely high and extremely low end markets, it's quite hard to
find a new CRT monitor anyway.
If you were already using an LCD that's a few years old, when you replace it you'll enjoy
those leaps in performance that the LCDs have made in the last few years.
#9: Keyboard
Since so many of us spend hours every day banging away at them, it's important to have a
keyboard that's comfortable and efficient. And since we use them so much and often so
brutally, it is no wonder that they break often. Keys come off, get stuck, or just get really
dirty. When these things happen, you should usually go ahead and replace the keyboard
rather than live with the hassle.
Today's keyboards have new, handy features. Some have built in user-defined macro keys
for often-repeated commands; some can fold up for easy transportability; some have built-
in ports so they can double as USB hubs. There is a keyboard with some unique feature to
suit nearly anyone's needs.
#10: Motherboard and processor
Replacing the motherboard is always the most involved upgrade. Since it usually means
"starting over" with a clean installation of the operating system, lots of people are reluctant
to change to a newer board even when the old one gives up the ghost, preferring instead to
replace it with the exact same model, thus avoiding having to wipe the OS. However, since a
motherboard upgrade is the most involved, it also can give the widest range of benefits.
First and foremost, replacing the motherboard usually gives us the chance to upgrade to
the latest processor technology. Today, you can get the benefits of a dual or even quad CPU
setup with only one processor, thanks to multi-core technology, in which more than one
processing core is placed on a single wafer. In a multitasking or multithreaded
environment, this effectively increases your computer's performance by a factor of two or
four.
Additionally, upgrading the motherboard gives you access to new technologies for other
components. PATA and SATA I hard drives (and optical drives) can be upgraded to SATA
II. AGP video cards can be upgraded to PCI-E. USB 1.1 ports become USB 2.0. The list
goes on for virtually every component. Sometimes, even though it can be a pain, starting
over can be the best thing.
SELF-CHECK 2.1-4
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
TASK SHEET 2.1-4
Steps / Procedure:
Demonstration
YES NO
CRITERIA
Did you......
Wear your ppe
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-5
Testing Devices
LEARNING OBJECTIVES:
• See the Computer Hope tools for a list of available online tools.
2. With hardware, tools are what enable a person to install, remove, or perform
other actions on the components within their computer.
A. ESD TOOLS:
Most tools used in the computer assembly process are small hand tools. They are
available individually or as part of a computer repair toolkit. Toolkits range widely in
size, quality, and price. Some common hand tools and their uses
Hex driver. Used to tighten or loosen nuts in the same way that a screwdriver tightens or
loosens screws (sometimes called a nut driver).
Needle-nose pliers: Used to hold small parts.
Wire stripper: A wire stripper is used to remove the insulation from wire so that it can
be twisted to other wires or crimped to connectors to make a cable.
Crimper. Used to attach connectors to wires.
Punch-down tool: Used to terminate wire into termination blocks. Some cable
connectors must be connected to cables using a punch down tool.
Latex gloves are natural material, made out of rubber.
They are a popular choice of protective glove for medical or industrial use. The
primary reason people would choose an alternative to latex is because e many people
C.CLEANING TOOLS
Having the appropriate cleaning tools is essential when maintaining and repairing
computers. Using the appropriate cleaning tools helps ensure that computer components
are not damaged during cleaning. Cleaning tools include the following:
Soft cloth: Used to clean different computer components without scratching or leaving
debris
from different computer parts without touching the components
Cable ties: Used to bundle cables neatly inside and outside of a computer
Parts organizer: Used to hold screws, jumpers, fasteners, and other small parts and
prevents them from getting mixed togethe
D.DIAGNOSTIC TOOLS
Digital multimeter: is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.
Loopback adapter: is also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
Toner probefThe toner part is connected to a cable at one end
using specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates a
tone that travels the length of the cable. The probe part traces the cable. When the probe
is in near proximity to the cable to which the toner is attached, the tone can be heard
through a speaker in the probe.
It is a part of a network.
HUB / PORT
parallel port.
MODEM
exchange information
SCANNER
USB
RAM
BIOS
FLASH DRIVE
SOLDERING IRON
support
LANTESTER
For RJ11,12,45 & BNC w/ Remote Unit This
ergonomic tester is designed to test most network cable
wiring.
You can either conduct an auto or manual test.
UTP
Unshielded Twisted Pair, is a popular
type of cable used in computer
networking that consists
of two shielded wires twisted around each.
Multitester
RJ45
slightly wider.
MOTHERBOARD
Directions.
1.
2.
3.
4.
B.Fill in the blanks with the correct answer.
_1. It’s a RAM that can retain data without electrical power.
test most network cable wiring. You can either conduct an auto or manual test. _3. device
you should be able to Use and Operation of Tools, Instrument and Testing
Devices ff. Standard operating procedures within 1 half hour
Steps / Procedure:
MAINTENANCE
1.Clean, Inspect and Care for Tools 2.Store Tools Properly
3.Keep Power Tools Clean 4.Store Power Tools Correctly
5.Inspect for Wear or Damage
6. Lubricate Moving Parts
7. Keep Batteries in Shape
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-5
YES NO
CRITERIA
Did you......
Wear your ppe
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-6
LEARNING OBJECTIVES:
Computer Precautions
15 OCCUPATIONAL HEALTH AND SAFETY PROCEDURE
Reminders before you start disassembling your computer tower to keep both your unit
and yourself safe. And always remember on these “doesn’t fit doesn’t belong”.
■ Read and follow instruction on the manual carefully.
■ Do not work alone so that there’s someone who can take care of you in case of accident
or emergency.
■ Always power off and unplug the computer before working on it.
■ Take off any metal objects on your arms or fingers such as bracelets, rings or watches.
Even if your unit is unplugged, there may still be some remaining electric charge.
■ Always ground or discharge yourself before touching any part of the computer (such
as the computer casing) and make sure your hands are completely dry to avoid damaging
any mechanical parts as well as to avoid electrocution.
■ Be careful with the tools that may cause short circuit (such as screw drivers)
■ Handle all parts with care. Place each piece you remove carefully down onto a
stable surface, if a component does not come out easily, do not use excessive
force if things don’t quite slip into place or when you’re removing it. Instead,
check if you are removing it correctly and no wires still connected in the
hardware.
■ Always full the cable connector on the handle and not on the cable itself
■ Be sure you’re standing in a dry place and use only rubber shoes when
standing on the ground or in a concrete floor.
■ Make sure that the pins are properly aligned when connecting a cable
connector.
■ Take away any liquid such as mineral water or soft drinks near your working
area or near computers, the three of the most damaging things to a computer
are moisture (sweat, drinking water), shock (electric or from being dropped)
and dust (any debris from household dust to bits of food).
■ Personal protective equipment is correctly used in accordance with
organization OHS procedures and practice.
■ Hazard/risks in the workplace and their corresponding indicators are
identified to minimize or eliminate risk to co-workers, workplace and
environment.
■ Take necessary precautions to protect the component of the computer from
damaged cause by Electrostatic Discharge (ESD).
■ Hold the components by edges and do not touch the IC’s.
Multidisciplinary field of occupational health and safety with the goal of occupational
safety and health programs is concerned to foster a safe and healthy work environment.
The main focus of occupational health include promotion and maintenance of working
capacity and employee health; improvement of working environment; development of work
cultures and organizations to support health and safety; promotion of positive social
climate and smooth operation; enhanced productivity of the organization. Occupational
health and safety (OHS) standards mandate reduction, removal or replacement of job site
hazards. OHS programs also help minimize the effects of such hazards. Occupational
health and safety considerably benefits the company, as healthy employees are guaranteed
to be more productive. Company management and employers are obliged to provide a safe
working environment for all of the employees. Working conditions at employment in the
existing economy need to embrace important determinants of working hours, salary,
maternity policies, provisions for health promotion and protection.
The employer or supervisors acting as the representatives are legally responsible for the
safety and health of the workforce at workplace. The common goal remains to identify
hazardous materials, conditions and practices at workplace; assist employers and workers
in reducing or eliminating the risks. With the goal to ensure that employees work
effectively, occupational health and safety targets employers and employees. Occupational
health and safety cooperation experts promote workplace conditions. Occupational safety
professionals are concerned about all workplace hazards with emphasis on prevention of
workplace fatalities and traumatic injuries. Industrial hygienists are a source of special
expertise to identify and control hazards associated with acute or chronic exposure to
chemical, physical and biological agents. Occupational medicine physicians and
occupational health nurses are distinguished by providing clinical care programs aimed at
health protection and promotion of disease prevention. The services provided include
health screening and surveillance programs; diagnosis, prevention and treatment of work
related injury and illness; pre-placement and periodic return-to-work examinations;
independent medical examinations; impairment evaluations; disability and case
management; drug testing; behavioural and emotional counselling to avoid affect on job
performance. Such simple improvements can increase competitiveness, profitability and
motivates the workforce.
Practice Occupational Health And Safety Procedures
A hazard is any source of potential damage, harm or adverse health effects on something or
someone.
Risk is the chance or probability that a person will be harmed or experience an adverse
health effect if exposed to a hazard. It may also apply to situations with property or
equipment loss, or harmful effects on the environment.
2. Environments for Safety Regulations
A common factor in whether regulation is used is the seriousness of the outcome being
addressed in terms of human health. For this reason regulation is more common in
transportation and the workplace, where the potential for fatal injury is perceived to be
relatively great, and less common in the home and in sports environments, where the
potential for fatal injury is perceived to be less. Regulations are often introduced in
situations where the actions of one person can injure other persons who do not have the
ability or opportunity to decide whether to accept the risks associated with those actions.
The most common examples relate to regulations protecting the safety of children and of
workers.
Using the Think Safe Steps 1 2
Assessing the risk means working out how likely it is that a hazard will harm
someone and how serious the harm could be.
For example:
ask your supervisor for instructions and training before using equipment ask for help
moving or lifting heavy objects
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
able to Occupational Health and Safety Policies and Procedures ff. Standard operating
Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-6
YES NO
CRITERIA
Did you......
Wear your ppe
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-7
LEARNING OBJECTIVES:
Computers keep your business running, but your computer is like a car- it needs regular
computer maintenance to perform at its best. From the inside and out, your computer is a
machine that is capable of amazing things, but it can’t do it alone. It needs your help, or the
help of an IT solutions provider, to stay running at full capacity.
Use this checklist to stay up-to-date with the tasks you should do daily, weekly, monthly,
quarterly, and yearly to keep your computer functioning at its best.
DAILY
❖ Virus/Adware/Spyware Scans
❖ Delete internet temp files
❖ Delete Windows temp files
WEEKLY
❖ Windows Update
❖ Check for Other Software
Updates
❖ Java
❖ Flash
❖ Antivirus/Adware Software
❖ Adobe
❖ Data backups
❖ Empty the desktop Recycle
Bin
❖ Delete cookies
MONTHLY
❖ Run Disk Cleanup
❖ Run Disk Defragmenter
❖ Uninstall unused programs
❖ QUARTERLY
❖ Clean the keyboard
❖ Clean the mouse
❖ Dust the computer monitor
YEARLY
❖ updated.
Step 1: Anti-virus
Step 2: Anti-spyware/anti-malware
see what you need to do, often you just click a button and let it go.
Step 3: Empty your recycle bin (best done with CCleaner)
Hnxo deMe
Programs>Accessories>System Tools. Pick the
l^iJOowrtOdded Ptograen 0 bytesA
drive you want to scan (your main hard 471 MB
0 J Terrpwwy HemcC He*
drive(s), any that are just used for data storage CD Sytten *dwed WrxJowi Error Rtocr IOC MB
Also look in control panel for unwanted or unnecessary programs. Uninstall anything that
has leached on to the system over time such as Internet Browser toolbars.
Expert level technicians may want to clean up the system registry (do not attempt this
unless you are absolutely sure you know what you are looking for)
Step 5: Defragment
Ask yourself if these really need to be running in the background each and every time you
switch the computer on and uncheck any that don’t make the cut. Then click apply, then
OK. Next time you start up your computer those programs won’t start with it. You can still
open them manually and they’ll work exactly the same way, but they won’t be hogging
resources when you’re not using them.
Runtimes - Adobe Flash, Java, NET, Silverlight, Adobe Air, Shockwave Imaging - Paint,
NET, Picasa, GIMP, Infranview, XnView, Inkscape, FastStone
Security - Microsoft Security Essentials, Avast, AVG, Norton, McAfee, Malware Bytes,
Ad-Aware, Spybot, Super AntiSpyware etc.
Online Storage or Backup - Carbonite, Dropbox, Google Drive, Mozy, Microsoft
SkyDrive
Step 8: Check file backup plan disks if and create system recovery
applicable
SELF-CHECK 2.1-7
2.
3.
4.
5.
6.
7.
8.
9.
B. ESSAY: What is the computer maintenance schedule and explain it?
TASK SHEET 2.1-7
able to Occupational Health and Safety Policies and Procedures ff. Standard operating
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-7
YES NO
CRITERIA
Did you......
Wear your ppe
Anti-virus
Anti-spyware/anti-malware
Defragment
Check file backup plan and create system recovery disks if applicable
Clean and dust internal computer parts and fan (check fans and computer temp.)
> LEARNING OUTCOME NO.2
RESOURCES:
Lecture /discussion
Demonstration
Self-learning
PREVENTIVE MAINTENANCE
The primary goals of preventive maintenance include the following:
TyMatt can provide you with preventive maintenance assistance either on-site or via
remote diagnostic support. Please contact us for a monthly maintenance price quotation.
Data Backup
Data backup is the most critical aspect of preventive maintenance. Surprisingly it is often
overlooked, resulting in devastating losses for businesses of all types and networks of all
sizes. Data backup should be performed daily to ensure that vital documents are protected.
Whether it’s on-site or off-site (or a combination of both), TyMatt will help you find a
solution that meets your needs for data protection and backup and ensures the fastest
recovery of your data in the event of a system crash.
Benefits of Off-Site Backup
Off-site backup protects against hardware failures and localized damage such as fire,
flooding, vandalism, and theft. Since data is stored off-site on redundant and secure servers.
In the event of a failure, data can be restored quickly to get your business back up and
running.
Benefits of On-site
The benefit of having your data backed up on-site is allows you to restore lost data very
quickly. The on-site backup is a local, physical device directly connected to your network.
With off-site backup, data is restored over the internet from the off-site servers; a reliable,
but slower process.
Understanding The Importance Of Preventive Maintenance In Computer Systems
If you don’t maintain your computer by checking the health of your hard disk or making
backups, you could risk sudden data loss of absolutely critical data. Whether it’s a business
document or a precious family photo album, regular backups of data are critical for
protecting your data.
Remember, as the old IT adage says. “There are only two types of hard drives. Hard drives
that already have failed, and hard are going to fail.” Back up your data regularly, or you
risk losing it forever!
Ensure Better Overall Performance
Doing basic things like checking what programs run on start-up, looking for malware, and
removing unused programs will help your computer function more effectively, and keep it
from slowing down. Think of this like a “tune-up” on a car, that helps your computer
perform more reliably.
Fix Security Vulnerabilities
One of the most important parts of computer maintenance is updating your operating
system, and the programs you use, like your web browser. This helps fix security
vulnerabilities, which could be exploited by hackers to place malware or viruses on your
computer. Malware and viruses can slow down your system, and even steal your personal
data, like banking information.
Get A Longer Lifespan From Your Computer
Keeping your system updated and backed up, protected from malware, and free of
unnecessary files, folders and programs helps you get better performance, and a longer
overall lifespan.
In addition, doing things like cleaning the keyboard and screen and spraying dust out of the
fan can help keep the physical components of the computer in better shape, and prolong its
lifespan - saving you money.
Free Up More Data Storage
From backups to security patching, antivirus installation, cleaning and more, we can do it
all - and make your computer feel brand-new again. Need a computer “tune-up?” Call us
for an appointment, bring in your computer, and let us take care of the rest.
