You are on page 1of 338

Competency-Based Learning Materials

COMPUTER SYSTEMS SERVICING NCII

Sector : ELECTRONIC SECTOR

COMPUTER SYSTEMS SERVICING


Qualification : NCII

Unit of
Competency : MAINTAIN AND REPAIR COMPUTER
SYSTEMS AND NETWORKS

Module Title : MAINTAINING AND REPAIRING COMPUTER


SYSTEMS AND NETWORKS
Welcome to the Module "Maintaining of Computer System and Networks" . This module
contains training materials and activities for you to complete.
The unit of competency "Maintain Computer System and Networks" contains knowledge,
skills and attitudes required for a Computer Hardware Servicing NCII course.
You are required to go through a series of learning activities in order to complete each of
the learning outcomes of the module. In each learning outcome there are Information
Sheets, Job Sheets, Operation Sheets, and Activity Sheets . Follow these
activities on your own and answer the Self-Check at the end of each learning activity.

If you have questions, don't hesitate to ask your facilitator for assistance. Recognition of

Prior Learning (RPL)


You may already have some of the knowledge and skills covered in this module because
you have:
o been working for some time o already have completed training in this area.
If you can demonstrate to your teacher that you are competent in a particular skill or skills,
talk to him/her about having them formally recognized so you don't have to do he same
training again. If you have a qualification or Certificate of Competency from previous
trainings show it to your teacher. If the skills you acquired are still current and relevant to
this module, they may become part of the evidence you can present for RPL. If you are not
sure about the currency of your skills, discuss it with your teacher.
After completing this module ask your teacher to assess your competency. Result of your
assessment will be recorded in your competency profile. All the learning activities are
designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more than
one learning activity.
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and configure Installing and configuring


ELC724331
1.computer systems computer systems

Set-up Computer Setting up Computer


ELC724332
2.
Networks Networks

Set-up Computer Setting up Computer


ELC724333
3.
Servers Servers

Maintain and Repair Maintaining and


ELC724334

4.Computer Systems and Repairing Computer


Networks Systems and Networks
MODULE CONTENT

UNIT OF COMPETENCY: Maintain and Repair computer systems

MODULE TITLE : Maintaining and Repairing computer systems

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

NOMINAL DURATION: 40 HOURS

LEARNING OUTCOMES:

At the end of this module you MUST be able to:


1. Plan and prepare for maintenance and repair

2. Maintain computer systems and networks

3. Diagnose faults of computer systems and networks


4. Rectify/correct defects in computer systems and networks
5. Inspect and test the computer systems and networks
ASSESSMENT CRITERIA:
1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job
requirements.
2. Tools, equipment and testing devices needed for the maintenance are obtained and
checked for correct operation and safety
3. Materials necessary to complete the work are obtained in accordance with
established procedures and checked against job requirements.
4. OHS policies and procedures are followed in line with job requirements.
5. Computer systems and networks for maintenance are checked against job/service
order or instructions and specifications.
6. Appropriate personal protective equipment is used in line with standard procedures.
7. Normal function of computer systems and networks are checked in accordance with
manufacturer’s instructions.
8. Scheduled/periodic maintenance is performed in accordance with manufacturer’s
requirements.
9. Where necessary, needed repairs/replacements are made in accordance with
established procedures.
10. Unplanned events or conditions are responded to in accordance with established
procedures
11. Appropriate personal protective equipment is used in line with standard procedures.
12. Faults or problems in the computer systems and networks are diagnosed according
to requirements and in line with the standard procedures.
13. Contingency measures are managed and implemented in accordance with
established procedures
14. Unplanned events or conditions are responded to in accordance with established
procedures
15. Appropriate personal protective equipment is used in line with standard procedures.
16. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
17. Adjustments, if necessary are made in accordance with established procedures
18. Unplanned events or conditions are responded to in accordance with established
procedures.
19. Final inspections are undertaken to ensure that the testing conducted on the device
conforms with the manufacturer’s instruction/manual
20. Computer systems and networks are checked/tested to ensure safe operation.
21. OHS standards and 5S principles are followed according to enterprise policies
22. Work site is cleaned and cleared of all debris and left in safe condition in
accordance with company procedures
23. Excess components and materials are disposed of based on WEEE directives and
3Rs waste management program.
24. Report is prepared and completed according to company requirements

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO.1

> Plan and Prepare for Maintenance and Repair

LESSON CONTENT:

PLANNING AND PREPARING FOR MAINTENANCE


ASSESSMENT CRITERIA:

1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job
requirements.
2. Tools, equipment and testing devices needed for the maintenance are obtained and
checked for correct operation and safety
3. Materials necessary to complete the work are obtained in accordance with established
procedures and checked against job requirements.
4.OHS policies and procedures are followed in line with job requirements. S.Computer
systems and networks for maintenance are checked against job/service order or
instructions and specifications.

RESOURCES:

Tools, Materials and Equipment and Facilities


METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE

LEARNING OBJECTIVES:
After reading of this Information Sheet, you should be able to:

At the end of the discussion, you must be


able to:
• Identify the different maintenance procedures in
taking care of computers;
• Differentiate preventive maintenance and corrective
maintenance;
• Differentiate ideal computer laboratory atmosphere
fppt com
Computer Maintenance is the practice of keeping computers in a
good state of repair. A computer containing accumulated dust and debris
may not run properly. Dust and debris will accumulate as a result of air
cooling. Any filters used to mitigate this need regular service and
changes.

2 Types of Computer Maintenance

There are two types of maintenance that can be applied to a


computer:
Preventive Maintenance: He applied to a PC in
order to avoid future mistakes and technical problems, such
as: Find and remove viruses from your hard drive, find and
correct errors in the physical and logical disk, disk defrag,
clean up the motherboard and other cards to avoid technical

problems due to dust, etc..

Reader view
Preventive maintenance can be described as maintenance of
equipment or systems before fault occurs.
It can be divided into two subgroups:
-Planned Maintenance -Conditioned-BasedMaintenance.

Planned Preventive Maintenance


Computers and IT equipment are fast becoming most business’ lifeblood, so it’s
important to keep them up and running. Waiting until a piece of equipment shows signs
of trouble can seriously impact production, and in turn, your bottom line or even damage
your reputation with your customers.
To combat this, a maintenance approach called Planned Preventative Maintenance (PPM)
should be implemented. Instead of waiting for the machine
to malfunction or stop working completely, maintenance and inspections are scheduled at
regular intervals. Footprints are normally left well in advance of a system hardware or
software failure, this enables us to discover potential issues before they even arise.

How Planned Preventive Maintenance Works


NAP Computer Solutions Limited will complete an IT MOT initially which is like a mini
audit of your equipment. This allows us to check that all your equipment is running
effectively. It will also allow us to recommend a maintenance schedule that fits in with
your requirements. This could be weekly, fortnightly or monthly depending on the size of
your business.
It is a similar concept to a car maintenance plan. For example, a car manufacturer may
suggest a car’s oil should be changed every 3,000 miles or every 3 months, whichever
comes first, the transmission should be checked annually, and a general tune-up should be
done once a year as well.
This same concept is applied to the IT equipment in your organisation and during these
PPM visits your IT Equipment will be checked thoroughly in an attempt to catch any
hardware or software malfunctions before they even occur. During the course of the year
this should help you keep track of your IT expenditure as well as reduce costs. As an
example; replacing a computer hard disk before it completely dies and scheduling this in
after a PPM visit not only saves cost but also saves valuable downtime which would
occur if the hard disk was left to completely malfunction.
Why This Approach Works
Instead of taking a reactive approach to equipment maintenance, i.e. waiting for
something to break before you react to it, PPM allows you to take a proactive approach. If
you check your equipment on a regular basis, you are more likely to catch small things
and repair them before they become larger issues later. PPM lowers the chances of losing
productivity due to a malfunctioning or broken piece of equipment. The longer you can
keep your equipment functioning on a continuous basis, the more productive your
business can be.
Other benefits to this approach include:
• Setting up orders for replacement parts well in advance of when you will need them.
• You can schedule any downtime more effectively and lessen the impact on service /
production time
• Spot potentially serious computer issues before they actually occur
• Reduce yearly IT Expenditure
Reduce downtime to your business

Corrective Maintenance: One who is oriented to diagnosis and repair of equipment


when a technical problem.
When we maintain a computer, we must first determine what is the time of use and delay
of computer technology. The services on very old computers is more expensive and
therefore difficult to get the spare parts.
Then, evaluate the physical conditions of the computer. An ancient or modern computer
can not be installed on site very closed or have books and materials on top that not allow
to dissipate the heat generated on the motherboard. (Despite being cooler on the inside).
Not necessarily must be in a room with air conditioning but in a cool place.
As for electricity, there are users that have hydro-pneumatic pumps, air conditioners, and a
number of electrical equipment that consume much energy at boot time, is there just as the
hard disk of the computer is suffering because it is very sensitive to electric failures and
every time the fridge turns on, there is a low amperage in the electrical system throughout
the house and consequently on the PC. Since this fluctuation power, hard drives trend to
suffer much damage.
We can begin to look for and remove informative viruses with a good antivirus.
Find and delete temporary files on your computer (*. TMP) that occupy space and trend to
crash the computer.
Also look for files with the CHK, if your disk starts to make files of this nature, it is likely
that we are in the presence of a future damaged disk, because these files are usually lost
fragments of other files that are not well saved or maybe it was lost because the computer
turned off unexpectedly, or data recovered from a bad sector on your hard disk.
If the computer has more than 2 years that the operating system was installing, do a Back
Up of all important files to the user and format the hard disk, and reinstall all programs.
Will see fast improvement.
Corrective maintenance workflow

Overview

Corrective maintenance is initiated when an additional problem is discovered during a


separate work order. For example, during an emergency repair, as part of a routine
inspection, or in the process of conducting preventive maintenance, a technician spots
another issue that needs corrected before other problems occur.
Upon discovering an additional problem, corrective maintenance is planned and
scheduled for a future time. During the execution of corrective maintenance work, the
asset is repaired, restored, or replaced

How corrective maintenance decreases downtime

Think of corrective maintenance as something that gets caught just in time.