Operating System Updates contain new software that helps keep your computer current.
Examples of updates include service packs, version upgrades, security updates, drivers, or
other types of updates.
Important and high-priority updates are critical to the security and reliability of your
computer. They offer the latest protection against malicious online activities.
You need to update all of your programs, including Windows, Internet Explorer, Microsoft
Office, and others. Visit Microsoft Update to scan your computer and see a list of updates,
which you can then decide whether to download and install.
NOTE: Microsoft offers security updates on the second Tuesday of the month.
It's important to install new security updates as soon as they become available.
The easiest way to do this is to turn on automatic updating and use the recommended
setting, which downloads recommended updates and installs them on a schedule you set.
In Windows Vista, you control the automatic updating settings through the Windows
Update Control Panel. For more information, see Turn automatic updating on or off.
In order to comply with the latest Department of Defense (DoD) regulations all government
contractors must update their security guidelines; in turn, this means many contractors
upgraded or need to upgrade their operating systems. If you are a government contractor,
the DoD policy requires protection of controlled unclassified information as required
under the National Institute of Science and Data security requirements known as
NIST SP 800-171. NIST Special Publication 800-171 breaks down the minimum cyber
security standards into 14 areas, listed here.
Upgrading your system’s OS may also help your business avoid becoming a victim to
increasingly common security threats. As you have seen - but hopefully not
experienced within your business - the hacking industry and malware continue to
evolve and pose greater and greater threats.
2. Product Obsolescence
The longer a test system is allowed to languish on old platforms, the more
obsolescence threatens the test system’s ability to remain online and well-
supported.
Aged systems are subject to support difficulties in many areas and may cause the
following:
• Increasing likelihood of failures
• Higher frequency downtimes
• Longer duration downtimes
• Difficulty finding replacement parts
• Difficulty finding supported drivers
• Elongated time on support calls (as staff are trained in latest technology)
Some common signs that your software is incompatible with a new operating system
include:
• Software fails to launch
• Software used to generate reports and no longer does
• Software displays permission errors
• Software can no longer save configuration data
• Software can no longer print
• Software no longer collects data or data is wrong
If your software exhibits any of these traits it is likely not compatible with modern OS rules
and requirements.
3. Preserving Capability
Migrating test software to a newer operating system extends the overall lifespan of the test
system. Migration also allows the test system to take advantage of faster, more reliable
modern hardware and drivers and increases the overall supportability of the system.
An experienced integrator can migrate your test system to a modern, reliable platform
Migrating to a new OS is not as simple as installing the new OS. New OS versions come
with new rules and requirements, often rendering old software unable to properly run. G
Systems can update your test software to make it compatible with the new environment.
For more than 25 years, G Systems has performed OS upgrades to maintain test system
functionality. Our experience includes working with prime aerospace and defense
contractors and many other markets. As part of an OS upgrade, we will guide you through
these topics and help ensure your system continues to run reliably.
Download our Complete Guide to Managing Obsolescence to learn more about how to
identify obsolescence issues early and manage them once they are identified.
With all the backup-focused products available on the market today, there is no excuse not
to back up systems and data. The key to making all of this work is having a backup
schedule.
It's important to know how to create a backup schedule and develop a thorough
scheduling strategy.
• Disaster recovery. Recovering and restarting critical systems, VMs, data files and
databases.
• Start times and completion times for all regular backups defined. The
schedule must include all data backup activities and include testing activities as needed; in
addition, the backup tool and network resources being used can be specified.
• Restore files that are accidentally deleted. It's happened to all of us at
some time and it helps to have a safety net in case work files or other critical data are
erased.
• Effect of backup activities on production activities. A backup schedule can help keep
production systems operating at peak performance, with backups occurring outside of
production schedules.
• Satisfaction of compliance and audit requirements. If the organization is required to
comply with certain regulations and standards regarding data protection, and is
periodically audited for general IT controls, schedules are important sources of
evidence in these areas.
• Compliance with recovery time and recovery point objectives (RTOs/RPOs). These
important metrics are essential for managing data backup and recovery; schedules can
demonstrate that they are being addressed.
Key issues in backup scheduling
Although scheduling backups might seem like a no-brainer, several components of the
process must be addressed within IT departments and reviewed with business unit
leaders and senior management.
Addressing these items will ensure a comprehensive, auditable schedule that is easily
understood and can be implemented by designated data backup team members and
others, if needed, in an emergency. Following is a list of key concerns for planning and
executing data backups.
1. What needs to be backed up?
Data and system owners should specify the frequency of their backups and what should be
backed up. Normally, data administrators should back up everything -- or specific
parts -- in the IT environment with a frequency acceptable to business unit leaders and
cost-effective operations.
Organizations should also consider the cost of backups and the effect of backups on system
-- and company -- performance. For example, it might make sense to replicate the
entire system or critical portions of the system and specific individual files and
databases to an alternate storage medium and perform incremental backups to that
environment.
2. Location of systems and files to be backed up
Identify if the working location will be an on-site server, storage device or perhaps a cloud-
based backup arrangement. This can be included in the backup schedule and should also be
specified in data backup policies and procedures, especially from compliance and audit
perspectives.
3. Who performs backups?
The data backup administrator's activities should be governed based on discussions with
system owners and data owners. Individual users might also back up their own data files;
this should be addressed by an IT policy for data management. Other IT employees should
be identified as potential backup staff to the primary backup administrator(s). This might
involve some internal training from the data admins as well as vendors whose technology
resources are used for backups.
4. Time frames for backups
Points in time when data and system backups can occur should be defined based on
business requirements. For example, some systems and data files might need to be backed
immediately when they have been modified. This reflects their criticality to the business.
Full backups are often performed after business hours weekdays and over weekends. More
frequent backups are governed by the business and their execution might depend on
specific systems and network resources.
Backup administrators should periodically consult with system owners on these criteria to
ensure backup policies, procedures and schedules are appropriate.
Some files are updated often during a typical day, such as customer data files, requiring
admins to back up these files more frequently. They might consider backing them up at the
end of each day -- factoring in all incremental revisions -- so that an up-to-date backup is
saved.
Other situations might require the immediate backup of changes so files are always
current. Other files might not need to be backed up regularly and, as such, could be
candidates for alternative storage, such as tape.
RPO requirements might also influence the frequency of backups. For example, if the RPO
for certain critical files is 10 seconds or less, the backups will likely be more frequent, and
the technology used for those backups -- e.g., data mirroring, data replication, high-speed
low-latency networks -- will also need to be considered.
System backups might need a different schedule than data files and databases. Backups
should occur any time one or more parameters in a system change in the course of daily
operations. This suggests a more ad hoc approach to system backups; each organization
will need to establish those requirements.
6. Restoration of data from backups
Backups are created to ensure that if the recovery or restoration of a system and/or data is
needed, those resources will be as current as possible. An organization should consider
the criticality of systems and files at this point so it can establish the priority of backing
up and the priority of restoration. These items should be factored into backup
scheduling.
7. Location of restored systems and data
• Day zero backups are performed when a new system is fully installed and accepted by
the system owner. It establishes the initial baseline for future updates.
• Full backups store all the systems and files within the system, or they store selected
systems and files as defined by the system/data owner. Companies should perform these
on a regular basis, such as once a week, and they should also consider backups when a
major change to the IT infrastructure occurs.
• Incremental backups create a copy of all the files that have changed since a previous
backup.
• Differential backups create a copy of all the files that have changed since the last full
backup.
Examples of frequently used systems and files for backup scheduling include:
• Databases
• VMs
• Accounting files
• Configuration files
• Network files
Developing and implementing a backup schedule
Organizations might need to perform some incremental backups several times each day,
whereas others might need more infrequent updates. The increased use of VMs makes
efficient and timely backups even more important. In a disaster, enterprises will need
to recover and restore quickly to resume operations with minimal downtime.
Setting up a schedule requires a detailed and accurate list of all systems to be backed up,
as well as all data files and databases to be backed up. The schedule should be
prepared on a platform that facilitates timely changes, as data and system backup
schedules can be very dynamic. Use RPO values to assist with the creation of schedules,
as satisfaction of the RPO values will be affected by how frequently their backups are
scheduled. Work with the organization's backup software vendor to assist with
schedule preparation. The same is true of external resources, such as MSPs and cloud-
based backup and storage firms. Figure 1 is an example of a backup schedule.
How to Create a System Image Backup in Windows 7, 8, or 10
The built-in backup utilities in Windows are pretty solid. Let’s take a look at how
Normal backup programs, like CrashPlan or Windows’ built-in File History feature,
essentially copy your files to another location. A system image backup, on the other hand, is
like a full snapshot of an entire hard drive. The advantage of a system image is that if a
hard drive crashes, you can replace it, restore the image, and have your system right back
to where it was when the image was captured. No need to reinstall Windows or your apps.
The biggest disadvantage with system image backups—other than taking a bit longer—is
that you can’t restore the backup to a different PC. You’re creating an image of your full
Windows installation and, since Windows is set up specifically for your hardware, it just
won’t work as-is in another PC. It would be like trying to plug your hard drive into another
PC and expecting everything to load well. With that in mind, though, image backups can
still be really handy.
Step One: Open System Image Backup
The process of finding the System Image Backup tool is different in Windows 7 than in
Windows 8 and 10, so we’ll show you to find the tool in all versions, and then explain how
to create and use the system image.
In Windows 10, hit Start, type “backup,” and then select the entry.
In the “Backup and Restore (Windows 7)” window, click the “Create a system
image” link.
Open System Image Backup in Windows 8
In Windows 8, hit Start, type “file history,” and then select the “File History” entry.
Search
Everywhere v
In the “File History” window, click the “System Image Backup” link
Open System Image Backup in Windows 7
Hit Start, click the arrow to the right of the “Getting Started” item, and then click
“Back up your files.”
In the “Backup and Restore” window, click the “Create a system image” link.
Creating A Windows System Image
Here we’ll show you how to create Windows 7 backup system image, the steps for Vista
and Win 8 compatible versions are broadly the same. You can only do this from within
Windows itself. There are a few ways of running the Windows Backup and Restore Tool
which will also allow you to create a repair disc or backup files and folders, choose 1 from
any of the following:
■ Click the Start orb and type backup into Search. You should see Backup and Restore
appear in Programs, press Enter.
■ Click the Start orb -> All Programs -> Maintenance -> Backup and Restore.
■ Go to Control Panel and select Backup and Restore from an icon view, or System and
Security -> Back up your computer in Category view.
Now in the Backup and Restore tool, click Create a system image in the left pane.
-
CZI 0
OG v
Control Panel Home
Resto re
This will open up the Create a system image window. Alternatively, you can get directly to
this window from the desktop by using Win Key+R and typing the following into the Run
dialog box:
sdclt.exe /BLBBACKUPWIZARD
Now select where you’re going to backup the system image to, which can either be to hard
drive, multiple DVD discs or a network location if your Windows version supports it.
Removable USB devices such as flash drives will show under hard disks. If you try to select
another partition on the same physical hard disk you’re backing up from, there will be a
warning about it because that hard drive failing will result in both operating system and
the backup being lost. If you place ANY value in your backups at all, it’s strongly
recommended to use a different physical device to save them to.
The volume selected is on the same physical disk that is being backed up, If this disk fails, you will lose your
backups,
The next screen will offer to backup any other volumes you might want to include in
the process, the main system partition and the small 100MB boot partition if present
will be automatically selected and cannot be touched.
The drives that are required forWindowsto run will be included by default. You cannot includethe drive that you are saving the backup
to.
Note: Sometimes in a multiboot system, one of your other operating system partitions
will be auto selected and grayed out so you can’t turn it off. This is usually the case
when you install Windows 7 after another operating system and the bootloader system
files are located on that partition and not Windows 7’s. Apart from some tricky methods
of manually moving all the boot files onto the windows 7 partition and making it an
Active / System volume, it is recommended to either accept the included volume or use
another backup software.
At the final confirmation window, the Backup and Restore tool will tell you how much
space it could take to create the backup and clicking the Start backup button will start the
process. Depending on the amount of data to backup and the speed of the hardware, this
could obviously take from a few minutes to an hour or more. If you receive an error at this
point, you might like to read our article on a possible cause for a
system image backup failure.
After the backup process completes, you will be asked if you want to create a system repair
disc. This is highly recommended if you don’t have a full Windows install DVD to hand
and can also be created later on from the Backup and Restore tool main window. If you
would like to create a repair CD on a USB stick, please follow the
repair disc to USB instructions in our post detailing how to do it.
On page 2 we’ll show you the various ways you can restore your system image. Read
More:
https://www.raymond.cc/blog/create-windows-7-system-image-for-full-backup-and-restora
tion/
Create system image in Windows Server 2008 with Windows Server Backup
Windows Server Backup is a free tool in Server 2008, 2008 R2, 2012, 2016 etc, which allows
you to create a full server backup, system state backup, bare metal backup, or backup
selected volumes, specific files and folders.
However, this tool is not installed by default and you need to manually install it using
Server Manager. Just Open Server Manager, then go to Features > Add
Features > Windows Server Backup Features and click Install to start the installation
process.
Then, to create a system image backup in server 2008 with Windows Server Backup, use
the following steps. Please note that you must be a member of the Backup Operators or
Administrators group, or you must have been delegated the appropriate authority. And
this software only backs up volume formatted with NTFS file system.
1. Open Windows Server Backup. Just click Start and type Window Server Backup in
the search box, then select it from the list result.
2. Click “Backup Once” at the right panel. If you want to create a schedule backup, you
can click “Backup Schedule”.
3. Tick “Different options” and click Next.
Create system image backup for Windows Server 2008 with AOMEI Backupper
Server
AOMEI Backupper Server is a trust and reliable backup software that is widely used to
create system image in Windows server 2008, 2012, 2016, 2019 etc. This operation is very
easy, just a few clicks. It supports full backup, incremental backup and differential
backup. It backs up system partition with NTFS, FAT32, FAT, EXT2, EXT3 file system.
In addition, there are some useful feature you may use during the backup process. They
makes the task simple and efficient.
• Get backup result more easily. With “Email Notification”, you no longer need to wait
unless the backup task is 100% completed. Because it will inform you the final result and
any error message during the backup process.
• Save disk space. Don't want waste a lot of time and disk space when create a server 2008
image backup? You could backup system with incremental backup or differential backup
feature.
• Support automatic backup. To keep the newly installed apps, added or modified files,
you can schedule backup at a regular basis, such as, daily, weekly, monthly.
• Support off-peak hours backup. Its feature "Wake the computer to run scheduled tasks
” allows you to backup system at midnight or any other time without human intervention.
• Manage backup disk space. Backup space not enough is a big headahe for users who
create schedule backup regularly. So, it’s recommended to enable backup scheme to
delete old backup.
Then, follow steps below to create Windows Server 2008 image backup with AOMEI
Backupper Server. If you want to backup Windows Server 2008 to external hard drive, you
need connect the device in advance.
Creating Restore Point
System Restore is a built-in feature in Windows that backs up computer state (including system
files, Windows Registry, local user profiles, and system settings). When your system is running
into issues, you can use System Restore to recover system to earlier state.
There are many unexpected things that may lead to system crash like Virus attacks,
Ransomware, accidental deletion of system files, etc. Therefore, it is essential to create system
restore point in Windows 7.
System Restore was first introduced in Windows ME and it has been included in all the
following Windows operating systems.
| How to create system restore point in Windows 7 with built-in tool?
By default, Windows will automatically create system restore point when new software is
installed, when new Windows updates installed, and when a driver is installed. Besides,
Windows 7 will create a system restore point automatically if no other restore points exist in 7
days.
Of course, you can also manually create system restore point in Windows 7.
You can follow the steps below to ensure System Restore is enabled and custom the settings. 12
1. Click Start > type “create a restore point” in the search box > click Create a restore
point to open the System Properties window.
2. Enable system restore: In Windows 7, C: drive protection is on by default. If you also
want to create restore point on other drives, you can turn the protection on for the specific
disk by clicking Configure.