For example, if you see that the brake pads in your car are just about worn down but
haven’t affected the rotors yet, you caught them in time.
Within the maintenance arena, corrective maintenance is triggered when a technician sees
something that is about to break or will affect the overall performance of a piece of
equipment. It can still be repaired or restored without incurring downtime.
If corrective maintenance is not scheduled, the problem may become an
emergency maintenance work order down the road and result in halted

production lines, interruption in service, or unhappy customers.


Examples of corrective maintenance

Corrective maintenance can include a wide variety of equipment, systems, and situations.
For example, if you are performing preventive maintenance on a line of production
equipment and notice significant wear on a critical part or component, you may initiate a
corrective maintenance order to repair or restore that part within the next month.
If you are responding to an emergency request to repair a heating system in the middle of
winter, you may notice that the HVAC system needs filters cleaned or replaced to
improve efficiency and prevent further heat loss. You can restore the heat during the
emergency call but you may schedule the corrective maintenance order to handle the filter
issue later.
In a public works situation, you may be performing routine roadway repairs when you
notice some signage damage from a recent storm. You can initiate a corrective
maintenance order to restore that signage at a later date.

Benefits of corrective
maintenance

Since corrective maintenance is performed


“just in time,” the main benefit is reduced
emergency maintenance orders as well as
increased employee safety. Corrective
maintenance work orders are scheduled and
prioritized in a CMMS, that helps
maintenance teams resolve problems before
delays in production or service interruptions
occur.
Corrective maintenance, coupled with good
preventive maintenance, helps a
business extend the lifetime of its assets, reduce employee injury, and optimize resource
planning. Corrective maintenance work orders are often less expensive to implement than
emergency maintenance work orders may need to be completed during overtime hours.

How to maximize corrective maintenance


Corrective maintenance has an important role within the scope of maintenance services in
a business, residential complex, or factory setting. Technicians who can find and identify
potential problems before they become emergencies can save the company a great deal of
money.
In order to maximize the benefits of corrective maintenance, provide training and
education to maintenance technicians and supervisors about what types of things to look
for while they are providing preventive or emergency maintenance services.
Additionally, create a maintenance checklist of components that technicians can visually
check quickly. You want your maintenance staff to catch as many problems as possible.
This will generate more corrective maintenance orders and help keep your facility running
smoothly.
Key Takeaways
• Corrective maintenance work orders are placed when problems are spotted during
preventive or urgent maintenance tasks.
• Corrective maintenance repairs or restores equipment just in time, before more
significant breakdowns occur.
• Increasing employee safety, reducing facility downtime, and allocating resources
efficiently are some benefits of corrective maintenance.
DIFFERENCE IDEAL COMPUTER LABORATORY ATMOSPHERE

Computer labs are more than just rooms with lots of computers. Care must be taken to
ensure that the lab is easy to access and fulfills its purpose. Learn about the four most
popular computer laboratory layouts and designs used in High Schools and universities.
Many high schools and colleges use computer labs to allow student access to the software
necessary to complete coursework. Computer labs are also used to instruct students on
computer use, programming, and related subjects. However, many institutions give little
thought to the design and layout of the lab. Too often, they simply fill a room with
computers and set up the machines any way they fit inside the room.

WHY COMPUTER LAB DESIGN AND LAYOUT IS IMPORTANT


Computer labs must be designed intelligently and serve the purpose they were intended to
serve. Imagine if parking lots did not have lines telling you where to park and everyone
just drove in and parked wherever they wanted. Soon no one would be able to enter to
exit. The lines in parking lots create important rules about how you should park in the lot.
Similarly, the design and layout of a computer lab creates rules and defines how the lab
can be used. Thought given to the layout of a computer lab dictates the usefulness of the
lab and increases user satisfaction which justifies its expense and assists in future
investments in upgrades.
Certainly, the layout of the lab depends on the equipment, the furniture, and space
available. The purpose of this document is to discuss some basic computer lab layouts and
their advantages and disadvantages.
Any of these layouts can be modified to satisfy the individual needs of the institution. It
just takes a little planning and imagination to adapt any of these designs to a specific
application.
CLASSROOM COMPUTER LAB DESIGNS

The classic classroom computer lab design CUtiroom Computer Lab Layout
serves as the default layout in many High
School and Colleges.
However, it does have two major
advantages. First, it serves as a great • ••• ••••
instruction room where students learn
computer topics from an instructor at the
front of the room. • ••• ••••
With everyone facing the same direction, it
allows instructors to see the faces of the
students with which to read non-verbal • ••• ••••
cues as to whether students are learning
the material or need more help. Second, it
is similar to the layout of other classroom • ••• ••••
environment emphasizing that the students
are there to learn.

One disadvantage of the classroom layout is the need to disturb other students along
the rows of computers as students enter and exit the lab. For labs where students are
coming and going, the classroom layout is not ideal. In addition, the classroom layout
is not conducive to team work. It is difficult for students to work together, especially
on collective projects and in peer-assist teaching models.

. FOUR-LEAF CLOVER COMPUTER LAB LAYOUTS

The four-leaf clover design offers the most


privacy for students and reduces to a
minimum the possibility of cheating during
tests or exercises. It also eliminates the
need for students to disturb others when
entering and exiting the lab and allows
instructors to go from student to student to
address individual problems and concerns.
One disadvantage of the four-leaf clover
design has to do with attention
spans. When students are sitting at their own computers, instructors will not be able to
see what each student is doing at his/her workstation. Students may not be paying
attention to lessons or may be surfing to inappropriate websites in labs equipped with
Internet access.
Four-leaf clover designs can also be more expensive if each computer sits on its own
table. Some computer lab furniture is made specifically for this design offering space
for four computers on one table or desk.
• The next two designs are less traditional but offer some things the classroom
layout and the four-leaf clover layout do not.

• U-SHAPED COMPUTER LAB DESIGNS

The U-shaped computer lab layout


encourages engagement between instructors
and students. Instructors can enter the U and
engage with students one-on-one. This
design also serves as the most conducive
layout for computer maintenance as
technicians do not have to disturb others to
gain access to the computers. In addition,
students will not interfere with other
students’ work while entering and exiting
the lab.
Unfortunately, the U-shaped design offers
little opportunity for instructors to monitor
what students are doing and looking at on
their monitors. This

design is not compatible with test taking and requires many assistants to monitor
students. Furthermore, this design often takes up more space that other layouts.
INVERTED U-SHAPED COMPUTER LAB LAYOUTS

Like the U-shaped layout, the Inverted U-


shape also offers engagement between
instructors and students. In addition, the
layout allows for the most convenient
method of monitoring students. For
individual learning, this layout minimizes
the distance instructors must walk to move
from workstation to workstation and
student to student.
Like the classroom layout, traffic into and
out of the Inverted U-shape can become
constrictive especially when all of the
students must enter and exit at the same
time. This congestion

is reduced if students are entering and exiting individually as in an open lab paradigm
where students can come and go as they please. In addition, this layout takes up the same
amount of space as the U-shaped design. If space is not a consideration, either of the U-
shaped layouts is appropriate.

. CONCLUSION
There are many options when designing the layout of a computer lab. The key is to make
sure form is following function. Thought and planning at the beginning of designing the
lab ensures that students and instructors are satisfied with what the lab offers. Choosing a
sub-optimal layout can negatively affect student learning and reduce the engagement
between instructors and students.
SELF-CHECK 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE


A.ESSAY QUESTION

Direction: Write the 2 types of computer maintenance and explain

1.

2.

B. ENUMERATION: Gives difference of ideal computer laboratory


atmosphere and explain of it.
1.

2.

3.

4.
TASK SHEET 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE

Performance Objective: given necessary tools,equipment and materials, you

should be able to planned and prepared for maintenance ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems ,utp cable,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation 3.Gather the necessary

materrials and equipment

4. Follow the steps / procedures below:

1. Schedule the use of computer for its longer life. ...


2. Move the computer only when it is turned off and unplugged.
3. Place your computer in a well-ventilated area.
4. Treat your computer properly.
5. Design a monitoring, evaluating and updating plan.
6. Backup your files.
7. Update anti-virus and spyware.
8. Delete temporary files.
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 1.1-1

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Schedule the use of computer for its longer life

Move the computer only when it is turned off and unplugged

Place your computer in a well-ventilated area

Treat your computer properly

Design a monitoring, evaluating and updating plan

Backup your files

Update anti-virus and spyware

Delete temporary files


UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO.2


> Maintain Computer Systems and Networks

LESSON CONTENT: PERSONAL PROTECTIVE EQUIPMENT

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard procedures.


2. Normal function of computer systems and networks are checked in accordance with
manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with manufacturer’s
requirements.
4. Where necessary, needed repairs/replacements are made in accordance with
established procedures.
5. Unplanned events or conditions are responded to in accordance with established
procedures
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 2.1-1

PERSONAL PROTECTIVE EQUIPMENT


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Personal protective equipment

2. Determine the Personal protective equipment

Personal protective equipment is protective clothing, helmets, goggles, or other garments


or equipment designed to protect the wearer's body from injury or infection. The hazards
addressed by protective equipment include physical, electrical, heat, chemicals,
biohazards, and airborne particulate matter.
Personal protective equipment (PPE)

protective clothing, helmet s,


goggles, or other garments or
equipment designed to
protect the wearer's body
from injury or infection.
The hazards addressed by
protective equipment include
physical, electrical, heat,
chemicals, biohazards, and
airborne particulate matter.
Protective equipment may be
worn for job-
related occupational
safety and
health purposes, as well as
for sports and other
recreational activities.
"Protective clothing" is
applied to traditional
categories of clothing, and
"protective

gear" applies to items such as pads, guards, shields, or masks, and others. PPE suits can
be similar in appearance to a cleanroom suit.
The purpose of personal protective equipment is to reduce employee exposure to hazards
when engineering controls and administrative controls are not feasible or effective to
reduce these risks to acceptable levels. PPE is needed when there are hazards present.
PPE has the serious limitation that it does not eliminate the hazard at the source and may
result in employees being exposed to the hazard if the equipment fails.[1]

Any item of PPE imposes a barrier between the wearer/user and the working
environment. This can create additional strains on the wearer; impair their ability to carry
out their work and create significant levels of discomfort. Any of these can discourage
wearers from using PPE correctly, therefore placing them at risk of injury, ill-health or,
under extreme circumstances, death. Good ergonomic design can help to minimise these
barriers and can therefore help to ensure safe and healthy working conditions through the
correct use of PPE.
Practices of occupational safety and health can use hazard controls and interventions to
mitigate workplace hazards, which pose a threat to the safety and quality of life of
workers. The hierarchy of hazard controls provides a policy framework which ranks the
types of hazard controls in terms of absolute risk reduction. At the top of the hierarchy are
elimination and substitution, which remove the hazard entirely or replace the hazard with
a safer alternative. If elimination or substitution measures cannot apply, engineering
controls and administrative controls, which seek to design safer mechanisms and coach
safer human behavior, are implemented. Personal protective equipment ranks last on the
hierarchy of controls, as the workers are regularly exposed to the hazard, with a barrier of
protection. The hierarchy of controls is important in acknowledging that, while personal
protective equipment has tremendous utility, it is not the desired mechanism of control in
terms of worker safety.

WHAT IS PERSONAL PROTECTIVE EQUIPMENT (PPE)?

PPE means personal protective equipment or equipment you use to guarantee your
(own) safety.
Use PPE always and anywhere where necessary. Observe the instructions for use,
maintain them well and check regularly if they still offer sufficient protection. But when
do you use what type of protection?
These 7 tips will help you on your way

1. SAFETY FOR THE HEAD

Wearing a helmet offers protection and can prevent head


injuries. Select a sturdy helmet that is adapted to the working
conditions. These days you can find many elegant designs and
you can choose extra options such as an adjustable interior
harness and comfortable sweatbands.

2. PROTECT YOUR EYES

The eyes are the most complex and fragile parts of our body.
Each day, more than 600 people worldwide sustain eye
injuries during their work. Thanks to a
good pair of safety glasses, these injuries could be prevented. Do you come into contact
with bright light or infrared radiation? Then welding goggles or a shield offer the ideal
protection!

3. HEARING PROTECTION

n
Do you work in an environment with high sound levels? In that
case it is very important to consider hearing protection.
Earplugs are very comfortable, but earmuffs are convenient on
the work floor as you can quickly put these on or take them off.

4. MAINTAIN A GOOD RESPIRATION

Wearing a mask at work is no luxury, definitely not when


coming into contact with hazardous materials. 15% of the
employees within the EU inhale vapours, smoke, powder or
dusk while performing their job. Dust masks offer protection
against fine dust and other dangerous particles. If the materials
are truly toxic, use a full-face mask. This adheres tightly to the
face, to protect the nose and mouth against harmful pollution.

5. PROTECT YOUR HANDS WITH THE RIGHT GLOVES

Hands and fingers are often injured, so it is vital to protect


them properly. Depending on the sector you work in, you can
choose from gloves for different applications:
• protection against vibrations
• protection against cuts by sharp materials
• protection against cold or heat
• protection against bacteriological risks
• protection against splashes from diluted chemicals.
6. PROTECTION FOR THE FEET

Even your feet need solid protection. Safety shoes (type


Sb, S1, S2 or S3) and boots (type S4 or S5) are the ideal
solution to protect the feet against heavy weights. An
antiskid sole is useful when working in a damp
environment, definitely if you know that 16,2% of all
industrial accidents are caused by tripping or sliding. On
slippery surfaces, such as snow and ice, shoe claws are

recommended. Special socks can provide extra comfort.

7. WEAR THE CORRECT WORK CLOTHING

Preventing accidents is crucial in a crowded workshop.


That is why a good visibility at work is a must: a high-
visibility jacket and pants made of a strong fabric can
help prevent accidents. Just like the hand protection,
there are versions for different applications.

WORST-CASE SCENARIO

Prevention is better than cure. A smart thing is to be prepared for the worst.
A classic first-aid kit is no luxury but a first-aid kit for the eyes can also be an essential
first aid. If the employee comes into contact with chemicals, a safety shower is
mandatory, so that he can rinse the substances off his body at any moment.
PREVENTING ACCIDENTS: PICTOGRAMS

Not only is preparing your workshop for accidents a smart thing to do, it is even smarter
to organise your workshop in such a way that no serious accidents can take place. A
simple way to make your workshop safer is to use pictograms: indicating flammable
materials, the necessary use of hearing protection, indicating emergency exits ...
You can find all pictograms in the ‘Labels & decals’ catalogue under ‘Safety’.

If you want to read more


about how to secure your
workshop, then go to this blog
post with 5 tips on how to
work safely with a lift truck.
SO TAKE CARE OF
YOURSELF!
The above-mentioned tips are
simple and easily
applicable to your working
environment. Correctly

observing the safety requires little effort, but it can have a big influence on your health.
Even at TVH, we work hard every day to create a safe working environment. Our SHE-
advisors put our safety first. They take training courses on a regular basis in order to keep
their knowledge up-to-date. From our expertise, we have composed an assortment of
safety products that contribute to a safe working environment. We offer your protective
equipment from your head to your toes, because TVH also takes care of your safety!
Workplace Safety is one of the major concerns that has been successfully driving the
international industrial protective clothing fabric market. Today, from hard hats to steel-
toed boots, personal protective equipment, often known as PPE, is keeping workers safe
from head to toe. PPE has also been successful in keeping employees safe and has also been
acting as the last line of defence against injury or death.
Development of new products are expected to give the market growth a boost and the
progress is driven by various factors such as growing concern towards workers’ safety
along with stringent governmental regulations, persistent growth in demand for protective
clothing from various end-user industries, and extensive investments in research and
development.
However, the high price of protective clothing and a constant threat of substitution can act
against the growth of the market during the forecast period. Protective clothing in
industries such as oil and gas and pharmaceuticals will offer significant opportunities for
manufacturers and an upsurge in demand from emerging economies such as South Korea,
China, India and Brazil are expected to thrust the growth.
Industrial protective clothing market analysis

Growing workplace hazards and increasing worker safety are the major factors that are
expected to drive industry growth for the next decade in various industrial sectors such as
oil and gas, manufacturing, chemical, and food processing. Plus, increasing industrial
fatalities and awareness towards the health and safety of workers’ is also expected to
contribute to the market growth. In fact, for many industries, it is mandatory to comply
with rules regarding workers’ safety at the workplace. Europe and North America are the
major drivers for industrial protective clothing along with the Asia Pacific and the Middle
East. The stringent regulations to follow the rules and guidelines in these countries are
making it mandatory for industries to take care of their worker’s safety on account of
increasing hazards. Additionally, upper management in most of the industrial firms is
taking proactive measures to uphold workers’ safety at the respective workplace.
Today many companies are putting emphasis on raw materials that offer material features
such as lightweight, higher heat resistance, comfort, and wear and tear resistance. This
initiative is to achieve multi-functionality of protective clothing and increase its
application scope. However, one of the challenging factors can be the rising costs of
crucial materials such as aramid fiber, carbon fiber, and silicates.
In 2015, the global protective clothing market was valued at $8 million. This is expected
to reach $10.2 million by 2022, supported by Compound Annual Growth Rate (CAGR) of
3.6% during the forecast period 2016 to 2022.
Innovative trends in the market