You can specify what you like to protect and disk space used for system restore points. 3
5. Once the process is completed, you will see the restore point was created
successfully message.
The restore points will be saved on the volume that you are protecting, so if the volume is
corrupted, the restore points will not work. If the disk free space on the volume is too low
for System Restore to operate, it will automatically disable itself.
You can use Disk Cleanup to delete the previous restore points but the latest one to free
up some disk space.
| How to create restore point in Windows 7 automatically?
If you are not content with the gap between restore points creation interval, you can use
Windows Task Scheduler to automatically create system restore point on a scheduled time
or event. For example, to create system restore point in Windows 7 at startup:
1. Click Start > type Task Scheduler in the search box and hit Enter.
2. On the left panel, navigate to Task Scheduler Library > Microsoft > Windows >
SystemRestore.
3. Double click on the task named SR to edit it. 4
4. Under Triggers tab, you can click New to add a new trigger at Startup. Or you
can just click Edit to change the trigger.
5. Set the scheduled time to perform the task and click OK to confirm.
Now, a new system restore point will be created automatically at your preferred schedule
and intervals. If you ever need to change the frequency, you can just modify this task in
Task Scheduler.
| How to restore Windows 7 to previous status with the restore point?
When your system gets corrupted or something else goes wrong, you can use system
restore point to restore the system to the previous good state. Two ways are available. You
can simply go to System Restore utility to make it. Or when you cannot boot into Windows
7, you can go to Safe Mode to use restore system.
Restore Windows 7 to previous status with System Restore utility:
1. Click Start > type “create a restore point” in the search box > click Create a restore
point to open the System Properties window. Click System Restore option.
2. A window will appear and click Next to go to the next step.
3. It will list the recent restore points and the most recent restore point is selected. You
can click Show more restore points to see more. Choose the
Note: If you are not sure whether the restore will cause some of your programs to loss data,
you can click Scan for affected programs to have a check.
4. Click Finish to start the restore.
Systerm restore in Safe mode:
1. At your computer startup (before showing the Windows logo), Press the F8 key
repeatedly.
2. At Advanced Boot Options, select Safe Mode with Command Prompt.
4. Then you can choose one of the available restore points to system restore Windows
7 in Safe Mode.
If you cannot boot into Safe Mode, you can also use a system repair disc to access
System Restore to restore your computer.
Guarding Againts Virus
The easiest way to differentiate computer viruses from other forms of malware is to think
about viruses in biological terms. Take the flu virus, for example. The flu requires some
kind of interaction between two people—like a hand shake, a kiss, or touching something
an infected person touched. Once the flu virus gets inside a person’s system it attaches to
healthy human cells, using those cells to create more viral cells.
A computer virus works in much the same way:
1. A computer virus requires a host program.
2. A computer virus requires user action to transmit from one system to another.
3. A computer virus attaches bits of its own malicious code to other files or replaces
files outright with copies of itself.
It’s that second virus trait that tends to confuse people. Viruses can’t spread without
some sort of action from a user, like opening up an infected Word document. Worms,
on the other hand, are able to spread across systems and networks on their own,
making them much more prevalent and dangerous.
Famously, the 2017 WannaCry ransomware worm spread around the world, took
down thousands of Windows systems, and raked in an appreciable amount of
untraceable Bitcoin ransom payments for the alleged North Korean attackers.
Computer viruses don’t capture headlines like that—at least not anymore.
To recap, the bad guys aren’t focused on creating new viruses and most of the really
bad stuff is actually malware. Should we still take computer viruses seriously?
Definitely, yes.
Continuing the virus analogy, if a given population stops receiving vaccinations for
diseases thought to be eradicated, like the measles and polio, those diseases can and
do come back. Likewise, it’s important to be proactive about cybersecurity and take
some basic protective measures against computer viruses. Otherwise, computer viruses
could make a comeback.
With that said, let’s take a look at computer viruses under the microscope.
Computer virus examples
Sometimes to understand what something is, we have to examine what it isn’t. Keeping
that in mind, let’s play: Is It a Virus?
In the Is It a Virus game we’re going to take a look at examples of things people on the
Internet commonly believe to be a virus and explain why it is or isn’t. What fun!
Is a Trojan a virus? Trojans can be viruses. A Trojan is a computer program
pretending to be something it’s not for the purposes of sneaking onto your computer
and delivering some sort of malware. To put it another way, if a virus disguises itself
then it’s a Trojan. A Trojan could be a seemingly benign file downloaded off the web
or a Word doc attached to an email. Think that movie
you downloaded from your favorite P2P sharing site is safe? What about that “important”
tax document from your accountant? Think twice, because they could contain a virus.
Is a worm a virus? Worms are not viruses, though the terms are sometimes used
interchangeably. Even worse, the terms are sometimes used together in a strange and
contradictory word salad; i.e. a “worm virus malware.” It’s either a worm or a virus, but it
can’t be both, because worms and viruses refer to two similar but different threats. As
mentioned earlier, a virus needs a host system to replicate and some sort of action from a
user to spread from one system to the next. A worm, conversely, doesn’t need a host system
and is capable of spreading across a network and any systems connected to the network
without user action. Once on a system, worms are known to drop malware (often
ransomware) or open a backdoor.
Is ransomware a virus? Ransomware can be a virus. Does the virus prevent victims from
accessing their system or personal files and demands ransom payment in order to regain
access a la ransomware? If so, then it’s a ransomware virus. In fact, the very first
ransomware was a virus (more on that later). Nowadays, most ransomware comes as a
result of computer worm, capable of spreading from one system to the next and across
networks without user action (e.g. WannaCry).
Is a rootkit a virus? Rootkits are not viruses. A rootkit is a software package designed to
give attackers “root” access or admin access to a given system. Crucially, rootkits cannot
self-replicate and don’t spread across systems.
Is a software bug a virus? Software bugs are not viruses. Even though we sometimes refer
to a biological virus as a “bug” (e.g. “I caught a stomach bug”), software bugs and viruses
are not the same thing. A software bug refers to a flaw or mistake in the computer code
that a given software program is made up of. Software bugs can cause programs to behave
in ways the software manufacturer never intended. The Y2K bug famously caused
programs to display the wrong date, because the programs could only manage dates
through the year 1999. After 1999 the year rolled over like the odometer on an old car to
1900. While the Y2K bug was relatively harmless, some software bugs can pose a serious
threat to consumers. Cybercriminals can take advantage of bugs in order to gain
unauthorized access to a system for the purposes of dropping malware, stealing private
information, or opening up a backdoor. This is known as an exploit.
Latest news on computer viruses
Today’s malware authors owe a lot to the cybercriminals of yesteryear. All the tactics and
techniques employed by cybercriminals creating modern malware were first seen in early
viruses. Things like Trojans, ransomware, and polymorphic code. These all came from
early computer viruses. To understand the threat landscape of today, we need to peer back
through time and look at the viruses of yesteryear.
1949, John von Neumann and “self-reproducing machines”
It was in those salad days of computing that mathematician, engineer, and polymath John
von Neumann delivered a lecture on the Theory and Organization of Complicated Automata in
which he first argued that computer programs could “self-reproduce.” In an era where
computers were the size of houses, and programs were stored on mile-long punch tapes,
Neumann’s ideas must’ve sounded like something from a sci-fi pulp novel.
1982, The proto computer-virus
In 1982 a fifteen-year-old boy pranking his friends proved Neumann’s theory a reality.
Rich Skrenta’s Elk Cloner is widely regarded as the first proto-computer virus (the term
“computer virus” didn’t exist just yet). Elk Cloner targeted Apple II computers, causing
infected machines to display a poem from Skrenta:
Elk Cloner: The program with a personality It will get on all your disks It will infiltrate
your chips Yes, it’s Cloner!
It will stick to you like glue It will modify RAM too Send in the Cloner!
Other notable firsts—Elk Cloner was the first virus to spread via detachable storage media
(it wrote itself to any floppy disk inserted into the computer). For many years to come,
that’s how viruses travelled across systems—via infected floppy disk passed from user to
user.
1984, Computer virus, defined
In 1984 computer scientist Fred Cohen handed in his graduate thesis paper,
Computer Viruses - Theory and Experiments in which he coined the term “computer virus,”
which is great because “complicated self-reproducing automata” is a real mouthful. In the
same paper, Cohen also gave us our first definition of “computer virus” as “a program that
can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.”
1984, Core War
Up to this point, most talk about computer viruses happened only in the
rarified air of college campuses and research labs. But a 1984 Scientific American article let
the virus out of the lab. In the piece, author and computer scientist A.K. Dewdney shared
the details of an exciting new computer game of his creation called Core War. In the game,
computer programs vie for control of a virtual computer. The game was essentially a battle
arena where computer programmers could pit their viral creations against each other. For
two dollars Dewdney would send detailed instructions for setting up your own Core War
battles within the confines of a virtual computer. What would happen if a battle program
was taken out of the virtual computer and placed on a real computer system? In a
follow-up article for Scientific American, Dewdney shared a letter from two Italian readers
who were inspired by their experience with Core War to create a real virus on the Apple II.
It’s not a stretch to think other readers were similarly inspired.
1986, the first PC virus
The Brain virus was the first to target Microsoft’s text-based Windows precursor, MS-
DOS. The brainchild of Pakistani brothers and software engineers, Basit and Amjad
Farooq, Brain acted like an early form of copyright protection, stopping people from
pirating their heart monitoring software. If the target system contained a pirated version of
the brother’s software, the “victim” would receive the on-screen message, “WELCOME TO
THE DUNGEON . . . CONTACT US FOR VACCINATION” along with the brothers’
names, phone number, and business address in Pakistan. Other than guilt tripping victims
in to paying for their pirated software, Brain had no harmful effects.
Speaking with F-Secure, Basit called Brain a “very friendly virus.” Amjad added that
today’s viruses, the descendants of Brain, are “a purely criminal act.”
1986, Viruses go into stealth mode
Also in 1986, the BHP virus was the first to target the Commodore 64 computer. Infected
computers displayed a text message with the names of the multiple hackers who created the
virus—the digital equivalent of scrawling “(your name) was here” on the side of a building.
BHP also has the distinction of being the first stealth virus; that is, a virus that avoids
detection by hiding the changes it makes to a target system and its files.
1988, Computer virus of the year
1988, one could argue, was the year computer viruses went mainstream. In September of
that year, a story on computer viruses appeared on the cover of TIME magazine. The cover
image depicted viruses as cute, googly eyed cartoon insects crawling all over a desktop
computer. Up to this point, computer viruses were relatively harmless. Yes, they were
annoying, but not destructive. So how did computer viruses go from nuisance threat to
system destroying plague?
“Viruses were all about peace and love—until they started crashing people’s
computers.”
1988, A message of peace goes haywire
Viruses were all about peace and love—until they started crashing people’s computers. The
MacMag virus caused infected Macs to display an onscreen message on March 2, 1988:
How do I prevent computer viruses?
Preventing computer viruses from infecting your computer starts with situational
awareness.
“Situational awareness is something law enforcement and militaries have practiced for
decades. It refers to a police officer or a soldier’s ability to perceive threats and make the
best decision possible in a potentially stressful situation,” said Malwarebytes Head of
Security, John Donovan.
“As it applies to cybersecurity, situational awareness is your first line of defense against
cyberthreats. By staying on the lookout for phishing attacks and avoiding suspicious links
and attachments, consumers can largely avoid most malware threats.”
Regarding email attachments and embedded links, even if the sender is someone you know:
viruses have been known to hijack Outlook contact lists on infected computers and send
virus laden attachments to friends, family and coworkers, the Melissa virus being a perfect
example.
If an email reads oddly, it’s probably a phishing scam or malspam. When in doubt about
the authenticity of an email, don’t be afraid to reach out to the sender. A simple call or text
message can save you a lot of trouble.
Next, invest in good cybersecurity software. We’ve made a distinction between computer
viruses and malware, which now begs the question, “Do I need antivirus software or anti-
malware software?” We’ve covered this topic before in great detail so checkout our article
on antivirus vs. anti-malware. For now, though, here’s a quick gloss on the subject.
Antivirus (AV) refers to early forms of cybersecurity software focused on stopping
computer viruses. Just viruses. Anti-malware refers to all-encompassing threat protection
designed to stop old-fashioned viruses as well as today’s malware threats. Given a choice
between traditional AV with limited threat detection technology and modern anti-malware
with all the bells and whistles, invest in anti-malware and rest easy at night.
As mentioned previously in this piece, traditional AV solutions rely on signature-based
detection. AV scans your computer and compares each and every file against a database of
known viruses that functions a lot like a criminal database. If there’s a signature match, the
malicious file is thrown into virus jail before it can cause any damage.
The problem with signature-based detection is that it can’t stop what’s known as a zero-
day virus; that is, a virus that cybersecurity researchers have never seen before and for
which there is no criminal profile. Until the zero-day virus is added to the database,
traditional AV can’t detect it.
Malwarebytes’ Multi-Vector Protection, conversely, combines several forms of threat
detection technology into one malware crushing machine. Amongst these many layers of
protection, Malwarebytes uses what’s called heuristic analysis to look for telltale malicious
behavior from any given program. If it looks like a virus and behaves like a virus, then it’s
probably a virus.
How do I remove computer viruses?
Going back to our virus analogy one final time—removing a virus from your body requires
a healthy immune system. Same for your computer. A good antimalware program is like
having a healthy immune system. As your immune system moves through your body
looking for and killing off invading viral cells, anti-malware scans for files and malicious
code that don’t belong on your system and gets rid of them.
The free version of Malwarebytes is a good place to start if you know or suspect your
computer has a virus. Available for Windows and Mac, the free version of Malwarebytes
will scan for malware infections and clean them up after the fact. Get a free premium trial
of Malwarebytes for Windows or Malwarebytes for Mac to stop infections before they
start.
SELF-CHECK 2.1-8
A. ENUMERATION: List down the Create your data backup strategy: A
comprehensive guide
1.
2.
3.
4.
5.
6.
materials,
you should be able to Preventive Maintenance of Computer System
and Network ff. Standard operating procedures within 1 hour
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-8
YES NO
CRITERIA
Did you......
Wear your ppe
Open the Control Panel (easiest way is to search for it or ask Cortana).
You have options for where you want to save the backup image: external hard drive or
DVDs. I suggest the former, even if your computer has a DVD-RW drive, so connect
your external drive to your PC, select On a hard disk and click Next.
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-9
Cleaning Computer Systems and Networks
LEARNING OBJECTIVES:
From dusty computer fans to fingerprints on compact discs, computer parts and devices
can get awfully dirty. Here are some tips to help keep things clean.
From dusty computer fans to fingerprints on compact discs, computer parts and devices
can get awfully dirty from normal everyday use or when left sitting unused. The best way
to have any computer component cleaned is to have it professionally serviced, but if you
no longer have a service warranty, or if you picked up a second-hand item and want to
clean it to see if it even works, here are some tips on how to clean some common items.
General Precautions
When working around electronics there are some precautions you should always take
when cleaning:
• The best way to clean any computer component or device is to follow the
manufacturer's instructions in your user manual.
• Always power off the system first
• Always use anti-static wristband or other professional grounding devices
• Never work on carpeted surfaces
• Never spray cleaning fluids directly onto computer components. Always spray the
cleaner onto a cloth then wipe
• Do not allow any cleaner to run or drip near circuit boards, or near seams on device
casings.
• Never allow circuits or electronics to become damp or wet.
• Some cleaning solvents can damage components. In most cases, water will work just as well.
• Cleaning electronics and circuit boards requires experience, knowledge and special
electronics cleaners. This type of cleaning is best left to professionals.
General Cleaning Tricks & Tips
• If compressed air is too strong for little dust jobs, try using a plastic liquid medicine
plunger style dispenser. Pull the plunger all the way back to fill it with air and then push it
forward quickly for a quick output of air to blow away dust in small places such as USB
ports or SD memory card slots. The small ends of these dispensers enable you to reach a
more concentrated area with the air then you could get with just blowing our air yourself
(from your mouth).