Protective clothing is manufactured from fabrics that help in protecting the workers daily
from being exposed to extreme heat, flame, molten metal, and arc flash. The protective
clothes are designed to prevent contact with hazards or adverse elements of the
environments. Protective clothing markets are mostly categorized based on the material
type, namely, polyamide, aramid and blends, PBI, Polyolefin and blends, UHMW
polyurethane and others. Let’s now take a look at some of the innovative trends in the
industrial protecting market.
Soaring Demand for non-woven PPE: Breathability, comfort, high-tensile strength, and
fire and water resistance are some of the qualities that nonwovens offer. They have also
been playing a pivotal role in protecting medical professionals against the exposure to
bloodborne pathogens, and shielding trained professionals against the risk of chemical
exposure and hazardous materials and conditions.
Wearable technology: Wearable technology is becoming increasingly prevalent in PPE to
enhance safety management and increase productivity at the worksite. The sensors that
monitor gas, chemical, heat, sound, and UV are integrated into PPE and clothing to
improve workplace safety. The technology alerts the users to danger in time for
preventative steps. Wearable technology is also successful in offering long-term cost
savings by preventing accidents on site.
Coldwear, a clever jacket: This jacket developed in Norway, monitors workers’ health
levels when they work in extreme cold. The readings of body temperature, humidity, and
perspiration both inside and outside the suit, along with tracking the location of the
worker are recorded. Coldwear, designed for arctic oil fields, goes a long way in
protecting the workers in a harsh environment by sending information back to a central
point. Furthermore, the clothing can detect gas leaks and other harmful substances which
may endanger your workers.
Multifunctional textile for advanced personal protective equipment: In partnership with
Luna Innovations and Vertical Source, Inc., the Department of Homeland Security
Science and Technology Directorate (S&T) developed a lightweight base ensemble that
could be worn on a daily basis. This protective equipment is capable of providing
protection against multiple hazards for a limited period of time. The multilayer textile
system consists of:
• An antimicrobial textile treatment, a protection against a range of bacteria.
• A chemical protective membrane
• Flame resistance textile layer
• Tear protection layer
Lightweight and breathable clothing: Workers often carry around a lot of gear, and the
last thing they need is a hot and heavy coat. The lighter protective apparel and
equipment is a strong need for most workers across the globe. In fact, this need has
been the driving force behind a significant number of innovations in the textile,
garment and face-shield design. Today, environmentally controlled PPE is another
developing technology that helps in keeping the body’s core temperature
consistent while ensuring that workers are comfortable. These environmentally
controlled PPE have been successful in protecting the workers from heatstroke to
frostbite.
Besides, lightweight garments have gained significance in recent times. The textile
innovations and the availability of high-performance yarns and treatments have
made it possible to produce technically proficient PPE with different levels of
thermal and chemical protection and water and fire resistance. For those
considering cost-effective solutions, the durability of these testifies while ensuring
value for money.
Soaring demand for disposable protective clothing: Used for protection from low to
medium level hazards such as fluid handling in a cleanroom or laboratories,
disposable industrial protective clothing is expected to generate revenue exceeding
$1.3 million by 2022. These products are designed to comply with all the
environmental standards and can be easily disposed of. Some of the areas where
disposable protective clothing can be used are disaster response, hazardous waste
management, specialist laboratories, emergency services, sewage treatment, and
drainage construction.
Choosing not to wear PPE can be dangerous in the workplace when it could keep you
protected. Workplace safety is essential and in-depth knowledge of these various
protection devices can help in preventing hazardous injury.
SELF-CHECK 2.1-1

PERSONAL PROTECTIVE EQUIPMENT


A.IDENTIFICATION: Write the Personal protective equipment in the
blank
_l.Its is a offers protection and can prevent head injuries.
Select a sturdy helmet that is adapted to the working conditions. These
days you can find many elegant designs and you can choose extra options
such as an adjustable interior harness and comfortable sweatbands.
_2. Its is a fragile parts of our body. Each day, more than 600
people worldwide sustain eye injuries during their work. Thanks to a good
pair of safety glasses, these injuries could be prevented. Do you come into
contact with bright light or infrared radiation? Then welding goggles or a
shield offer the ideal protection.
_3. Its is a work is no luxury, definitely not when coming into
contact with hazardous materials. 15% of the employees within the EU
inhale vapours, smoke, powder or dusk while performing their job.
_4. Its is a crucial in a crowded workshop. That is why a
good visibility at work is a must: a high-visibility jacket and pants made of
a strong fabric can help prevent accidents. Just like the hand protection,
there are versions for different applications.
_5.Its is a useful when working in a damp environment,
definitely if you know that 16,2% of all industrial accidents are caused by
tripping or sliding. On slippery surfaces, such as snow and ice, shoe claws
are recommended. Special socks can provide extra comfort.

B.ENUMERATION: List down the PPE 7 tips will help you on your way and
Explain brief of it.
1.

2.

3.
4.

5.

6.

7.
TASK SHEET 2.1-1

PERSONAL PROTECTIVE EQUIPMENT

Performance Objective: given necessary tools,equipment and

materials, you should be able to personal protective equipment

ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems ,utp cable,router ,switch hub,bay rack Patch panel ,2

computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation 3.Gather the necessary materrials and

equipment 4. Follow the steps / procedures below:

1. Identify and gather the proper PPE to don.


2. Perform hand hygiene using hand sanitizer.
3. Put on isolation gown.
4. Put on NIOSH-approved N95 filtering facepiece respirator or higher (use a
facemask if a respirator is not available).
5. Put on face shield or goggles.
6. Put on gloves.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Identify and gather the proper PPE to don

Perform hand hygiene using hand sanitizer

Put on isolation gown

Put on NIOSH-approved N95 filtering facepiece respirator or higher (use a facemask if


a respirator is not available)
Put on face shield or goggles

Put on gloves
UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies
to set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO:2


> Maintain Computer Systems and Networks

LESSON CONTENT: Diagnosis of Computer Systems and


Network Function

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 2.1-2 Diagnosis of


Computer Systems and Network Function
LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able


to:

1. Identify the Diagnosis of Computer Systems and


Network Function
2. Determine the Diagnosis of Computer Systems and
Network Function
A Diagnostic Program (also known as a Test Mode) is an automatic computer program
sequence that determines the operational status within the software, hardware, or any
combination thereof in a component, a system, or a network of systems. Diagnostic
programs ideally provide the user with guidance regarding any issues or problems found
during its operation.
Diagnostics programs may be simple or complex, operating unknowingly within everyday
devices or awaiting their invocation to make more complex performance assessments.
Everyday examples are a microwave oven that displays code F6 to warn of a shorted
temperature probe[1] or a garage door opener that flashes its control board's LED four
times warning of critically misaligned safety sensors and impending shutdown.!2!
Diagnostic programs are also inserted into consumer electronic products and
electronic games. Sometimes if the owner of an electronic device asks the manufacturer
how to access the hidden diagnostic program, they may reply to the consumer saying that
the information is considered to be "proprietary" and cannot be shared

COMMON PC PROBLEMS & SOLUTIONS


1. Check the POST. This is generally the first or second thing that
appears on a computer after turning on the power. This appears before
the operating system begins to load. The POST will display any problems
found with hardware that makes the computer unable to boot, POST may
also display problems with hardware that allow the computer to boot, but
not operate at its full capacity during operation
2. Notice the load time of the OS (operating system). A longer
than usual load time may indicate errors in the hard drive.
3. Notice any graphics problems once the OS has loaded.
Reduced graphics may indicate driver failures or hardware failures with
graphic cards. 4

4. Perform an auditory test. An auditory test is an unorthodox, but still


effective way of judging how a computer is working. With the computer on and
running, play any decent length audio file (usually above 30 sec). If the audio is
choppy or slow, it usually means that the processor is working at an elevated level,
or there is not enough RAM to run all programs loading. Changing the startup sound
is a great way to apply this test. Another issue associated with choppy sounds is PIO
(Programmed Input/Output) Mode. This affects how the
hard drive reads and writes data from a drive. Switching to Direct Memory Access
(DMA) allows for faster reads and writes, and can sometimes repair choppy audio.
5. Check any newly installed hardware. Many operating systems, especially
Windows, can conflict with new drivers. The driver may be badly written, or it may
conflict with another process. Windows will usually notify you about devices that are
causing a problem, or have a problem. To check this use the Device Manager, this can be
accessed by entering the Control Panel, clicking the System icon, clicking the Hardware
tab, and clicking on Device Manager. Use this to check and arrange the properties of
hardware.
6. Check any newly installed software. Software may require more resources than
the system can provide. Chances are that if a problem begins after software starts, the
software is causing it. If the problem appears directly upon startup, it may be caused by
software that starts automatically on boot.
7. Check RAM and CPU consumption. A common problem is a choppy or
sluggish system. If a system is choppy it is good practice to see if a program is consuming
more resources than the computer can provide.
A .CON’T. An easy way to check this is to use the Task Manager, right click on the
taskbar select Task Manager, and click the Processes tab. The CPU column contains a
number that indicates the percentage of CPU the process is consuming.
B. CON’T. The Memory Usage column indicates how much memory a process is
consuming. • Network HUB • Network cable • Network card
8. Listen to the computer, if the hard drive is scratching or making loud
noises, shut off the computer and have a professional diagnose the hard drive .
Listen to the CPU fan, this comes on a high speed when the CPU is working hard, and can
tell you when the computer is working beyond its capacity.
9. Run a virus and malware scan. Performance problems can be caused by
malware on the computer. Running a virus scan can unearth any problems. Use a
commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus)
10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly
during POST (this works on most systems). If the problem persists in safe mode, it is a
fair bet that the operating system itself is to blame.
Common Trouble shooting for Computer Units

1. Double check the power connections.

2. Voltage Regulator and power supply could cause power failure in the computer
unit.
3. Check the power cords and cable connectors in your computer unit.