• When using compressed air, always release in short blasts. Longer blasts can actually result
in condensation.
• Anti-static cloths are great for attracting dust and are safe to use around computer
equipment.
• The cleaner you keep your work space, the cleaner your equipment will be
• Be sure to hang on to your user manuals as they provide you with the best cleaning
methods for that particular device.
Cleaning your computer’s hardware and software is important for a lot of reasons.
Clean hardware can help your computer run more smoothly and extend your computer’s
lifespan, which can save time and money. Regular cleaning protects your investment and
your data. When you wipe off the screen and empty crumbs from your keyboard, you’re
helping your equipment perform better and you reduce the risk it will break down.
Dust and other unwanted dirt can build up and suffocate your PC’s hardware. By regularly
cleaning dust out of the fan vents and case, you can help protect the system from
overheating and causing permanent damage to the internal parts of your computer and the
information you store on it.
How often does it need to be done? If you don’t want to hurt your PC’s performance and
lifespan with the added stress and heat, give it a good cleaning at least every six month to a
year.
While the average user’s computer lasts several years, true cleaning of hardware and
software could extend your PC’s useful life by a few more years.
Clean software helps protect your data. Antivirus software and regular program updates
help ensure viruses, malware, and cybercriminals stay out of your system.
When you back up your files, delete unused programs, and perform maintenance tasks like
defragmenting the hard drive, you help to ensure your computer can save your files
without accidentally corrupting them.
You probably like a tidy home. It’s a good idea to keep your computer tidy, too. For
instance, using an external hard drive or cloud-based storage can declutter your computer
while helping to keep valuable data safe and secure.
Dust, food, liquid, and other particles can get stuck underneath the keys on your keyboard,
which can prevent it from working properly. The basic cleaning tips below can help keep
your keyboard clean.
1. Unplug the keyboard from the USB or PS/2 port. If the keyboard is plugged into the
PS/2 port, you will need to shut down the computer before unplugging it.
2. Turn the keyboard upside down and gently shake it to remove dirt and dust.
3. Use a can of compressed air to clean between the keys.
4. Moisten a cotton cloth or paper towel with rubbing alcohol and use it to
clean the tops of the keys. Do not pour alcohol or any other liquid directly
onto the keys. 5
5. Reconnect the keyboard to the computer once it is dry. If you
are connecting it to a PS/2 port, you will need to connect
it before turning on the computer.
Dealing with liquids
If you spill liquid on the keyboard, quickly shut down the computer and disconnect the
keyboard. Then turn the keyboard upside down and allow the liquid to drain.
If the liquid is sticky, you will need to hold the keyboard on its side under running water to
rinse away the sticky liquid. Then turn the keyboard upside down to drain for two days
before reconnecting it. Please note that keyboard may not be fixable at this point, but the
method above is probably the best option.
To prevent this situation altogether, we recommend keeping drinks away from the
computer area.
There are two main mouse types: optical and mechanical. Each is cleaned in basically the
same way, although the mechanical mouse requires a bit more work.
• Optical mice require no internal cleaning because they do not contain any
rotating parts; however, they can get sticky over time as dust collects near
the light emitter. This can cause erratic cursor movement or prevent the
mouse from working properly.
The basic cleaning tips below will help keep your mouse clean:
1. Unplug the mouse from the USB or PS/2 port. If the mouse is plugged
into the PS/2 port, you will need to shut down the computer before
unplugging it.
2. Moisten a cotton cloth with rubbing alcohol, and use it to clean the top
and bottom of the mouse.
Dirt, fingerprints, and dust can make your computer screen difficult to read; however, it's
easy to clean your screen when needed. There are monitorcleaning kits you can buy, but
they may damage your monitor if they're designed for a different type of monitor. For
example, a monitor cleaner that is designed for glass screens may not work with some non-
glass LCD screens. The safest method is simply to use a soft clean cloth moistened with
water.
Do not use glass cleaner to clean a monitor. Many screens have anti-glare coatings that can
be damaged by glass cleaner.
1. Turn off the computer.
2. Unplug the monitor from the power. If you are using a laptop, unplug the laptop.
3. Use a soft clean cloth moistened with water to wipe the screen clean.
Do not spray any liquids directly onto the screen. The liquid could leak into the monitor
and damage the internal components.
Tips for cleaning other computer surfaces
From time to time, you should clean your computer case and the sides and back of the
monitor to avoid a buildup of dust and dirt. Here are a few tips you can use when cleaning
these surfaces.
1. Dust is your computer's main enemy. Use an antistatic cloth to lightly dust your
computer casing. Do not use furniture cleaners or strong solvents.
2. Use a can of compressed air to blow out debris from the air intake
slots.
3. Ammonia diluted with water—or glass cleaner comprised mostly of
ammonia and water—is a safe cleaning solution for computer surfaces. The
milder the solution, the better.
4. Clean the monitor housing and case (but not the monitor screen) by
spraying a safe cleaning solution onto a paper towel or anti-static cloth and
wiping in a downward motion.
Keep it cool
Don't restrict airflow around your computer. A computer can generate a lot of heat, so the
casing has fans that keep it from overheating. Avoid stacking papers, books, and other
items around your computer.
Many computer desks have an enclosed compartment for the computer case. If you have
this type of desk, you may want to position the case so it is not
against the back side of the desk. If the compartment has a door, you may want to leave it
open to improve airflow.
Your computer faces many potential threats, including viruses, malware, and hard drive
failure. This is why it's important to do everything you can to protect your computer and
your files.
Safeguarding against malware
Malware is any type of software that is designed to damage your computer or gain
unauthorized access to your personal information. It includes viruses, worms, Trojan
horses, and spyware. Most malware is distributed over the Internet and is often bundled
with other software.
The best way to guard against malware is to install antivirus software, such as Bitdefender,
Norton, or Kaspersky. Antivirus software helps to prevent malware from being installed,
and it can also remove malware from your computer.
It's also important to stay smart when you're browsing the Web or using email. If a website
or email attachment looks suspicious, trust your instincts. Keep in mind that your antivirus
program may not catch everything, so it's best to avoid downloading anything that might
contain malware.
You can purchase an external hard drive and copy the contents of your computer to it. The
initial backup could take several hours, so you will need to select a period of time when you
do not need access to your computer. Running the backup overnight usually works best.
Follow-up backups should be conducted on a regular basis, but they should not take as
long.
One drawback is that an external hard drive can be lost, damaged, or stolen— just as your
computer might be. This is why it's important to keep your drive in a secure location when
not in use.
Online backup services
One drawback to online backup services is that the initial backup can be slow and may
even take days to upload if you have a lot of files. However, subsequent backups should
not take as long.
To keep your computer running smoothly, it's important to keep files and folders
uncluttered. Cluttered or unorganized folders make it more difficult to find the files you
need. Additionally, unwanted files can eventually fill up your hard drive, which will make
your computer slower and more difficult to use. Here are a few things you can do to delete
unwanted files and improve your computer's performance.
• Delete files: If you have any unwanted files, you can delete them manually. To do this,
drag them to the Recycle Bin or Trash, then empty it to permanently delete the files.
• Run the Disk Defragmenter: Windows includes a Disk Defragmenter program in the
Control Panel. If your computer is running slowly, running Disk Defragmenter can help
to speed it up.
• Run a Disk Cleanup: Windows also includes a Disk
Cleanup program in the Control Panel. It scans your computer for
temporary files and other files that can be deleted. You can then delete the
files to free up space on your hard drive.
Creating a safe workspace
In addition to keeping your computer healthy, it's important to think about your own
health. Using a computer involves a lot of repetitive motions such as typing and using the
mouse. Over time, these motions can begin to negatively impact your body, especially your
wrists, neck, and back. Staring at a monitor for long periods of time can also cause eye
strain. To minimize these risks, you should take a few moments to make sure your
workspace is
arranged in a comfortable and healthy way.
Computer ergonomics is the science of equipment design and how specific equipment usage
and placement can reduce a user's discomfort and increase productivity. Some equipment
is designed with special attention to ergonomics, like ergonomic keyboards and ergonomic
chairs.
Here are a few tips to help you avoid injury in your workspace.
• Adjust your chair: Make sure your chair is adjusted to allow you to sit in a
natural, comfortable position. Many office chairs are specially designed to support
the lower back and promote good posture.
• Keep the keyboard at a comfortable height: Try to place the keyboard in a
position that allows you to keep your wrists straight and relaxed to avoid wrist
strain. Many desks have a keyboard tray that can keep the keyboard at a better
height. You can also buy an ergonomic keyboard that is designed to minimize wrist
strain.
• Keep the mouse close to the keyboard: If possible, place the mouse right next
to the keyboard. If the mouse is too far away, it may be uncomfortable or
awkward to reach for it.
• Place the monitor at a comfortable distance: The ideal position for a monitor
is 20 to 40 inches away from your eyes. It should also be at eye level or
slightly lower.
• Avoid clutter: The computer area can quickly
become cluttered with paper, computer accessories, and other items. By keeping
this area as uncluttered as possible, you can improve your productivity and
prevent strain and injury.
• Take frequent breaks: It's important to take breaks while you're working at
your computer. To avoid eye strain, you should look away from the monitor
every once in a while. You can also stand up and walk around to avoid
sitting in the same position for long periods of time. Programs such as
Workrave can automatically remind you to take breaks.
SELF-CHECK 2.1-9
1.
2.
3.
4.
5.
6.
3. What is the basic cleaning tips below can help keep your keyboard clean?
4. What is the basic cleaning tips below will help keep your mouse clean
you should be able to Cleaning Computer Systems and Networks and Network ff.
Standard operating procedures within 3 hour
Procedure:
4. Follow the steps / procedures below How to clean your computer, Step
1: Hardware
1. Wipe down your computer.
2. Clean Your keyboard.
3. Blow dust buildup out of computer vents, fans and accessories.
4. Run check disk tool.
5. Check surge protector.
6. Keep PC ventilated.
7. Back up your hard drives.
8. Get antivirus software to protect from malware.
Assessment
Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-9
YES NO
CRITERIA
Did you......
Wear your ppe
Keep PC ventilated
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
Diagnostic Procedures
LEARNING OBJECTIVES:
Taking a systematic approach to troubleshooting PC issues will save you time and
frustration and get your clients back to work more quickly.
It's a given: PCs go south and do so often. Whether it's hardware, software, or user error,
there will always be something in the way of that PC running smoothly. Problem is, there
are so many things that can go wrong, it's often difficult to know where to start to simply
discover the problem.
I do a lot of remote support, so I've had to learn many ways to troubleshoot a sick PC
without the luxury of being in front of the patient. Of course, there are countless routes to
take with this process, but I thought I'd share the steps I like to follow. These are not your
standard "Run your antivirus" or "Defrag the drive" approaches, either. This is the method
I follow from the beginning of the phone call to the client.
1: Describe the problem
The first thing I have the client do is describe the problem. Before jumping onto the PC, I
gather as much information as possible. This means having the client describe what is
happening, when it started happening, and whether there was any particular incident that
coincided with the problem starting. Many times, this information gathering will lead you
directly to the solution. Sometimes, the information gathering will lead you to realize a
reboot is all that is necessary to solve the problem.
2: Define the affected subsystem
There are instances when a problem is isolated to a specific subsystem of a machine --
such as printing. Although you might think this a no-brainer, many end users will call
saying, "My computer isn't working," when in reality what they mean is, "My printer isn't
printing." In some cases, multiple subsystems might be affected, such as printing and
mapped network drives... you can see where this is leading. If multiple subsystems are
having issues, the combination of those will often lead you directly to a solution.
3: Is it hardware or software?
If a client describes an issue such as a slow PC, one of the first things I do is check out the
hardware. Is there enough RAM? Is there enough free space on the C drive? And if the
problem is network related, are the lights on the network card blinking, on, or dark? If
these don't highlight an issue, don't immediately assume the issue is software related --there
could be hard drive issues. But before you dig deeper into hardware issues, this would be a
good jumping point for software. If nothing becomes apparent after you've investigated
software issues, come back to hardware and do a drive test or defrag.
4: Diagnose printing woes
Printers can be tricky. But there are ways to make this troubleshooting job a bit easier.
First, find out what type of printer you are dealing with. If the printer is a networked
printer, make sure the network is actually up. If it is, ask whether other machines can print
to the printer in question. If they can, check to see whether any jobs are stuck in the
machine's printer queue. If you open up the Printers And Devices window and the printer is
not listed, find out if it just recently disappeared. If it did, the driver most likely is corrupt
and will need to removed from within Regedit. If the printer is still listed and no jobs are in
the queue, have the client restart the machine and then try to print. A good restart will cure
a host of woes in Windows.
5: Deal with networking trauma
Can the client see the internal servers? If not, can they open their browser and see
google.com? If not, this becomes a challenge, as you can't do remote troubleshooting. But
never fear, help is near. I start by walking the client through rebooting the machine and
starting in safe mode. Usually, if there isn't an actual hardware issue, safe mode will
circumvent the nasties that are keeping the machine from getting online. Once in safe mode,
let the fun begin!
Of course, if no one can get online, the first thing to be done is power cycling the
router/modem/switch hardware. If that fails, there is always DNS to troubleshoot. But that
gets beyond standard triage (as it will often lead you away from the client machine and to a
DNS server issue).
6: Resolve login issues
How often do you get this one: "Where's my password?" A client calls in to say they can't
log into their computer. Have they forgotten their password? Is the machine on a domain?
If it's on a domain, is the machine online? There are so many problems with this one, it's
hard to know where to start. But here's the first thing you should do: If the client is on a
domain and you have access to their Active Directory server, try to log onto that server with
their credentials. If
you can do that, the issue has been narrowed down to either their network connection or
the manner in which they are logging in. If they are to be logging in to a domain, make sure
they are doing so at their computer and not logging in to the local machine.
7: Troubleshoot specific software
Sometimes, it will boil down to a single piece of software that's giving the user fits. This, in
turn, can give the support technician fits (especially if it's a niche piece of software). The
first thing I would do is double-check to make sure the issue is, in fact, isolated to one
particular piece of software. If the problem is network related and all other applications
can get online, the issue is most likely isolated to that one piece of software. If so, and the
software depends upon a network connection, make sure neither the firewall or the
antivirus software has started blocking the software from getting packets in or out. When I
discover the problem is isolated to a single piece of software, often a repair install will solve
the issue.
8: Look for virus issues
I find that 50 percent of support calls wind up being viruses. Since viruses cause all sorts of
differing behavior, how can you quickly determine whether the issue is a virus? I know
support techs who have spent hours trying to track down a virus on a machine that wasn't
actually infected. There are a few questions I like to ask. The first is "What behavior is
your computer displaying that makes you believe it has a virus?" The answer to that
question will dictate where you go from there. Other questions to ask are:
• Did your computer recently show signs of drastic slowdown?
• Are strange or unwanted popup windows appearing at random times?
• Were you recently on a Web site you don't normally visit?
• Did someone else use your machine?
• Did you recently open an email attachment?
• Has a strange security window recently started popping up?
The above questions will help guide you in the right direction to help cure a possibly
infected PC.
9: Ask for a demonstration
If a discussion about the issue brings up nothing and you can remote into the user's PC, it
will do you a world of good to see the problem in action. This is especially true when the
issue is unique to a client's PC, network, or software. Although the majority of issues can be
figured out from description, some issues simply need to be viewed in action. Have the
client reproduce the error for you. Make sure the error happens in the same way every
time. With this
visual reproduction, you will have confirmation that there is an issue, and you'll have a
definitive place with which to start your troubleshooting.
10: Use your tools
When all else fails, you have that outstanding collection of tools you can use to throw at a
machine. When this is the case, I tend to start with the most innocuous software, such as
Malwarebytes, and then go up from there. This is a good time to run those hard drive
diagnostic tools (should the issue possibly point toward a faulty or degraded drive). This is
the kitchen sink approach and can sometimes lead to more issues. But when you've gone
down every rabbit hole you can think of, it might be your best shot.
POST
Your computer completes a Power On Self Test, or POST, every time you turn on your
computer. POST performs basic diagnostics on your computer’s memory and hard drives,
checks for the presence of a keyboard and mouse, and tests the clock and other system
settings. POST resides in a small, permanent memory area called BIOS, which stands for
Basic Input Output System; this contains compact, simple programs the computer uses
when you first turn it on. If a problem exists with the computer’s hardware, POST signals
this through coded audio beeps. Though hardware makers have produced different
versions of POST over the years, they all ensure that the computer works correctly before it
starts the operating system.
Check Disk
The program “CHKDSK,” or Check Disk, is part of Microsoft’s Windows software. It tests
and repairs the file system information on hard drives. For example, if you work on your
computer during a storm, a sudden power failure may shut your computer down
immediately. Electrical noise from the power line may write random data into hard drive
files that were open as you worked. This random data can corrupt the Windows file system,
making files unreadable. If Windows senses a problem with the file system, it runs Check
Disk automatically when you restart your computer; you can run it manually from
Windows Explorer or a command prompt. Check Disk scans the file structure, looking for
and reporting on problems. If you run it in “fix” mode --“chkdsk /f” -- the program
attempts to repair any damage it finds. Check Disk is sophisticated and fixes file system
problems for the vast majority of cases.
Task Manager
The Windows operating system runs dozens of programs on your computer and you will
seldom notice them unless problems arise. These programs monitor the state of your
printer, network, mobile devices and other hardware. If your computer becomes unusually
sluggish, the cause may be one of these programs running excessively. The Windows Task
Manager displays a list of all the programs running on your computer, along with the
amount of memory they consume and how active they are. To see the Task Manager, press
"Ctrl-Shift-Esc.” If a program in the Task Manager window uses more than 20 percent of
the computer’s CPU time for a prolonged period, the program may be caught in an error
state. To solve this problem, try restarting the computer.
Windows Defender
If your PC has a malware infection, your computer’s performance suffers. Malware may
cause your Web browser to display unwanted pop-up ads and you may experience other
annoyances. The Windows operating system includes a program called Windows Defender,
which scans your hard drives for viruses, spyware and other malicious programs. Windows
Defender reports on the problems it finds, isolates the malware and removes it.
Windows Defender uses a database of known malware, and the database is continually
updated by Microsoft so that the program catches even the newest viruses.
Drivers
Your PC uses a variety of devices for data storage, communications, input and display.
Each of these has a program called a driver that carries data between the hardware and
Windows. Frequently, drivers have a diagnostic capability that checks the device’s
operation and troubleshoots problems. Windows organizes these drivers in its Device
Manager, which you can see by clicking the Windows "Start" button, right-clicking
“Computer,” selecting “Properties” and clicking the “Device Manager.”
Techniques for Diagnosing Computer Systems
Computer Diagnosis
Sometimes when the problem
with a system is not totally
apparent and the problem
may be intermittent, using a
basic common diagnostic
procedure may help
determine what is wrong.
5. Problem Isolation
Problem isolation is a detective work in which you need to determine what is out of the
ordinary by making detailed observation of what is not working normally and record any
information as you proceed. The information you will be able to gather will help
diagnose your computer. You need to observe wisely. Look for any abnormalities in the
unit, any change in smell or foreign smell, listen to all the sounds, and error codes. 6
6. Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor, system unit, and
printers. Some have multiple external devices. To troubleshoot, you need to isolate
major components which are failing to operate.
Software
Things to Consider
There are many devices, parts, cords, and connections on a computer, which means
that there are many possible problems that could arise. In addition, your computer uses
a variety of software, which can also cause problems. However, no matter what the
problem is, you can use the following tips to help you find a solution:
Always check the cables: Many computer problems are related to an issue in the
cables and connections. The easiest first step you can take to troubleshoot most
problems is to check all related cables and connections.
Isolate the problem: If possible, try to isolate the problem. For example, if you can't
get the cursor to move on the screen, try to determine if the issue is with the mouse. If
you have an extra mouse, you can alternate devices to see if the one plugged in is the
issue, or use the arrow keys on the keyboard to help determine if the mouse is the source
of the problem. When trying to isolate the problem, only make one change at a time.
Take notes about error messages: If your computer gives you error messages, be sure
to write down as much information as possible. If the basic troubleshooting steps don't
work, you may need the information.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't repeat
yourself. If you can't remember it, then write it down. If you end up asking someone for
help, it will be much easier if they know exactly which steps you've taken.
1. 6.
2. 7.
3. 8.
4. 9.
5. 10
1. 4
2. 5
3. 6
Diagnostic Procedures
Performance Objective: given necessary tools,equipment and
materials,
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-1
YES NO
CRITERIA
Did you......
Wear your ppe
Physical examination
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
ASSESSMENT CRITERIA:
RESOURCES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-2
LEARNING OBJECTIVES:
Fault-Isolation Definitions
Filters
Determining the cause of a problem. Also known as "fault diagnosis," the term may refer
to hardware or software, but always deals with methods that can isolate the component,
device or software module causing the error. Fault isolation may be part of hardware
design at the circuit level all the way up to the complete system. It is accomplished by
building in test circuits and/or by dividing operations into multiple regions or components
that can be monitored separately. After fault isolation is accomplished, parts can be
replaced manually or automatically (see fault tolerant).Fault Isolation vs. Fault
DetectionAlthough the terms "fault isolation" and "fault detection" are sometimes used
synonymously, fault detection means determining that a problem has occurred, whereas
fault isolation pinpoints the exact cause and location.Built Into Normal OperationSoftware
can also be created and run with fault isolation in mind. Many techniques can be used. For
example, program modules can be run in different address spaces to achieve separation. In
addition, generating intermediate output that can be examined as well as recording
operational steps in a log are ways to assist the troubleshooter to manually determine which
routine caused the application to stop working or stop working properly.In a network,
intelligent agents can be placed in various nodes that continuously collect traffic statistics
that are analyzed in real time to detect and pinpoint the fault. See fault detection.
Problem Isolation
Troubleshooting requires that you find the root cause of the problem and then fix it. The
process to find the root cause begins with problem isolation. Problem isolation moves you
from the general ideas about a problem, to a specific idea of what the problem is, as follows:
Before problem isolation: I have no idea, except for some general symptoms.
After problem isolation: I have an idea of what is not working, a comparison to how it
should be working, and I know on which devices it should be working differently.
Isolate Computer Problems
• Approach the problem systematically: start at the beginning and walk through the
situation in a careful way. Remember it and apply it every time.
• Divide and conquer: This rue is the most powerful. Isolate the problem. In the overall
system, remove one software or hardware component after another, until the problem is
isolated to a small part of the whole system.
• Don’t overlook the obvious: ask simple questions. Is the computer plugged in? Is it
turned on? Is the monitor plugged in? Most problems are so simple that we overlook them
because we expect the problem to be difficult.
• Check the simple things first: it is more effective to first check the components that are
easiest to replace.
• Make no assumptions
• Write things down: keep noting down the symptoms. They will help you think more
clearly.
• Reboot and start over: This is an important rule. Fresh starts are good for us and
uncover events or steps that might have been overlooked.
• Keep your cool: In an emergency, protect the data and software by carefully
considering your options before acting, by not assuming data is lost even when hard drive
and floppy drive errors occur, and by taking practical precautions to protect software and
OS files.
-Loose wires
- Broken wires
- Blown fuses
- Missing jumpers
- Loose connectors
- Broken IC leads
When solving a computer problem, apply above rules and, prepare course of action. The
course of action involves the, following:
Utility Software
One of the most valuable benefits of conducting an asset discovery project is the large
amount of data that is obtained about the client and server computers on the
network. When you start designing and planning your
isolation zones, you must make decisions that require accurate information about the
state of all hosts to ensure that they can use IPsec as planned.
• Computer name. This name is the computer's NetBIOS or DNS name that identifies the
computer on the network. Because a computer can have more than one media access
control (MAC) or IP address, the computer's name is one of the criteria that can be used to
determine uniqueness on the network. Because computer names can be duplicated under
some circumstances, the uniqueness should not be considered absolute.
• IP address for each network adapter. The IP address is the address that is used with the
subnet mask to identify a host on the network. An IP address is not an effective way to
identify an asset because it is often subject to change.
• Operating system, service pack, and hotfix versions. The operating system version is a
key factor in determining the ability of a host to communicate by using IPsec. It is also
important to track the current state of service packs and updates that might be installed,
because these are often used to determine that minimum security standards have been met.
• Domain membership. This information is used to determine whether a computer can
obtain IPsec policy from Active Directory or whether it must use a local IPsec policy.
• Physical location. This information is just the location of the device in your organization.
It can be used to determine whether a device can participate in a specific isolation group
based on its location or the location of the devices that it communicates with regularly.
• Hardware type or role. Some tools that perform host discovery can provide this
information by querying the hardware information and running applications to determine
its type, such as server, workstation, or portable computer. You can use this information to
determine the appropriate IPsec policy to assign, whether a specific computer can
participate in isolation, and in which isolation group to include the computer.
After collecting all this information and consolidating it into a database, perform regular
discovery efforts periodically to keep the information current. You need the most complete
and up-to-date picture of the managed hosts on their networks to create a design that
matches your organization's requirements.
You can use various methods to gather data from the hosts on the network. These methods
range from high-end, fully automated systems to completely
manual data collection. Generally, the use of automated methods to gather data is
preferred over manual methods for reasons of speed and accuracy.
Automated Discovery
The biggest difference between manual discovery methods and automated methods is time.
You can use the Windows Script Host (WSH), VBScript, and Windows Management
Instrumentation (WMI) to create a script file that can collect the system configuration
information. VBScript and WMI are built-in to Windows 8, Windows 7, Windows Vista,
Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2. Starting with
Windows Server 2008, Windows PowerShell is included with the operating system. For
more information, see “Scripting with Windows PowerShell”
(https://go.microsoft.com/fwlink/?linkid=110413).
Whether you use an automatic, manual, or hybrid option to gather the information, one of
the biggest issues that can cause problems to the design is capturing the changes between
the original inventory scan and the point at which the implementation is ready to start.
After the first scan has been completed, make support staff aware that all additional
changes must be recorded and the updates noted in the inventory.
This inventory will be critical for planning and implementing your Windows Firewall with
Advanced Security design.
How To Create A System Diagnostics Report In Windows 7
Your PC with Windows 7 is not running as it should? Or are you experiencing slow downs
or other errors regularly? Then it may be time to run a System Diagnostics report in
Windows 7 to find out why.
Windows 7 comes with several internal tools that can be used to diagnose the computer
system. One of them is the System Diagnostics Report which is part of the Windows Control
Panel.
Microsoft has hidden the tool deep inside the Control Panel which is why the majority of
users has probably never heard of the option before.
To run the system diagnostics report users need to open the Windows Control Panel first.
They can do that by clicking on the Start Orb and selected Control Panel from the start
menu. They then need to click on Performance Information and Tools, and there on
Advanced Tools in the left sidebar.
This opens a listing of tools to get additional performance and system information.
Locate the Generate a system health report link near the bottom of the listing and click
on it.
Windows will automatically start collecting data for 60 seconds to analyze the data
afterwards.
The report lists warnings at the top of the results window and test information below that.
Warnings can for instance remind the user that no antivirus software is installed.
The Basic system checks group lists checks that have been performed by the system
diagnostics tool and how the system fared in the tests. Results are shown for each test
which should read passed for successful tests.
Basic System Checks
El Hardware Device and Driver Checks G Passed Survey of Windows Management Infrastructure supported devices.
Performance
Resource Overview
FEASIBILITY STUDY
Situation in which the Project Exists: This proposal is for a data communication
network to serve the Maryland public education system.
The Maryland legislature recently approved funding sufficient to pay for the
development of this proposal. Pending proposal acceptance by the Maryland State
Public Education Office of Technology (a department within the state Office of
Education), funding will be sought to implement the proposal.
Network Scope: The proposed network is designed to serve the state Office of Education
and two of its school district offices. The state office, located in Kenzington, contains five
departments to be served by this network. Each district office contains four departments to
be served. The North School District is located in Ricksville, 25 miles from the state office.
The South School District is located in Albanton, about 40 miles from the state office. Note
that this network does not serve instructional needs of students; other resources have been
allocated for that purpose. This network is for administrative purposes and is specifically
designed to be independent of student computing facilities.
Intended Users. The primary users of the network at the state level will be the three
administrators, three secretaries, ten members of the Curriculum Department, eight
members of the Human Resource Department, six members of the Finance/Accounting
Department, and three members of the Computer Services Department. At the district level
the primary users will be four administrators, four secretaries, four members of the
Computer Services Department, sixteen members of the Human Resource Department, and
two members of the Finance/Accounting Department. Parents, pre-service teachers,
teachers, and the public are secondary users of the network in that they will receive
information produced on the network, but they will not directly use the network.
1. The State Education Network has a firewall that protects all information coming and
going from the network. 2
Data Types. The types of data served by the network will be reports, bulletins,
accounting information, personnel profiles, and web pages. The majority of the data will
be text (ASCII and non-ASCII), but there will be some still graphics and possibly a small
amount of voice and video (primarily for PC-based teleconferencing).
Data Sources. Data will be created and used at all end stations on the network. The data
will be produced by software applications in Windows 2000, primarily Dream Weaver
and Office 2000 Professional (Word, Excel, Access, PowerPoint, and Outlook). Other
data sources to be supported on at least a limited basis will Windows 2000 Accessories
(Paint, Notepad, etc.), NetMeeting, Media Player, and PhotoShop. Note that the network
will be not be accessible from outside...
Numbers of Users and Priority Levels. At the state level, the users will be
administrators, secretaries, and members of four departments. At the district levels, the
users will be administrators, secretaries, and members of three departments. The
maximum estimated number of users on the network at any given time is 100: 33 regular
users in the State Office, 30 regular users in the North District Office, 30 regular users in
the South District Office, and seven otherwise unanticipated users.
Three priority levels will be supported: management (top priority), user (medium priority),
and background (low priority). Note that these designations do not correspond to
administrative levels in the Maryland public education system; rather, they are network
service levels. Network management processes will receive top-priority service; most
network processes will receive medium-priority service; a few processes (e.g., e-mail
transfers, backup, etc.) will be given low-priority service. It should be noted that network
management will usually consume a small amount of the available bandwidth; this means
that management and user processes will usually enjoy identical support.
Background processes will also usually receive more than adequate service, but they
will be delayed as needed to maintain support for management and user services.
Load Variation Estimates. Interviews with users and observation of LAN use at the three
locations yielded data on hourly average and peak loads from January to March, 2001. The
data are tabulated in the appendix. The data indicate that the highest average traffic
volume will occur from 8:00 a.m. to 6:00 p.m., Monday through Friday. The peak network
traffic volume is expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00
p.m. to 5:00 p.m. At night and on weekends the network traffic is minimal except for the
daily backups of the PCs to the LAN servers in the districts and several batch data
transfers anticipated from the districts to the State Office. The data indicate the following
network design parameters:
• The average required throughput on any LAN during work hours (7:00 a.m. to 6:00
p.m.) will be only about 0.2 mbps.
• The average required throughput on the WAN during work hours (7:00 a.m. to 6:00
p.m.) will be only 0.04 mbps.
• The peak expected traffic load on any LAN will be about 10.4 mbps.
• The peak expected traffic load on the WAN will be about 6.4 mbps.
Of course, to avoid user complaints, the network is designed for the peak traffic loads, not
the average throughput.