4. Unseated card. Loose cards could cause malfunction.

5. Check the boot sequence configuration in the advance BIOS (Basic Input /Output
Unit) setup.

Diagnosing Network Connection

Things to look for if a PC is connected to the internet or network:

• First check the cable connecting to the network card into the network hub.

• Check the back of the computer to see if the network card light is on

• Check the network cable ( use cable tester)

• Check the network HUB (use multi-tester)


DEX_Identify the following:
1. Moderately dangerous types of errors among those that can pop up on your PC.
2. Caused by malfunctioning hardware components, and are characterized by short
beep sounds from the tiny internal speaker of your motherboard.
3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware components.
5. Caused by corrupted or malfunctioning system files or software executables.

6. Caused by corrupted hardware, especially malfunctioning RAM modules and bad


sectors on hard disks. 7

7. Caused by problems faced by browsers when trying to access a website.


Five Best Computer Diagnostic Tools

Computer diagnostics tools are pieces of software that give you the knowledge you need
to be able to potentially repair your own computer. Some of these tools come built in to
your operating system while others come from 3rd party software developers. Either
way, these tools help save you time and money.

Computer diagnostic tools can be used scan your computer’s hard drive, check your ram
for errors, check cpu temp and give you information about any other devices connected to
your computer. These tools are made to find problems that may be disrupting your
computer’s normal performance. Once a problem is found, you can then plan your repair.

Here are our top 5 favorite computer diagnostic tools:

l.Windows Performance Monitor

<& Task Manager

Processes Performance App history Startup Users Details Services

CPU
AMD A6-6400K APU with Radeon(tm) HD Graphics
CPU
% Utilization

Memory
2.7/72 GB (Wo)

Disk 1 (E:)

Ethernet
Not connected

Utilization
Maximum speed:
Ethernet S: 272 R: Sockets:
56.0 Kbps
Cores:
Processes Threads Handles
Logical processors:

1349 40136 Virtualization:


L1 cache:
Uptime
L2 cache:

0:05:44:13
(2) Fewer details (§) Open Resource Monitor

The first one on our list is built right in to Windows operating systems.
The performance monitor gives you a quick view of vital information related your
computers hardware. From here, you can check out your CPU, Memory,
Disk info and Ethernet information. You can use Performance Monitor to examine
the effects of your running applications in both real time and by collecting data to
check out for later analysis.

2.Windows Resource Monitor


@ Resource Monitor File Monitor Help
l«l-
Overview CPU Memory Disk
Network

CPU F 15% CPU Usage F 71% Maximum Frequency

100%
1 1 Image PID Description Status Threads CPU Average CPU 's
1 1 ShellExperienceHost.exe 5720 Windows Sh... Suspended 30 0 0,00 "
1 1 SearchUl.exe 6254 Search and C... Suspended 21 0 0,00
n SkypeHost.exe 6233 Microsoft Sk... Suspended 10 0 0,00
1 1 perfmon.exe 7608 Resource an... Running 19 3 7,03
1 1 OpenHardwareMonitor.exe 3152 Open Hardw... Running 6 2 2,11
1 1 OpenHardwareMonitor.exe 5292 Open Hardw... Running 6 2 2,10
□ lnssatt.exe 2320 GFI LanGuar... Running 1,79 60 Seconds 0% 1
12 0
MB/sec
-
Disk ■ 4 KB/sec Disk I/O ■ 1% Highest Active Time

Image PID File Read (B/sec) Write (B/s... Total (B/sec) I/O Priority Response,.. *
System 4 C:\5Mft (M... 0 3,6213,621 Normal 2
perfmon.exe 7603 C:\Windo,., 514 0614 Normal
WMiw'MW'WKImmmlmM
2
perfmon.exe
System
7608
4
C:\Windo,.,
C:\Windo,.,
728
0
0728
953953
Normal
Normal
2
2
o
Network 1 Mbps

SB™ i BBS! SB I,
-
Network ■ 87 Kbps Network I/O P 0% Network Utilization

Image PID Address Send (B/sec)Receive (B/sec) Total (B/sec)


svchost.exe (NetworkService) 816 SAMAC 32,255 1,575 33,840
chrome.exe 5736 50-194-58-171 -stati c, hf c.,., 108 2,245 2,353
System 4 10,0.10.255 0 457 457
chrome.exe 5736 Iga15s42-in-f3.1e100.net 61 20 SO Memory 100 Hard Faults/sec
svchost.exe (LocalServiee) 1176 f e30::817f:9741:5419:222c 17 38 55
dasHost.exe 2092 fe80::S17f:9741 ;5419:222c 17 38 55 v

Memory P 0 Hard Faults/sec F 38% Used PhysicaMemory -(M

Image PID Hard Faults/sec Commit (KB) Working Set Shareable [KB] Private (KB) 's
EndpointService. exe 2304 0 226,612 197,496 71,704 125,792
svchost.exe (NetworkService) 816 0 114,632 143,128 63,964 79,164
chrome.exe 5735 0 84,355 146,768 78,340 58,428
chrome.exe 7215 0 75,580 265,452 210,208 55,244
System 4 0 272 49,976 104 49,872
chrome.exe 7528 0 66,876 79,568 30,964 48,604
chrome.exe 2900 0 75,276 114,556 58,548 46,008
chrome.exe 4332 0 73,836 137,472 96,836 40,636
chrome.exe 5924 64,972 107,640 71,768 35,872
0

Windows Resource Monitor is number two on our list. This diagnostic tool is more robust
that Windows Performance Monitor. It is better suited for tracking individual aspects of
CPU, Network, memory and disk usage. This tool gives you an in depth look at what
processes are affecting your CPU, how much memory is being used what is using it,
individual process disk activity and network information like current TCP connections and
what processes are listening on what port.

3.Open Hardware Monitor


I 1 Open Hardware Monitor
X
File View Options Help
Value Max
Q Q KEYMAKER
■ Gigabyte F2A88XM-D3H J AMD A6-6400K APU with
Radeo...
- Ilflfl Clocks 200 MHz 1797 200 MHz 4093
Bus Speed C.PI/ COM- #1 CPU Core #2 (=1 ^ Temperatures MHz 1797 MHz 4093 MHz
Core-ttl ■
MHz
Ei § Load 17.1 “C
CPU Total I CPU Core #1 8.3 "C
66.2 %
• CPU Core #2
E) JlJj Generic Memory 9 Load 3.9 %
1.6 %
100.0%
65.1 %
Memory ^ Data
6.3 %
Used Memory Available Memory
35.1 %
El £3 AMD Radeon HD 8470D + HD 64... E) Voltages I 1 GPU
35.0%
Core 2.5 GB 4.7 GB
- lUIII Clocks
2.5 GB 4.7 GB
| | GPU Core
1.274 V
GPU Memory El Temperatures
I. 024 V
i •..... GPU Core 800 MHz 800
E ■ Load 304 MHz 800 MHz
L
GPU Core MHz
1.0 “C
AMD Radeon HD 6450 E) Temperatures
-3.0 “C
i •..... GPU Core 9.0 %
9 Load
; ; • GPU Core 0.0 %
I El Controls *■■■■ GPU Fan
o,o°c
E £2 Generic Hard Disk 1=1 | Load
Used Space
El a Samsung SSD 840 EVO 120GB E & Temperatures
0.0 *C 0.0 0.0 %
Temperature E E Load
Used Space
% 20.0% 20.0 %

II. 8% 11.8 %

31.0 *C 31.0 *C

71.3 % 71.3 %

Open Hardware Monitor is a free open source application that runs on Windows and
Linux systems. This diagnostic tool monitors your computers temperature sensors, fan
speeds, voltages, load and clock speeds. If your computer is shutting down by itself,
hanging or crashing, this tool can come in real handy by telling you that your system is
overheating or the fans aren’t working properly

4.Speccy
I Piriform Speccy File View

Help

D =PU
1 Summary
Operating System - AMD A6-6400K Cores
ft Threads Name
CPU Code Name Package
m Technology Specification AMD A6-6400K Richland
Family Socket FM2 (904)
rjvRAM Extended Family Model 32nm
IP Motherboard Extended Model Stepping AMD A6-6400K APU with Radeon HD Graphics
Revision Instructions
Virtualization
Graphics Hyperthread i ng Fan
t§l Storage Speed Bus Speed Stock
Core Speed Stock Bus
Speed
Optical Drives
0
RL-A1
&Audio MMX (+), SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, SSE4A, AMD 64
Supported, Disabled
Not supported
9 Peripherals
1762 RPM
S[ Network 99.8 MHz J
3900 MHz
100 MHz
Average Temperature 59 °C
- Caches
LI Data Cache Size LI Instructions 2x16 KBytes 64
Cache Size L2 Unified Cache Size KBytes 1024 KBytes
— Cores

Core Multiplier Bus Temperature Threads


Speed Speed
Core 0 1796.4 MHz x 18.0 99.8 MHz □ 59 °C□ APIC ID: 0
Core 1 1796.4 MHz x 18.0 99.8 MHz 59 “C APIC ID: 1
J y

Check for updates..