Stora.ge Requirements. Storage requirements need to be large enough to store all student,
teacher, and state data (note: student data are data about students, not data generated by
students). Interviews and observations of users’ present and anticipated storage
requirements indicate that each user will need an average of 100 MB of server space (in
addition to secondary storage on local PCs); the maximum estimated server-side storage
requirement
per user is about 1 GB. Additionally, the network operating system will occupy about
500 MB on each LAN server. Taking price-performance issues into account, each PC
will have a minimum storage capacity of 10 GB, each LAN server will have a minimum
storage capacity of 20 GB. A main data server in the State Office will have a 36 GB
capacity.
SELF-CHECK 3.1-1
A. ENUMERATION: Write a capture the following Information from each
computer 1 2 3 4 5
1.
2.
3.
4.
5.
6.
B. List down the NETWORK NEEDS ANALYSIS
1. 5.
2. 6.
3. 7.
4. 8
1. 6
2. 7
3. 8
4. 9
5 10
_TASK SHEET 3.1-2_
you should be able to Identifying and Isolating Faults/Problems ff. standard operating
procedures within 2 hour
Steps / Procedure:
YES NO
CRITERIA
Did you......
Wear your ppe
Collect the Evidence. All the evidence collected must be relevant to the problem in hand
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Getting to grips with problems relating to your computer network can be a frustrating
affair, but it’s one which is likely to happen on a daily basis.
Computer networks are, after all, highly complex systems that comprise various
components and are in use by multiple users. These structures may
bring many benefits, but they can also be a recipe for disaster. And, if your network fails or
experiences any issues, then your organization’s productivity is going to be affected.
Your main objective, with your computer network, should be to keep it online and
functioning correctly. But you can only do this if you know what the most
common computer network problems are, so let’s take a look:
• Slow Connectivity: If there’s one thing that frustrates an employee then it’s
slow connectivity over a network. PCs can grind to a halt and even the simplest task can
take an age to complete. It’s often caused by large file transfers, so a limit should be put in
place on the size that is permitted e.g. no email attachments that total more than 20mb as a
standard rule. Sometimes this lag can also be caused by faulty network cards, so it’s
important to investigate this possibility.
• IP Conflicts: Each PC on your network should have a unique IP address such as
209.85.255.255, but sometimes two PCs can be assigned
the same IP address. And this can create major connectivity issues for both parties.
Sometimes these conflicts will work themselves out, but you can help speed up the
process. Restarting the router is the simplest approach as it should assign new IP
addresses to every PC on the network.
• Unable to Connect to Local Printer: Printers on a network tend to be shared by
multiple users, but occasionally an error can arise that leaves
people unable to access the printer. This problem is often caused by a sharing issue
whereby different security settings between PCs and the printers fail to agree with each
other. When this occurs it’s recommended that you check firewall settings and that
your Windows network adapters have printer sharing enabled.
• Faulty Cables: A computer network relies on cables to facilitate its connectivity. And
when just one cable fails it can have massive implications for your network. However,
it’s easy to overlook cables as the source of network issues. People tend to concentrate
on software and hardware troubleshooting first. Nonetheless, investigating the
condition of cables in the affected network area is vital. Cables can easily become
dislodged or damaged, so sometimes the fix can be as simple as plugging them back in
or replacing.
• Weak Wi-Fi Signal: If you rely on wireless connections in your organization then you
will be well aware of the issues caused a weak signal. This can often be caused by
environmental issues such as the presence of a microwave or even the layout of an
office. It’s important to eliminate these factors to identify the cause of the fault.
Alternatively the connection issues could be caused by out-dated firmware, so make
sure all updates are installed.
6. Computer is Slow
If your computer is slower than normal, you can often fix the problem simply by cleaning
the hard disk of unwanted files. You can also install a firewall, anti-virus and anti-
spyware tools, and schedule regular registry scans. External hard drives are great storage
solutions for overtaxed CPU’s, and will help your computer run faster.
7. Strange Noises
A lot of noise coming from your computer is generally a sign of either hardware
malfunction or a noisy fan. Hard drives often make noise just before they fail, so you may
want to back up information just in case, and fans are very easy to replace.
8. Slow Internet
To improve your Internet browser performance, you need to clear cookies and Internet
temporary files frequently. In the Windows search bar, type ‘%temp%’ and hit enter to
open the temporary files folder. 9
9. Overheating
If a computer case lacks a sufficient cooling system, then the computer’s
components may start to generate excess heat during operation. To avoid your computer
burning itself out, turn it off and let it rest if it’s getting hot. Additionally, you can check
the fan to make sure it’s working properly.
10. Dropped Internet Connections
Dropped Internet connections can be very frustrating. Often the problem is simple and
may be caused by a bad cable or phone line, which is easy to fix. More serious problems
include viruses, a bad network card or modem, or a problem with the driver.
Step 1: Check the severity of the infection by running a complete network scan to find
malicious files or programs. Make sure that your antivirus and antimalware programs are
up to date and able to scan hidden files, the root directory, and all running programs. Also,
try to have your antivirus/anti-malware software scan your e-mail inbox for any malicious
materials.
Step 2: Back up all of your system files using the necessary tools. Running a complete
system backup will ensure that your data isn’t lost and that the network will remain stable.
The Windows’ “System Restore” option will allow you to set up a restoration that can often
be useful in an emergency.
Step 3: Confine all suspicious, irregular files. Isolating them will prevent their exchanging
with other files or your network system. Then, disinfect or
completely wipe all quarantined files. Manually delete any emails that were identified
by your antivirus software.
2. Unable to Connect to the Internet
The Problem: The wireless network shows a signal, but my device won’t connect
Using a wireless network is great for mobility, but can hinder your productivity when it
decides to malfunction. There are a few different reasons why your wireless network is
having connectivity issues, such as the wireless router or the network card itself. This issue
will require a bit of network troubleshooting to find a solution, so let’s get to work:
The Solution:
Step 1: If your router won't connect to the internet, try putting your computer or device
right next to the router. If this causes your equipment to connect, then the system
hardware may have been the issue. If this didn’t fix the problem, proceed to Step 2.
Step 2: Update the network card. Sometimes, your network card will receive a strong
signal, but won’t be able to transmit it quickly and effectively resulting in the need for
network troubleshooting. Updating the driver might solve the problem entirely, but if it
doesn’t, you might need to contact your IT department or provider and consider
replacing the hardware altogether.
3.Duplicated IP Address
The Problem: I got an error message that says that the IP address is already in use.
A small error window just popped up on your screen saying that your IP address is already
in use. How is this even possible and what causes this IP address conflict? Well, there are a
few reasons why this can happen:
• Your system administrator could have assigned two computers on a local area network
(LAN) the same static IP address.
• Your internet service provider accidentally assigned two people the same IP address.
• The network’s Dynamic Host Configuration Protocol (DHCP) server has allowed
the same dynamic address to be assigned to multiple computers automatically.
• Your system administrator has assigned a static IP address to a computer within
the local network’s DHCP range, and the same address is automatically given by
the local DHCP server
These are just a few of the plethora of reasons why IP address conflicts take place.
Here are some ways to fix this issue:
The Solution:
Step 1: Click the “Start” button and click “Run”. Enter “cmd” into the text box and click
“OK”. The Windows command prompt will open.
Step 2: Type “ipconfig/renew” into the command prompt and press “Enter”. This will
refresh your dynamic IP address.
Step 3: Check your network connection. Your computer will receive an available IP
address that isn’t already taken.
Step 2: Select “Wi-Fi” on the left side of the window. Then, click “Advanced”, which is
located on the bottom right.
Step 3: On the next page, select the “TCP/IP” tab and then click “Renew DHCP Lease” on
the right side of the window.
4. Slow Performance
The Solution:
Note: Be sure to enforce proper network use by making sure that users aren’t viewing too
much digital content via streaming or continuously downloading large files. Doing so will
help you keep your bandwidth use under control. However, if you find that your employees
are utilizing the network correctly, it might be time to upgrade your network to meet your
business needs.
If you feel that the sluggishness of your applications is due to another issue, proceed to Step
1.
Step 1: Try restarting your PC. Sometimes, a quick reset will fix any and all issues right
away. Doing so will clear your system memory (RAM). If this works, remember to shut
down your PC when it’s not in use. If this doesn’t help, proceed to Step 2.
Step 2: Now, it’s time to check on your hard drive and make sure that it’s not approaching
the end of its lifespan. So, let’s run a hard drive check:
Windows
Right click on “Drive”. Then, click “Properties” and then click “Tools”. Click “Check
Now”. Select “Scan for and attempt recovery of bad sectors”. Doing this will stop your
computer from tapping into any malfunctioning areas of the hard drive.
Mac
Click “Applications” from the “Finder”, then “Utilities”, and then “Disk Utility”. Highlight
the hard drive that’s giving you trouble and then select “First Aid”.
If your hard drive is healthy, but you think it’s becoming too full with data, proceed to Step
3.
Step 3: Get rid of unnecessary files from programs that have gone unused. System backups
and restore points can eat up a lot of space, so don’t hang onto more versions of this
software than you need. You might also consider uploading your data onto the cloud to
save your hard drive.
Step 4: If you’ve completely deep-cleaned your computer and checked all of the possible
issues above, but your computer is still running slowly, it might be time to upgrade your
RAM so that your computer has more memory. Certain programs take more RAM to run
properly than others and if you don’t have enough RAM ready, your computer will not be
able to handle it. Look into RAM upgrade options.
5. IP Address Exhaustion
So, your network seems to have gone down. Your operating system has sent you an alert
stating that the address was not received from the DHCP server. You’ve just checked the
network adapter status and noticed that there’s actually no IP address to be found. What
now?
There are a few different reasons why this could happen. It could be that the DHCP server
is out of addresses, the device might be set to use a static address rather than a DHCP
address, or maybe the DHCP request from the device never made it to the server. Either
way, here’s what we need to do:
The Solution:
Step 1: Check the network interface card (NIC). You can find this by opening the control
panel, then the device manager. Then, select “Hardware and Sound”
and then select “Device Manager”. Expand the Network Adapters item to view all network
adapters, although you will most likely only have one. Verify that your system is
configured to utilize DHCP.
Step 2: Check the switch to see which virtual LAN (VLAN) the port is set as a member.
Verify that other devices on this particular VLAN are able to get an IP address. If they
can’t, the issue is that the network is not sending DHCP requests to the server.
If this issue is taking place with more than one device, then the issue is likely the server
itself.
6. VPN Errors
The Problem: I got an error message saying that my device was “unable to establish the
VPN connection” or error 800.
Your virtual private network (VPN) works to provide a safe connection between a local
client and a remote server. When you can’t connect to a VPN, you’ll receive an error
message that usually states something along the lines of “VPN error 800 - Unable to
establish the VPN connection”. This can happen if the client device disconnected from the
local network, the network’s firewall is blocking the VPN traffic, or if the name/address
specified for the VPN server was incorrect.
Here’s how you can fix this issue:
The Solution:
Step 1: Check the connection between the client and server. Attempt to connect to the
server from a different client device to verify whether the network issue is a widespread
issue or if it is affecting only one client.
Step 2: Verify that the name entered on the client side matches the server name given by
the VPN administrator. In some instances, users can specify an IP address rather than a
name, while it’s more typical for users to mistype the address than the name. VPN servers
can also change their IP addresses in some instances, especially DHCP networks.
Step 3: If the first two steps didn’t clear up the issue, now it’s time to make sure that the
firewall isn’t blocking your connection with the VPN. Do so by temporarily disabling it to
retry the connection. If this solves the problem, you need to update the firewall settings
specific to the port numbers that the VPN on the network is using to prevent this issue
from happening again.
If none of this troubleshooting solved the issue, it could be possible that the server is
overloaded with clients or that it is offline. Check with your IT department to see what can
be done.
7.Connection Errors and Network Connectivity
Step 1: Restart your computer. A quick reboot can often be a life-saver. If you’ve already
tried this or restarting the computer didn’t fix anything, proceed to Step 2.
Step 2: Restart your router or modem. DO NOT reset the router or modem or restore its
settings back to factory default. Simply turn the router or modem off and back on. If this
doesn’t work or only works for a moment, keep going to Step 3.
Step 3: If you are connected to your network via Ethernet cable, unplug the cable and then
reattach it. If needed, replace your network cable with a new or different cable to see if this
was the cause of the issue.
Step 4: If you’re connected via Wi-Fi when you see this error, it’s a possibility that the
network adapter is attempting to conserve power. Stop this by finding the Network and
Sharing Center in the Control Panel. Right click “Wi-Fi Connection”, select “Properties”,
click “Configure” and find the “Power Management” tab. Click and uncheck the option
that allows your computer to turn off device to conserve power.
Step 5: If you’ve tried all of this and there’s still no connection, unplug your router and
connect your computer directly to your modem. If this solves the issue, then your router is
likely to be malfunctioning. If not, contact the router manufacturer for support.
If the error remains and the network is still down, reach out to your internet service
provider for help.
SELF-CHECK 4.1-1
1. 6.
2. 7.
3. 8.
4. 9.
5. 10
1. 5.
2. 6.
3. 7.
4.
TASK SHEET 4.1-1
you should be able to defects in computer systems and networks ff. standard
operating procedures within 2 hour
Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-1
YES NO
CRITERIA
Did you.......
Wear your ppe
Use ipconfig
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with standard
procedures.
2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established procedures
4. Unplanned events or conditions are responded to in accordance with established
procedures.
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-2
Troubleshooting and Repair Techniques
LEARNING OBJECTIVES:
Do you know what to do if your screen goes blank? What if you can't seem to close an
application, or can't hear any sound from your speakers? Whenever you have a problem
with your computer, don't panic! There are many basic troubleshooting techniques you can
use to fix issues like this. In this lesson, we'll show you some simple things to try when
troubleshooting, as well as how to solve common problems you may encounter.
There are many different things that could cause a problem with your computer. No matter
what's causing the issue, troubleshooting will always be a process of trial and error—in
some cases, you may need to use several different approaches before you can find a
solution; other problems may be easy to fix. We recommend starting by using the following
tips.
• Write down your steps: Once you start troubleshooting, you may want to write down
each step you take. This way, you'll be able to remember exactly what you've done and can
avoid repeating the same mistakes. If you end up asking other people for help, it will be
much easier if they know exactly what you've tried already.
• Take notes about error messages: If your computer gives you an error message, be sure
to write down as much information as possible. You may be able to use this information
later to find out if other people are having the same error.
• Always check the cables: If you're having trouble with a specific piece of computer
hardware, such as your monitor or keyboard, an easy first step is to check all related cables
to make sure they're properly connected.
• Restart the computer: When all else fails, restarting the computer is a good thing to try.
This can solve a lot of basic issues you may experience with your computer.
Using the process of elimination
If you're having an issue with your computer, you may be able to find out what's wrong
using the process of elimination. This means you'll make a list of things that could be
causing the problem and then test them out one by one to eliminate them. Once you've
identified the source of your computer issue, it will be easier to find a solution.
Scenario:
Let's say you're trying to print out invitations for a birthday party, but the printer won't
print. You have some ideas about what could be causing this, so you go through them one
by one to see if you can eliminate any possible causes.
First, you check the printer to see that it's turned on and plugged in to the surge protector.
It is, so that's not the issue. Next, you check to make sure the printer's ink cartridge still has
ink and that there is paper loaded in the paper tray. Things look good in both cases, so you
know the issue has nothing to do with ink or paper.
Now you want to make sure the printer and computer are communicating correctly. If you
recently downloaded an update to your operating system, it
might interfere with the printer. But you know there haven't been any recent updates and
the printer was working yesterday, so you'll have to look elsewhere.
You check the printer's USB cord and find that it's not plugged in. You must have
unplugged it accidentally when you plugged something else into the computer earlier. Once
you plug in the USB cord, the printer starts working again. It looks like this printer issue is
solved!
This is just one example of an issue you might encounter while using a computer. In the rest
of this lesson, we'll talk about other common computer problems and some ways to solve
them.