Speccy is another great computer diagnostic tool . This application gives information
on just about everything including software, hardware, peripherals, disk info, graphics
& network data. Its easy to use layout make troubleshooting and maintenance a
breeze. Great application to start with when you are looking for specific info about
your computer.

5.HD Tune

HD Tune Pro is a great tool for HDD and SSD diagnostics . This utility allows you to
benchmark your storage device showing you the minimum, maximum and average
transfer rates along with many other useful tools. The other features of HD Tune include
detailed drive info, error scanning, & drive health. The pro version allows you to check
the health status of multiple drives, offers folder usage info, secure erase, file benchmark,
disk monitor, cache test & extra tests.

Computer diagnostics are meant to serve a vital purpose. They are important tools which
work automatically, with very little effort necessary from the end user. They help you
discover and fix problems within your hard disks and network configurations. Rather
than manually searching for small, hard-
to-find problems on your own, you can simply allow computer diagnostics tools to take
care of your problems for you!

Diagnosis of network problems


Our Customers are reporting to us all kinds of problems, from lack of internet, wifi
network problems, ending with informing about the failure of their computer at 3 am :)
We decided to collect and describe the most typical cases and accidents, which occured to
our Users. The majority of problems reported to us are results of suspension of router,
occupied wireless network bandwidth, or running, without user knowledge, program to
exchange files. We hope that this tutorial will introduce our Customers to functioning of
the network sites, and to rectify the cause of the defect independently, before they decide
to tap in the phone our emergency number:)
• I The problem of the Internet. User has a router.
• 1. Cables
• 2. Router
• 3. Interferences
• II Problems with internet when the user doesn't use router.
• III Problems with computer
I.The problem of the Internet. User has a router
Possible reasons:

• Problem with the suspension of the router


• The problem of wiring problem with p2p running
• The problem of the occupied bandwidth of wireless network
1. Cables
The router has several dozen of wires attached. This cables may get pulled off, unplugged,
or could be just damaged.
• Push all the cables to make sure that none of them slipped.
• Check destruction of the wires, look if any of the end-piece isn't twist off.
• Make sure the power wire is plugged into the router properly. If the device LED's do
not shine, there is a problem with power.
• Next check if all of cables are properly plugged. Below is a picture which shows all
the ports of the router. Depending on the producer and model, they may look slightly
different, but the idea is the same everywhere -internet cable must be plugged into the
internet port / WAN (Blue port in the figure)
• if you have any computers plugged by the cable, they must be plugged in the LAN
port (yellow port in the figure)
WARNING: Plugging internet cable into a port other than the WAN may cause serious
problems!
If your computer is connected to the router using a network cable, make sure that the
network cable is plugged into the computer port properly. Additionally, after cable
plugging You should have observed two LEDs, one of them ought to „blink”. You need
to know also that some computers do not have any diode signal.

Some PC's have more than one Ethernet (network) connector . Check also the second
link.
2. Router
Common causes of problems:

• router-crash
• failure of router
• interference in a wireless network
The first case is the simplest. If Yours internet connection slowed drastically, or it doesnt
exist, try turn off the router by disconnecting him from power system for several seconds
and plug again. If reboot doesn't help, go to the second point- router failure.
You can very simply and independently verify if the router has failed. Just unplug the
Internet cable from the router (look at the description of the cable connection on the
router) and connect it to the network adapter in your computer. If the computer, was
register in our web, you should see page which you wanted to visit, if not, you will see our
welcome page „Welcome to Sloneczko.net”. These two cases show the router failure. If
nothing show up, it means a breakdown of the network - please contact us immediately.
Another cause of problems with the router is so wide that we will describe it in a separate
chapter.
3. Interferences
Wireless network, so-called wifi is very nice but also very imperfect thing. Theoretically
reach of the wireless network in open space and without any noise is only 150 meters!
Obstacles such as walls, windows and doors cause high damping and decrease of signal
quality. Also interferences of energy networks and other wireless networks (e.g. of our
neighbours) could be possible source of problems.

So what to do to make sure that the problem with speed is caused by weak wifi signal?
• Plug in to the router via cable - plug in the ethernet cable to your computer then plug in
that cable to one of the LAN ports of the router (check description of cable pluging to the
router). If there's no problem on the cable, surely you have problem with wifi connection.
• Plug in ethernet cabel directly to the computer ommiting the router (check the
description of diagnosing of the router’s damage ). If you
see our welcome page “Welcome sloneczko.net” fill in the form on there and
send it to us. When we register your computer as active device you will be able
to check your speed without a router. If it's ok - you have a problem with wifi
• The third method requires some knowledge about the system. You
can check the response time of the router using commend “ping”. You must
know its address to do this. Router address is the address of a gateway on your
computer. Checking the IP address of the router we described in the article
about configuring dhcp in router TP-Link
Now, when you know IP address, type commend “ping” into the dos window
(which is described in the article). You can stop commend executing by pressing
ctrl + c.

If response time is high (about 50 - 70 milliseconds or more) or which is worse, part of


the package is lost, this means that we definitely have a problem with wifi.
Ok. So we have diagnosed problem with wireless network and what next? First check the
location of the router. Should be placed high, possibly in the center of the apartment..
Another very important element is to find a free channel, which is the least used.
Unfortunately, most routers do not have the tools that allows to check the bandwidth
usage at different frequencies. That's why we can only set one after another all the
channels and check the operation of the network.
To change the channel we have to login to the router. Type router address (that you found
before) into address bar in the browser.
Nie udato si$ nawi^zac pot^czenia
Pod a) nazwf utytkownlka I hasto

If the router was configured by us, surely you received from us the access data. If not ask
person configuring the router for login and password.
After logging into the router go to wireless settings. Remember that in different models of
routers managing panel will be slightly different. In our example, click on the Wireless
(4) then the wireless settings (5).
In the channel menu select the wireless channel. Sometimes before we can find the
channel on which our network is working well we will need to check a few other
channels. Avoid channel 6 (very often used by equipment manufacturers as a default
channel), and extreme ones. You can also select the network at 11 Mbps (b), instead of the
network at 54 Mbps (g). It will increase the transmitter power in our router.
We check our work effect on each channel by checking router response time with the
command “ping” or checking connection speed at network speedtest.
II .Problems with internet when the user doesn't use router.

If you don't have a router in your home you can check external causes described in
chapter I.1. cables. If there aren't any problems with operator's network, the cause of
problems with connecting to the internet may be your computer.

III. Problems with computer Hardware parameters


Size of materials distributed via inrernet continues to grow. A few years ago web pages
used to be smaller than 1 megabyte, today some of them are bigger than gigabyte. If your
computer is an old Pentium 1 ghz and you've got half gigabyte of RAM you have to know
that probably all of it will be occupied by the system and web browser. Firefox with a few
tabs opened can use hundreds megabytes of RAM. In that case page rendering can take
forever.
The use of hardware resources OK, so your computer's a powerhouse, processor takes first
place in all benchmarks and all of your RAM would be enough for four other computers.
But it doesn't make any difference if you have twenty different plugins form weird pages,
computer's registry swells and processor is used by plugin for watching TV. Not to
mention that two antiviruses finish the system of.
Check the list of installed applications. Delete what's redundant. One antivirus is enough.
Take a look at process list, to see if some application uses too much memory or processor.
If your computer is overloaded, rendering pages will take lots of time.
Viruses There's no need to say much. Check if your antivirus is up-to-date. Scan your
computer. Nothing uses your bandwith as viruses sending all over the internet.
Peer2Peer software P2P, torrents, eMule and lots of other applications for file exchange.
The only thing we have to do to stop it from disrupting our work is to configure it in the
way that won't allow it to use more than 1/2-3/4 of our bandwith, sending faster than a
few kilobytes per second and opening more
than 200-300 connections. And, of course, shuting it down when all of the files are
downloaded. Even though you finished your download, thousands of people from around
the world can connect to your program and efficiently blocking your bandwith.
P2P software left unconfigured causes that even if you're not downloading programs
connecting with your computer won't let you work normally. To download something
from the internet you need to send a request. And how can you send it if your bandwith is
clogged?
If you don't know how to check your network traffic you can always log into your client
control panel - you can find graph of your network traffic. If there's something wrong
you'll notice it right away.
We're hoping that this simple tutorial will help you understand how the network works
and will make using the internet more comfortable.

SELF-CHECK 2.1-2

Diagnosis of Computer Systems and Network Function


A.IDENTIFICATION: Write the diagnosis computer systems in the blank

_1. Its is a performance monitor gives you a quick view of vital


information related your computers hardware. From here, you can check out your
CPU, Memory, Disk info and Ethernet information.
_2. This is a tool gives you an in depth look at what processes
are affecting your CPU, how much memory is being used what is using it, individual
process disk activity and network information like current TCP connections and what
processes are listening on what port.
_3. . This is a diagnostic tool monitors your computers
temperature sensors, fan speeds, voltages, load and clock speeds. If your computer is
shutting down by itself, hanging or crashing, this tool can come in real handy by
telling you that your system is overheating or the fans aren’t working properly

_4. This is a utility allows you to benchmark your storage


device showing you the minimum, maximum and average transfer rates along with
many other useful tools
_5. This is a application gives information on just about
everything including software, hardware, peripherals, disk info, graphics & network
data.
B.ENUMERATION: List down common pc problems & solutions the & Explain brief of
it.
A.

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.
List down common Trouble shooting for Computer Units

B.
1.

2.

4.

Things to look for if a PC is connected to the internet or network

C.

1.

2.

3.

4.
TASK SHEET 2.1-2

Diagnosis of Computer Systems and Network Function

Performance Objective: given necessary tools,equipment and materials, you should be

able to diagnosis of computer systems and network function ff. Standard operating

procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation 3.Gather the

necessary materrials and equipment 4. Follow the steps /

procedures below

1. Describe the problem


2. Define the affected subsystem
3. Is it hardware or software
4. Diagnose printing woes
5. Deal with networking trauma
6. Resolve login issues
7. Troubleshoot specific software
8. Look for virus issues
9. Ask for a demonstration
10. Use your tools

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-2

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Describe the problem

Define the affected subsystem

Is it hardware or software

Diagnose printing woes

Deal with networking trauma

Resolve login issues

Troubleshoot specific software

Look for virus issues

Ask for a demonstration

Use your tools


> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks LESSON CONTENT:

Maintenance of Computer and Networks

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-3

Maintenance of Computer and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the maintenance of computer and networks


2. Determine the maintenance of computer and networks

Procedures in Planning and Conducting Maintenance


Preventive Maintenance
Preventive maintenance can be described as maintenance of equipment or systems before
fault occurs. It can be divided into two subgroups: Planned Maintenance and
Conditioned-Based Maintenance.
Planned Maintenance (PM) is any variety of scheduled maintenance to an object or item
of equipment. Specifically, PM is a scheduled service visit carried out by a competent and
suitable agent, to ensure that an item of equipment is operating correctly to avoid any
unscheduled breakdown and downtime of an equipment.
Condition Based Maintenance (CBM) is a maintenance strategy that uses the actual
condition of the asset to decide what maintenance needs to be done. CBM dictates that
maintenance should only be performed when certain indicators show decreasing
performance or upcoming failure. Checking a machine for these indicators may include
non-invasive measurements, visual inspection, performance data and scheduled tests.
Condition data can be gathered at certain intervals, or continuously.
The purpose of systematic inspection, detection and correction of existing / future
problems is very important to maintain equipment / facilities in satisfactory condition
before it may cause major problem.
Maintenance, including tests, measurements, adjustments, and parts replacement,
performed specifically to prevent faults from occurring. Maintenance is divided into two
(2) general type. Preventive maintenance is given for maintaining equipment and
facilities in satisfactory operating condition to extend the life of the equipment.
Corrective maintenance is task
performed to identify, isolate and rectify a fault so that the failed equipment or system can
be restored to an operational conditions within the tolerances or limits.
Common methods of determining what preventive (or other) failure management policies
should be applied are: Original Equipment Manufacturer (OEM) recommendations,
requirements of codes and legislation within a jurisdiction, what an "expert" thinks ought
to be done, or the maintenance that is already done to similar equipment, and most
important measured values and performance indications.
Maintenance Procedures
In preparing maintenance procedure, you also have to consider designing a systematic
plan for both for hardware and software. This saves time, money and frustration and
ensures safe conditions to prevent injury to people and damage to computer equipment.

Planning Maintenance Procedures for Computer System and


Networking:
A. Design a systematic maintenance plan for hardware.
Design a monitoring, evaluating and updating plan.
Place your computer in a well-ventilated area.
Schedule the use of computer for its longer life.
Move the computer only when it is turned off and unplugged.
Treat your computer properly.
B. Design a systematic maintenance plan for your software.
Backup your files.
Install or secure passwords.
Delete temporary files.
Update anti-virus and spyware.
Design a systematic monitoring, evaluating and updating plan for hardware.
Computers have significantly changed the working environment, simplifying and
speeding up many tasks across many work areas. However, with these advances are some
potential problems and maintenance issues. These guidelines describe how computer
technicians, students and computer users can work together to achieve a productive
workplace environment. The guidelines reflect current knowledge and best practice for
the use of computers so you can achieve maximum efficiency and safety in your
workplace.

SAMPLE MONITORING PLAN


Date:
Recommendations
Comp Comp Comp Comp Comp 1 2 3 4 5
Monitor is functional.

Printer Cartridges are


replaced.
Storage devices are
functional.
Optical Drives are
functional.

Place your computer in a well-ventilated area.


This will allow proper circulation of air inside the computer unit.

Schedule the use of computer for its


longer life.
This will help lessen the attacks of
viruses and increases the life span of
your computer.

Move the computer only when it is


turned off and unplugged.
To avoid damage to the computer
unit always turn off and unplugg it when transferring the computer to another location.

Treat your computer properly.


This means taking care of your computer. PCs and laptops should be properly turned
off.

Do systematic maintenance plan for your computer software.


Things to Maintain And Repair Computer System and Networks
Everyone loves computers when they work. Everyone screams at them when they don't.
Here's ten ways to keep your computer running smoothly into its old age. While I can't
promise that these tips will keep your computer from ever having problems, it will at
least help prevent them, and make recovery easier when they do occur.

1. Back up your data.


When was the last time that you backed up your data? Not 'when was the last time you
thought about it, or 'when was the last time you told someone how important it is', but
when was the last time you actually backed up your data? And how much will you lose
if your current hard drive fails right now and you have to rely on that backup?

Think about that for a second. Now, go


create a backup.

If you don't know how, don't have a regular


plan, or just want to see what's new in the
field, Consumer Reports has a good
overview of the most common options.
Personally, I have very little media on my
computer, so I burn my files to CD once a
year or so, and copy files to a flash drive in
between. It's quick, inexpensive, and secure
enough for my needs.

Another decent solution is to use a program like Foldershare to synchronise your


files between two computers (even better, two locations).

If you have the opportunity, make a full disk image (a 'snapshot' of your entire hard
drive) immediately after reloading the OS and all your programs. This gives you a clean
starting point to go back to if you need to reload everything
again, and will be much faster than redoing everything manually. Acronis True Image 11
is good for the job.

2. Clean dust from your computer.


Computers are some of the most efficient dust collectors known to man. Aside from
looking gross and possibly being an allergy hazard, a dusty computer will trap heat,
which can reduce its performance and lifespan. The easiest way to clean it is with
compressed air - open up the case, take it outside, and blow the dust out. The exterior of
the case can be wiped down with a damp cloth. Be careful about using household
cleaners, as they can easily destroy circuit boards. For most computers, cleaning once
every year or eighteen months should be adequate.

Beyond just getting the dust out, here are some other steps to
consider: Dust often collects inside the CPU and video card
heatsinks, consider disassembling and cleaning them if you're
comfortable doing so, or at least using compressed air to
specifically blow them out. While the case is open, plug in the
computer and turn it on long enough to make sure all the fans
are still spinning. Replace any that are dead or noisy (a
common sign of a worn-out fan). If there is sticky residue or
dirt on the circuit boards, it can be removed with a cotton
swab dipped in rubbing alcohol, which will evaporate cleanly.
(Make sure the computer is unplugged first!) If you're not
comfortable with working inside your computer or suspect
your computer has

chronic overheating issues, Puget Systems or another professional repair service can help
you out.
3. Clean up your cabling, and everything else too.
There are probably two things behind your computer: a mess of cables, and dust bunnies.
If you're moving your computer, take the opportunity to clean your desk and floor as
well. While I can't claim that a clean work area will improve your computer's
performance or lifespan, it will certainly improve your peace of mind, and clean cabling
will help prevent snags and stresses on your computer ports. If you have a lot of
peripherals, consider using cable management of some type. Twist ties work fine, or
make a trip to any large office supply store. You can use a full out cable solution, but
even a five dollar cable wrap can neaten up your desk considerably.
> While you're wiping down your desk, wipe down the monitor too. CRT screens can
be cleaned with any mild glass cleaner, but LCD screens can't tolerate it. Use a
dampened cloth or a
product specifically made for LCD screens.
> Keyboards can be turned upside down to dump out crumbs and dirt, or keys can be
pried off and the whole assembly cleaned with compressed air. There are some good
step-by-step guides available on Lifehacker. Take a picture first so you can put the
keys back in the right place! If you're feeling adventurous (or just have a really
disgusting keyboard), some people advocate running it through the dishwasher.
>
This is a good time to take a look at where your computer is located. Is there adequate
ventilation? Is the computer out of direct sunlight, and away from heat sources? What
is it plugged in to? There's no excuse for not having a good surge protector (not just a
plastic power strip!), and battery backup units have become affordable for most users.
This will affect the lifespan of your computer.
Smoking will make a mess of a computer faster than anything else I know of. While we at
Puget Systems have never seen one quite this bad, we can always identify a smoker's
computer as soon as we unbox it. Electronics absorb the smell very easily, and even an
all-metal case will retain the odor after all the components have been removed. Plus,
there's usually a layer of dust and tar on the circuitry that tends to be a giveaway as
well. Please, if I can't convince you to quit smoking all together, at least take it
somewhere away from the computer!
4. Organize your installation disks
Keep software, peripheral, and driver disks in a single location, preferably close to the
computer. A shoebox works fine. Make sure you have them handy before attempting
computer maintenance or repairs - it's amazing what can become
necessary in the middle of a lengthy troubleshooting session to not and it is common
know what you're missing until you need it!
5. Run antivirus and spyware scans regularly.
This item should go without saying, but I'll say it anyway.
Any computer that is connected to the internet needs to have some
sort of antivirus software. There is a tremendous variety available,
everything from AVG Free to enterprise-level solutions. Use
whichever you like best. Most antivirus software will monitor the
system for threats in real time, so a full daily scan probably isn't
necessary, but do make time to run a full scan every month at the
least. AVG
Anti-Virus System