Simple solutions to common problems
Most of the time, problems can be fixed using simple troubleshooting techniques, like
closing and reopening the program. It's important to try these simple solutions before
resorting to more extreme measures. If the problem still isn't fixed, you can try other
troubleshooting techniques.
Sometimes an application may become stuck, or frozen. When this happens, you won't
be able to close the window or click any buttons within the application.
• Solution 1: Force quit the application. On a PC, you can press (and hold)
Ctrl+Alt+Delete (the Control, Alt, and Delete keys) on your keyboard to open the Task
Manager. On a Mac, press and hold Command+Option+Esc. You can then select the
unresponsive application and click End task (or Force Quit on a Mac) to close it.
• Solution 2: Restart the computer. If you are unable to force quit an
application, restarting your computer will close all open apps.
Sometimes your computer may become completely unresponsive, or frozen. When this
happens, you won't be able to click anywhere on the screen, open or close applications, or
access shut-down options.
• Solution 1 (Windows only): Restart Windows Explorer. To do this, press and hold
Ctrl+Alt+Delete on your keyboard to open
the Task Manager. Next, locate and select Windows Explorer from the
Processes tab and click Restart. You may need to click More Details at the
bottom of the window to see the Processes tab.
If you still haven't found a solution to your problem, you may need to ask someone else
for help. As an easy starting point, we'd recommend searching the Web. It's possible that
other users have had similar problems, and solutions to these problems are often posted
online. Also, if you have a friend or family member who knows a lot about computers,
they may be able to help you.
Keep in mind that most computer problems have simple solutions, although it may take
some time to find them. For difficult problems, a more drastic solution may be required,
like reformatting your hard drive or reinstalling your
operating system. If you think you might need a solution like this, we recommend
consulting a professional first. If you're not a computer expert, it's possible that
attempting these solutions could make the situation worse.
SELF-CHECK 4.1-2
1.
2.
3.
4.
1.
2. 6.
3. 7.
4. 8.
TASK SHEET 4.1-2
Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-2
YES NO
CRITERIA
Did you.......
Wear your ppe
ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with standard
procedures.
2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established procedures
4. Unplanned events or conditions are responded to in accordance with established
procedures.
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-3
LEARNING OBJECTIVES:
Emergency IT Service
Help Desk Technical Support
In the ever changing world of technology, users are expected to be more and more self
sufficient in adapting to and using new technology. The problem is that your business may
rely on employees who are more creative in nature or managerial and technology does not
come naturally to them. A question or technical issue can stop a user's productivity and
lead to frustration, unless they have somewhere to turn for assistance from Help Desk
Technical Support and Problem Solving. In larger corporations, this is called the Help
Desk, where an entry-level IT person would answer questions and solve problems on
technical issues. Unfortunately it is rare, especially for a small or medium sized business, to
have their own Help Desk. We can fill this void by serving the role of Help Desk Technical
Support and provide assistance with problem solving.
Help Desk Tech Support
Your computer network is the most used, most relied upon, most critical
asset for running your business.....but it is probably the least appreciated.
There are two types of computer networks in business today. Those that were designed and
installed well by competent professionals, and those that were not. Most likely your
network falls into the second category because you are looking for help and reading this!
Most networks that we encounter are a product of evolution. When you first set up a
network, it was a simple matter of running some wire around from computer to computer
until the lights started blinking. You either installed your first network yourself, or gave a
deserving kid an opportunity to earn some money and gain experience while on summer
vacation. Maybe it was your own kid or relative and nobody wants to criticize their work. It
all seemed simple enough, but then you started adding more computers and eventually a
server to share files. You added Internet and maybe some multi-user software, printers,
and other devices. At some point, you added a wireless router so that your employees could
use their laptops, smartphones, and tablets. Somehow it all magically worked,,,, until it
didn't! This was all great until things started slowing down. Strange error messages started
appearing on your screens, and some computers could not get reliably connected. Data got
corrupted and you started having some real problems. You can see from the variety of
types and colors of network cable lying around that different people have come through
and expanded or repaired your network, spendng no more than what it takes to get by. You
lost track of what goes where and what is actually being used. Employees come and go and
nobody today really knows exactly what you have or understands how it all works, nor do
they care. Eventually something breaks and you find out that the company, or individual
who installed your network is out of business, or grew up and moved on. Now you have a
mess and you want someone to come in and straighten it all out. Yes, we have seen it all
before. It is time for a new network, this time professionally installed!
Networking
Problems in your computing environment can drag down your entire business.
Your business relies heavily on technology. Technical problem solving is key to keeping
your business running smoothly. When there is a technical problem with your network
hardware, server, or software, it can effect employee morale, as well as productivity and
ultimately profitability. Are your employees complaining about the technology they use?
How many times do you have to stop and think about issues with your network server,
software or computer hardware? Are your computing resources being abused or used for
personal entertainment rather than business use? Have you had to shut your business
down, cancel appointments, or change your plans because of technical problems or
limitations? Do you have an employee that you cannot fire or are afraid will quit because
they are the only ones with the knowledge to keep your systems running? These are not the
type of problems that some technology whiz kid can solve. You need a team of trustworthy,
experienced business IT Consultants, who can be the problem solver to help make
management decisions and implement a solution. We will be happy to meet with you,
privately if necessary, and see what we can do to help solve your technology problems.
Problem Solving
There are times when you need to call in Experienced Technical Problem Solvers
Our extensive experience is our biggest asset. We take the time to listen to users, analyze
customer's needs, and recommend solutions that work. Whenever we install something,
we make sure we do the job right, according to well established industry standards and
best practices. We will
only use the best available computer hardware and software that will assure success. We
are used to solving problems that nobody else can.
With experience in the field, implementing and maintaining mission critical computer
systems, networking, and servers, we are in a position to recommend solutions that we have
used before. There is "No need to recreate the wheel" every time you need a solution. We
use our experience to your advantage. While we know what works and what to recommend,
we also will keep you from making the mistake of investing in a system that does not meet
your needs.
Home
Problem Solving
IT Consulting
Emergency IT Service
We keep ourselves up to date on all the latest security patches, varnings, and various bugs
that are known problems. We know how to track down error codes and search for
solutions based on other peoples experiences with the same problem. There is often no
need to invent a solution. By keeping up and reading about problems, vulnerabilities and
their solutions, we can often prevent a problem on your system before it ever happens.
Problem Solving
Software Implementation
User Training
Emergency IT Service
We are not afraid to ruffle feathers in order to bring about positive change.
Some of the most difficult problems may be caused by your own employees. Users
generally do not like and are resistant to change or restrictions. End users may be too
used to having the freedom to do anything they want with company computers, regardless
of the problems they may cause. Many viruses and security problems are a result of
employees using their work computers the same way the do their personal computers at
home. Acceptable Use Policies need to be developed, implemented, and enforced with
backing from top levels of management. We can help by installing tools to keep your
employees and their computer use under control. We are not interested in corporate
drama, politics, or winning popularity contests. We are here to solve problems.
Problem Solving
The technology we deal with is not just limited to computers and networks.
We understand how to integrate different technoloies so that they work together. We are
versitle enough to work with practically any technology and interface multiple technologies
together for an overall solution.
Any kind of technology can be intimidating. We are also capable and have experience
installing medical equipment, phone systems, security systems, cash register point of sale
systems, and sometimes become involved in the technical design of customer products. We
can work with your vendors and their technical specifications to make sure their products
will interface with your computing environment and make any adjustments necessary.
We are used to reading manuals, working with technical specifications, and applying
technology to any type of business application. Bring us in and let us look at what you are
trying to accomplish. We can help with the research and evaluation of the next piece of
equipment you are wanting to buy. We may know of another customer who is facing the
same challenge or using the same technology.
IT Consulting
Problem Solving
IT System Modernization
IT System Modernization
Once the problem is identified, we can quickly get the resources you need.
We consider all the resources available to us whether it be placing a temporary server,
offloading services to our own network, or knowing where to quickly obtain a critical
replacement part. We do whatever it takes to get you operational as quickly as possible. An
example of this is a customer who runs QuickBooks Enterprise on their server that
crashed. In order to buy time to build a new server, we installed their QuickBooks on one
of our servers for the customer to access remotely. Once the new server is up and running,
the QuickBooks and Data were transferred to the new or repaired server.
We have loaner Servers, Switches, Routers, Hard Drives, and pretty much anything else to
get your system back up and running so your business will not suffer.
Emergency IT Service
Problem Solving
Networking
Maintenance Plans
Emergency IT Service
Give us a call so we may meet and discuss your unique situation and Help
Desk Technical Support Needs.
We can come up with a Technical Support plan that works for you and is within your
budget. We will start supporting your users right away to take care of their immediate
needs and get an idea of what is required to provide ongoing support.
Help Desk Tech Support
Maintenance Plans
Give us a call so we may meet and discuss your networking needs. We are
professionals who understand what it takes to build and maintain reliable networks.
We have experience building and maintaining reliable networks. We understand that
nothing is more critical to the operation of your business so we do not compromise on
quality. When we are finished, you can concentrate on running your business rather than
fighting computer and network problems.
Networking
Give us a call so we may meet and discuss your problem and help find a solution.
We have a lot of experience and resources that we can utilize to solve your problem. We
will work with you as a part of your management team with the common goal of solving
the problem. We have turned many problems into solutions and turned bad situations
around. We are often the Big Guns that come in and solve problems where others have
failed because we are experienced and know how to solve problems.
Problem Solving
Give us a call so we may meet and discuss your needs. We will give you a
fast and honest answer whether or not we can help.
We do not pretend to do anything and everything. The things we know best are computers
and computer networking. Chances are that your problem is not all that unique and we
have worked on something similar before. Most of the time our the solutions we
recommend are based on real life experiences or things we know we can handle. Just as
importantly, we are also honest enough to let you know our limitations and avoid the
disaster of taking on something we are not ready to handle.
SELF-CHECK 4.1-3
A. ENUMERATION: Write the common computer emergencies and how To fix them.
1.
2.
3.
4.
5.
6.
7.
1-10.
TASK SHEET 4.1-3
4. Follow the steps / procedures below Four Main Problem Solving Steps
1. Understand the Problem. Solving the right problem is the most important part of
problem solving.
2. Design a Solution. Formulate an algorithm to solve your problem.
3. Implement your Solution. Write the code to solve your problem.
4. Check your Solution.
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-3
YES NO
CRITERIA
Did you.......
Wear your ppe
Understand the Problem. Solving the right problem is the most important part of
problem solving
Design a Solution. Formulate an algorithm to solve your problem
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-4
Corrective Action
• Hardware Configuration
• Software Configuration
LEARNING OBJECTIVES:
Corrective action is an aspect of quality management that aims to rectify a task, process,
product, or even a person’s behavior when any of these factors produce errors or have
deviated from an intended plan. Corrective actions can be thought of as improvements to
an organization to eliminate undesirable effects. Corrective actions can apply to an entire
project when the deliverables, whether tangible or service, deviate from the required
output. In HR for higher education institutions in particular, corrective action also applies
to individual employees and functions to communicate to the individual what aspects of
attendance, unacceptable behavior, or performance require improvement
Hardware Configuration
1. Office computers
The office computers need common or cheap configuration. A dual core processor with
2 GHz speed and 2 GB RAM will do well for this type of computers. A 19’’ monitor of
LCD type may be enough.
The graphics card that comes with the motherboard alone is enough, so no need for
separate graphics card. A 500 GB HDD can be affordable since the prices of hard disk
drives are going down.
Read Too: Parts Of a Motherboard
2. Multimedia/graphics computer
More importance should be given to the graphics card in this type of computer since they
have to work with high quality graphics. Get a graphics card from a branded company
and of high quality. There should be PCI-E slots in addition to PCI slots.
The size of RAM also should be quite big. Something in the range of 4 to 6 GB is okay.
Considering the processor as triple or quad processor is good for this type of computers.
3. Gaming computer
This type of computer should be more rigid and tough since they have to come across all the
bumps and pats of the frustrated user who loses the game. Definitely a HD LCD monitor of
at least 21’’ should be provided for more attraction towards games.
Dual core processors are enough but dual processors could be advantageous for several
games. Motherboard with PCI-E slots, a graphic card which provides at least 30 frames per
second, a good cabinet with airflow, quality speakers, multimedia keyboard and a durable
mouse are other important things for a gaming PC. RAM size of 4 GB will be perfect for
this type of computer.
Read Too: Upgrading Your Computer Memory
These three are the most different types of computers we come across. You might wonder
why there is no information on personal home computer. But the fact is, it is good enough
to buy computers which are sold with pre-assembled configuration for home use, according
to your financial plans.
Software Configuration Management?
This topic shows example hardware/software configurations for different LabKey Server
installations. These are intended as guidelines only -- your own configuration should be
adjusted to suit your particular requirements.
Small Laboratory Installation
The following configuration is appropriate for 10-20 users with small file and table sizes.
We assume that the server and database are located on the same machine.
Disk
164GB (64GB for File Storage, 100GB for database storage)
Storage
As usage increases, increase the amount of RAM memory to 8GB at a minimum (and
also increase the memory used by Tomcat and the database accordingly).
Disk
64GB (for OS and LabKey binaries), 512GB (for file storage)
Storage
Network 1 GB/s
Disk
100GB (for database storage)
Storage
Network 1 GB/s
SELF-CHECK 4.1-4
2.
3.
B. ESSAY:
Corrective Action
• Hardware Configuration
• Software Configuration
2. Provides details about the Hardware and Software used in our testing.
3. Client Hardware and Software setup that was used the tests.
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-4
YES NO
CRITERIA
Did you.......
Wear your ppe
Provides details about the Hardware and Software used in our testing
Client Hardware and Software setup that was used the tests
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-1
LEARNING OBJECTIVES:
1. Identify the Inspect and Test the Computer Systems and Networks
2. Determine the Inspect and Test the Computer Systems and Networks
List of Tutorials:
• What is System Testing
• System vs end to end testing
The process of testing an integrated hardware and software system to verify that the
system meets its specified requirements.
A computer technician needs a good understanding of the health and safety regulations to
understand the good practices demanded by law. In particular, you need to:
• report any accidents;
• take reasonable care of your own health and safety when moving heavy components;
• not cause any electrical hazards;
• make sure that workstations meet safety requirements.
Technicians need to adhere to health and safety regulations as they will help to protect
everyone and to avoid any unnecessary legal action for reckless and unsafe working
practices. Any health and safety problems, the line manager or the health and safety
representative must be informed immediately.
The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the system
after installation.
Diagnostic Tools in testing installed components
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the
following:
• Digital multimeter is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.
• A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
• A toner probe is a two-part tool. The toner part is connected to a cable at one end using
specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates a tone that
travels the length of the cable. The probe part traces the cable. When the probe is in near
proximity to the cable to which the toner is attached, the tone can be heard through a
speaker in the probe.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to help
technicians pinpoint and troubleshoot problems. Many of these tools are free and several
come with the Windows operating system.
Disk Management Tools
Software tools help diagnose computer and network problems and determine which
computer device is not functioning correctly. A technician must be able to use a range of
software tools to diagnose problems, maintain hardware, and protect the data stored on a
computer.
You must be able to identify which software to use in different situations. Disk management
tools help detect and correct disk errors, prepare a disk for data storage, and remove
unwanted files.
The following are some disk management tools:
• FDISK: A command-line tool that creates and deletes partitions on a hard drive. The
FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the Disk
Management tool.
• Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for physical errors.
• Defragmentation: Optimizes space on a hard drive to allow faster access to programs
and data.
• Disk Cleanup: Clears space on a hard drive by searching for files that can be safely
deleted.
• System File Checker (SFC): A command-line tool that scans the operating system critical
files and replaces files that are corrupted.
TEST PROCEDURES
A test procedure is a set of steps to guide you through what needs to be done to thoroughly
test the installation. It is designed to help you work more effectively and to make sure you
test everything that needs testing. 1 2 3
1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your
tests in a log so that you know which pass and which fail, thereby requiring
further action.
2. Validating the test information. The next step is to check the data you gathered
from the tests to make sure it is correct. This is usually done by running the
tests again.
3. Responding to test information. This step is important because you need to be
able to recognize when a test shows problems or is successful. For example, if
ping is used to test a network connection then ‘Request timed out’ shows the
test was not successful.
4. Checking specification. The final step is an important end to testing. You need to check
the specification for the installation to make sure that it has been met. For example, if a
user requested an upgrade to make their display run at 1920 x 1200, then the ICT
professional should check that the graphics card and screen can do this.
EXTERNAL VISUAL INSPECTION
The external visual inspection consists of a quick inspection of the exterior of
the computer, the monitor, the keyboard, any peripherals, and cables. While
performing the visual inspection, make any necessary corrections. To perform
the external visual inspection, perform the following steps:
1. Turn off the computer, the monitor, and all peripherals.
2. Verify that all power cables are properly connected to the computer, the monitor and
peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly attached to the proper
connectors on the back of the computer.
• For a PS/2-compatible mouse, the keyboard and mouse interface cable connectors are
identical except for their labels.
• For a serial mouse, the mouse interface cable must be firmly attached to one of the serial
port connectors, and its captive screws must be secure enough to ensure a firm
connection.
4. Verify that network cables (if present) are properly attached.
5. Verify that any devices attached to the serial and parallel port connectors are properly
connected.
• Each of the serial and parallel port interface cables must be firmly attached to an
appropriate connector on the back of the computer as well as to the interface connector
on the device. The captive screws that secure these connectors at each end of the
interface cable must be secure enough to ensure a firm connection.
6. Verify that the video interface cable is firmly attached to the video connector on the
back panel or to a video expansion card, and also to the connector on the back of the
monitor. For proper connection of the video monitor, check the documentation for the
monitor.
7. Inspect all external monitor controls for any obvious damage or improper settings.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys are
sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and all user-
accessible data storage devices for any signs of physical damage.
OBSERVING THE BOOT ROUTINE
After you have performed an external visual inspection, you should boot the system and,
while the boot routine is running, observe the system for any indications of problems.
NOTE: Most of the steps in this procedure require observation of system functions and
indications, some of which can occur simultaneously. It may be necessary to reboot the
system several times to complete all of these steps.
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan. Does the fan run normally?
• Yes. Proceed to step 3.
• No. Troubleshoot the system power supply.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the upper-
right corner of the keyboard. After all three indicators flash momentarily, and following a
long pause (approximately 30 seconds), the Num Lock indicator should light up and remain
on (unless the Num Lock option is set to Off in the System Setup program). Do these
indicators flash on and off within approximately 10 seconds after the boot routine starts?
• Yes. Proceed to step 4.
• No. Troubleshoot the system power supply. If the troubleshooting procedure indicates
that the system power supply is operational, troubleshoot the memory.
4. During the boot routine, observe the system for any of the following indications:
• Beep codes — A beep code is a series of beeps that indicates an error condition.
• System error messages — these messages can indicate problems or provide status
information.
• Diskette-drive and hard-disk drive access indicators — These indicators light up in
response to data being transferred to or from the drives. If either of these indicators fails to
light up during the boot routine, troubleshoot the diskette drive or hard-disk drive
subsystem, as appropriate.
5. Observe the monitor screen for the Diagnostics menu.
NOTICE: Before you proceed with the internal visual inspection, ensure that all open files
are saved and exited all open application programs if possible.
INTERNAL VISUAL INSPECTION
A simple visual inspection of a computer’s interior hardware can often lead to
the source of a problem, such as a loose expansion card, cable connector, or
mounting screw. To perform the internal visual inspection, perform the
following steps:
1. Turn off the system, including any attached peripherals, and disconnect all the 779 AC
power cables from electrical outlets. CAUTION: Before beginning to work inside the
computer, disconnect the power supply from the power source and the power supply
cables from the power supply.
2. Remove the computer’s right side cover.
CAUTION: The heat sink assembly can get extremely hot during system operations. Be
sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges on the
heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of each
chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are firmly attached
to their appropriate connectors.
7. Reinstall the computer cover. 8
8. Reconnect the computer and any attached peripherals to their power sources,
and turn them on.
Types Of System Testing
ST is called a superset of all types of testing as all the major types of testing are covered in
it. Although a focus on types of testing may vary on the basis of
System Testing-@www.SoftwareTestingHelp.com
Functionality Testing: To make sure that functionality of the product is working as per the
requirements defined, within the capabilities of the system. Recoverability Testing: To
make sure how well the system recovers from various input errors and other failure
situations.
Interoperability Testing: To make sure whether the system can operate well with third-
party products or not.
Performance Testing: To make sure the system’s performance under the various condition,
in terms of performance characteristics.
Scalability Testing: To make sure the system’s scaling abilities in various terms like user
scaling, geographic scaling, and resource scaling.
Reliability Testing: To make sure the system can be operated for a longer duration without
developing failures.
Regression Testing: To make sure the system’s stability as it passes through an integration
of different subsystems and maintenance tasks.
Documentation Testing: To make sure that the system’s user guide and other help topics
documents are correct and usable.
Security Testing: To make sure that the system does not allow unauthorized access to data
and resources.
Usability Testing: To make sure that the system is easy to use, learn and operate.
SELF-CHECK 5.1-1
1.
2.
3.
4.
B. List down the OBSERVING THE
INSPECTION BOOT ROUTINE and INTERNAL VISUAL
1.
2.
3.
4.
5.
6.
7.
8.
TASK SHEET 5.1-1
you should be able to testing methods and procedures ff. standard operating p ro
cedures within 2 hour
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-1
YES NO
CRITERIA
Did you.......
Wear your ppe
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-2
LEARNING OBJECTIVES:
What is 5S
One of the most powerful Lean Manufacturing Tools and a cornerstone of any successful
implementation is that of 5S, but what is 5S and its 5 Steps of Seiri, Seiton, Seiso, Seiketsu
and Shitsuke?
5S is a simple tool for organizing your workplace in a clean, efficient and safe manner to
enhance your productivity, visual management and to ensure the introduction of
standardized working.
Most of the other definitions of 5S and descriptions that I see here on the internet
concentrate heavily on the aesthetics and the efficiency gains that you achieve through
implementing 5S and neglect the real aim of 5S; the need to introduce standard operational
practices to ensure efficient, repeatable, safe ways of working.
In addition to standardised working which provides you with a stable foundation to build
all of your other improvements through implementing Lean Tools, you also provide a
highly visual workplace. One of the most important factors of 5S is that it makes problems
immediately obvious.
5S is a team run process and should be conducted by the people who work within the area
in which the principles of 5S are being applied, it is not a tool that can be applied by an
outsider onto an area without the knowledge and cooperation of the people within it.
Origins of 5S
5S as a methodology has come out of the techniques within Total Productive Maintenance
(TPM) and from the Toyota Production System (TPS). However many of the individual
components such as creating ergonomic and efficient work places can be seen to owe their
roots to people such as Taylor for his work on “scientific management” and Frank
Gilbreth’s “time and motion studies.”
Frank Gilbreth showed that by improving the ergonomics of a bricklayers working
methods he could reduce the number of individual movements required and increase the
hourly output from 120 to 350 bricks laid each hour.
The Concept of 5S
5S is a methodical way to organize your workplace and your working practices as well as
being an overall philosophy and way of working. It is split into 5 phases, each named after
a different Japanese term beginning with the letter “S”; (Seiri, Seiton, Seiso, Seiketsu,
Shitsuke) hence the name 5 S.
These five distinct phases are (with English descriptions);
Steps of 5S
• Clearing,
• Configure,
• Clean and Check,
• Conformity and finally
• Custom and practice.
CANDO is;
• Cleanup,
• Arrange,
• Neatness,
• Discipline, and
• Ongoing Improvement.
5S Definition
5S Seiri or Sort
5S Seiri removing Clutter
5S Seiri or Sort is the first step in 5S, it refers to the sorting of the clutter from the other
items within the work area that are actually needed. This stage requires the team to
remove all items that clearly do not belong in the working area and only leave those that
are required for the processes in question.
5S Seiton or Straighten is the process of taking the required items that are remaining
after the removal of clutter and arranging them in an efficient manner through the use of
ergonomic principles and ensuring that every item “has a place and that everything is in
its place.”
SELF-CHECK 5.1-2
A. ENUMERATION: Write the 5s and 3rs environmental policies
Policies
you should be able to 5s and 3Rs Environmental Policies ff. standard operating p ro
cedures within 2 hour
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-2
YES NO
CRITERIA
Did you.......
Wear your ppe
Less space
Improved self-discipline
Improved culture
> LEARNING OUTCOME NO.5
ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual
2. Computer systems and networks are checked/tested to ensure
safe operation.
3. OHS standards and 5S principles are followed according to
enterprise policies
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
5. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-3
LEARNING OBJECTIVES:
Status: Published
Products:
Endpoint Protection
Issue/Introduction:
Resolution:
The Computer Status log contains information about the real-time operational
status of the computers in the network. Information available includes the
computer name and IP address, last check-in time, definitions date, infected
status, Auto-Protect status, server, group, domain, and user name. Filters for
Computer Status reports have both
standard configuration options and compliance-specific options.
The table below describes some typical uses for the kind of information
that you can get from Computer Status reports and logs.
Report or log Typical uses
Virus Definitions Use this report to make sure that all the groups, domains, or servers in
Distribution your network use up-to-date virus definitions files versions.
Computers Not Use this report to find the computers that have not checked in with a
Checked into server and therefore might be lost or missing.
Server
Symantec Use this report to check the versions of product software, virus
Endpoint definitions, IPS signatures, and proactive protection content in use in
Protection Product your network. With this information you can pinpoint the computers
Versions that need an update.
Intrusion Use this report to make sure that all the groups your network use up-to-
Prevention date intrusion prevention signatures. You can also see which domains or
Signature servers are out-of-date.
Distribution
Client Inventory Use this report to see the number and percentage of computers that fall
into certain hardware and software categories. Available information
includes the computers' operating system, total memory, free memory,
total disk space, free disk space, and processor type. For example, from
the Client Inventory report, you might see that 22% of your computers
have less than 1 GB of free disk space.
Compliance Status Use this report to see which groups or subnets have the largest
Distribution percentage of computers out of compliance. You may want to investigate
if certain groups seem to have a lot more compliance problems than
others.
Client Online Use this report to see which groups or subnets have the largest
Status percentage of clients online. You may want to investigate why some
groups or subnets currently experience more problems than others.
Clients With Use this report to see which groups or subnets have the largest
Latest Policy percentage of computers that don't have the latest policy on them.
Client Count by Use this report to see the total number of clients and users, by group.
Group
Security Status Use this report to quickly see the total number of computers that have
Summary the following problems:
• Auto-Protect is disabled
• The antivirus engine is turned off
• Tamper Protection is turned off
• The computer needs to be restarted
• The computer failed a host integrity check
• Network Threat Protection is turned off
These computers may continue to be at risk unless you intervene.
Protection Content Use this report to check the versions of Proactive Protection content in
Versions use in your network, to pinpoint any computers that need an update.
Client Migration Use this report to see the migration status of clients by domain, group,
and server. You can quickly identify clients where migration has failed
or has not yet started.
Clients Online/ Use this report to pinpoint the clients that don't connect to the network
Offline Over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)
Clients With Use this report to pinpoint the clients that don't get policy updates
Latest Policy over frequently enough. This report is available only as a scheduled report.
Time (Snapshots)
Client Software Use this report to pinpoint the clients that don't have the latest software
Rollout version deployed. This report is available only as a scheduled report.
(Snapshots)
Non-compliant Use this report to pinpoint the clients that frequently fail host integrity
Clients Over Time checks. This report is available only as a scheduled report.
(Snapshots)
Virus Definitions Use this report to check to see the definitions versions that clients have.
Rollout This report is available only as a scheduled report.
(Snapshots)
Computer Status Check the Computer Status log if you need more details about any of
log the areas that the reports cover.
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
Tools, Materials and Equipment and Facilities
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-4
LEARNING OBJECTIVES:
Waste disposal, the collection, processing, and recycling or deposition of the waste
materials of human society. Waste is classified by source and composition. Broadly
speaking, waste materials are either liquid or solid in form, and their components may be
either hazardous or inert in their effects on health and the environment. The term waste is
typically applied to solid waste, sewage (wastewater), hazardous waste, and electronic
waste.
In industrialized countries, municipal liquid waste is funneled through sewage systems,
where it undergoes wastewater treatment, or sewage treatment. This process removes
most or all of the impurities from wastewater, or sewage, before they can reach
groundwater aquifers or surface waters such as rivers, lakes, estuaries, and oceans. (For
more information on sewage systems and treatment, see wastewater treatment.
wastewater-treatment plant
Wastewater-treament plants remove chemical or biological waste from water.
Refuse, or municipal solid waste (MSW), is nonhazardous solid waste from a community
that requires collection and transport to a processing or disposal site. Refuse includes
garbage and rubbish. Garbage is mostly decomposable food waste, and rubbish is mostly
dry material such as glass, paper, cloth, or wood. Garbage is highly putrescible or
decomposable, whereas rubbish is not. Trash is rubbish that includes bulky items such as
old refrigerators, couches, large tree stumps, or construction and demolition waste (e.g.,
wood, drywall, bricks, concrete, and rebar [a steel rod with ridges for use in reinforced
concrete]), all of which often require special collection and handling. Refuse is often
deposited in sanitary landfills—that is, pits or other sites sealed with impermeable
synthetic bottom liners where waste is isolated from the rest of the environment. (For more
information on the treatment of solid wastes, see solid-waste management.)
How to Recycle Your E-Waste Safely
The good news is that you have plenty of options for properly recycling or donating your
used electronics. It’s important to understand this: Even if you take your e-waste down to
your local recycling center, there’s a high probability that it won’t get recycled properly.
As ABC News discovered, e-waste recyclers are often more concerned with making a
buck than they are with making sure these hazardous materials are disposed of properly.
So what can you do?
Many communities post a calendar that will include recycling days, so check your local
paper or visit their website. When you recycle your items locally, you can make the
occasion a day trip and a community event. Encourage your neighbors to join you and
spread the word about educated e-waste disposal.
Best Buy makes sure that the recyclers we work with adhere to the highest guidelines and
standards so that the products customers bring into our stores for recycling don’t end up in
landfills or in foreign countries, and that all hazardous materials are disposed of properly.
We partner directly with a short list of qualified, respected recycling companies who
ensure all products collected for recycling through Best Buy are handled responsibly.
These recycling companies meet our standards, and we encourage them to examine and
consider additional third-party standards for responsible practices (such as the EPA R2
and e-Stewards).
You can drop off all kinds of e-waste for recycling at Best Buy including:
Organizations like Cell Phones for Soldiers and Verizon’s HopeLine program will make
sure your old cell phone makes its way to a worthy cause. Other organizations, like the
Salvation Army and Goodwill, can sell your used electronics and use the profits to educate
and empower others who need help. Goodwill has been particularly active with its
Reconnect program, which has a strict no-export policy.
Gazelle, a marketplace that can also provide some cash incentives, will help you organize a
Gadget Drive if you’re trying to raise money for your school or non-profit. To get a feel for
the kind of money people are willing to spend,
check out Ecosquid. When you run a Gadget Drive, people in your community will drop off
their devices. You’ll ship everything off to Gazelle, and then you’ll get a check for
everything that was donated. Gazelle, in turn, will either sell the electronics or make sure
they’re recycled responsibly.
SELF-CHECK 5.1-4
A. ENUMERATION: Write the Recycle Your E-Waste Safely and explain brief it.
TASK SHEET 5.1-4
WASTE MANAGEMENT
you should be able to waste management ff. standard operating procedures within 2
hour
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-4
YES NO
CRITERIA
Did you.......
Wear your ppe
Prevention
Recycling
Landfilling