Some antivirus programs also protect against adware and spyware, but not all. If yours
doesn't, or if you just want an extra layer of
security, AdAware and SpyBot are two of the best known (and free!) products available.
While they may not be as destructive as viruses, adware and spyware will compromise
privacy and slow your computer drastically. Run scans for them at the same time as your
antivirus.
6. Clean up your software.
Every few months, look through the 'Add or Remove Programs' interface that is found in
the control panel. If there's software on there that you don't use any more, remove it. This
goes triple for browser toolbars, free games, and other resource-eating bits of fluff. Be a
little cautious, though - some system drivers appear in this list, and can cause hardware to
stop working if you remove them.
There's an excellent scanning utility on Steffen Gerlach's website that gives a graphical
representation of the data stored on your hard drive. This will give you a good idea of just
how much room your music collection really takes, or how much space is going to old
games.
7. Clean up your OS
Windows is not the most efficient operating system, and sometimes needs attention itself.
It saves a large amount of unnecessary information, mostly in the form of 'temporary' files
(which never get deleted) lists of recently performed searches, and the like. There's an
excellent program called CCleaner, which will clear out most of the unneeded data
automatically. If you're interested in
further optimizing your OS, there's a wealth of information available online,
including an article on improving XP performance available here on Puget's website.
8. Update everything

Check for updates for your hardware and software. This includes running
Windows Updates, checking for updated drivers, and checking for software
patches. The easiest way to find these is to go to the manufacturer's website,
to their support section, and then look for a 'downloads' section or search for
your product's name. If you've been having problems with a piece of
hardware or software, be sure to check for patches or updates - if other
people have been
having similar problems, it's likely the manufacturer has released a fix for it.
The exception to this is motherboard BIOS updates. Flashing a BIOS can be difficult, and
if it's done incorrectly you may need to send the computer for professional repair to get it
working again. If the update was specifically released to address problems that you've
been dealing with, it's probably worth it. Follow the manufacturer's directions carefully!
Otherwise, leave it alone.
9. Defragment
Once your hard drive has been cleaned up, it's a good time to defragment. This organizes
your files, leading to faster disk access times and improved system performance. The
Windows defragmenting tool (Start > All Programs > Accessories > System Tools > Disk
Defragmenter) works well, or there's a list of open source and commercial defragmenting
software available on Wikipedia if you'd rather use something else.
10. Read more articles like this one
Last but not least, continue to read articles like this one, and anything else computer
related that catches your eye. The computer industry is constantly changing - even if you
have the same computer, there will be innovations that affect you. At the very least, you'll
go into your next computer purchase far better informed than you would be otherwise.
We at Puget Systems always encourage our customers to learn about computers in
general and their system in particular. Well educated users tend to have fewer difficulties
with their system, and besides, we love computers and think everyone else should too!
Our commitment is to create a computer to meet your needs and budget, using our
experience to assist you every step of the way from the first visit to our website to tech
support calls two years later. We accomplish this in part through friendly sales and
support reps, an
informative website, and publishing articles on a regular basis. Give us a call or email,
we'd love to hear from you!
Tags: Advice, Support, Maintainance

SELF-CHECK 2.1-3

Maintenance of Computer and Networks


A.ENUMERATION: Gives the maintain and repair computer system and
networks and explain brief it.

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.
B.Gives the sample of monitor plan?
TASK SHEET 2.1-3

Maintenance of Computer and Networks

Performance Objective: given necessary tools,equipment and materials, you should

be able to maintenance of computer and networks ff. Standard operating

procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation 3.Gather the necessary

materrials and equipment

4. Follow the steps / procedures below Things to Maintain And

Repair Computer System and Networks


1. Back up your data.
2. Clean dust from your computer.
3. Clean up your cabling, and everything else too.
4. Organize your installation disks.
5. Run antivirus and spyware and scans regularly.
6. Clean up your software.
7. Clean up your OS.

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Back up your data

Clean dust from your computer

Clean up your cabling, and everything else too

Organize your installation disks

Run antivirus and spyware and scans regularly.

Clean up your software

Clean up your OS
> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks LESSON

CONTENT: Repair or Replace faulty System


ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-4

Repair or Replace faulty System

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the repair or replace faulty system

2. Determine the repair or replace faulty system

When to repair your computer and when to replace it

No computer lasts forever, but to


get the most out of your investment,
you probably want to stretch its life
out for as long as you can. Upgrades
and repairs can carry your machine
along for a decent amount of time,
but at a certain point, you might be
better off investing in a new
computer instead of dribbling away
your money on continuing
maintenance.

Eventually, every computer


slows down—even if you’re using it for the exact same things you were five
years ago.

"Over time, you'll get Windows updates, or a new version of macOS, and these things can
weigh heavily on the PC,” says Joe Silverman, owner of New York Computer Help. Even
some of your apps will update themselves over time, and the web pages you visit may just
require more resources than they used to.
(Remember what the web looked like in the 90s?). When the machine slows to a crawl,
you'll have to bite the bullet and spend your money on something better.

Before you shell out for a new set of RAM though, you should figure out what’s actually
causing the slowdown. This will tell you whether you really need a replacement, or you’ll
find it worthwhile to eke out more time with an incremental repair or upgrade.

Diagnose the problem


Your computer consists of multiple components, each with their own specific purpose. Any
one (or more) of them could be causing your slowdowns or other issues. To make sure you
spend your money in the right place, you need to diagnose the source of the problem.

First, make sure it isn't a software issue. "It's always good to run a virus or malware test,
and make sure there are no infections in the background," says Silverman. You can also
check programs' resource usage: On a PC, open the Windows Task Manager (hit
Ctrl+Shift+Esc) and click More Details; on a Mac, open Spotlight (press Command+Space)
and search for Activity Monitor instead. If you see one program gobbling up all the CPU or
RAM, uninstalling it and replacing it with an alternative may speed things up.

“Check the operating system, too—there could be corruption somewhere,” says Silverman.
“If you haven’t reinstalled the operating system in five years, it might be time.”

If you can't narrow the issue down to just one program—or the problem lies with an
essential one, like your web browser—then you may need to upgrade your hardware.
During the next slowdown, open up that same Task Manager, head to the Performance tab,
and look at your CPU and memory usage. If either of those graphs shows particularly high,
sustained usage, you know which part probably requires an upgrade.

It's also possible that one of your components is failing entirely. "Do a hard drive test with a
program like HD Tune, which has a free trial," says Silverman. "It will let you know how
slow or abnormal some of the read-write activities are, and if your hard drive is failing." I
also like CrystalDiskInfo, which isn't as thorough as HD Tune, but will give you a basic,
clear idea of your hard drive's health for free.

While you're running through potential trouble areas, check your RAM as well. "Failing
RAM could cause slowness, but it can also stop your computer from turning on, or it may
shut down randomly," says Silverman. "So run a RAM
test like Memtest, which will check each stick and see if it's good or not. If you have a bad
stick, you want to make sure you replace it.”

REPAIR FAULTY SYSTEMS

You don’t have to run to the repair shop every time your PC ends up with an issue. Many
of the common PC problems have a rather simple solution, and you can fix them yourself
with a few simple steps.
To help you troubleshoot common PC problems yourself, I have listed 15 most common
PC hardware problems and what your options are if you face any of them.
| Read Also: How to Fix Corrupted Windows System with System File Checker

1. PC Overheating
A heating PC slows down the whole system and leads to frequent crashes.
Additionally, PC components may also get permanently damaged due to constant
exposure to heat.
There are two main reasons your PC heats up, i.e. either the cooling system isn’t working
properly or the PC is heating to the point your cooling system can’t handle it anymore. In
either case, I have written a comprehensive article on different
solutions to handle an overheating PC. Do check it out.

2. Dysfunctional USB Port


If your USB port stops working, it’s not necessary that it’s broken. Below are some
solutions that can fix this issue:

Method 1: Restart the PC


Restarting the PC is the answer to many problems, and it is a common solution to USB port
problem as well.
Method 2: Uninstall USB port driver
Uninstalling the driver of the USB port will force Windows to reinstall it when you will
restart the PC. This may fix the problem. Here is how to do it:

1. Press Windows + R keys and enter devmgmt.msc in the Run dialog to open the
Device Manager.
2. Here, expand Universal Serial Bus controllers option.
3. Now right-click the entry USB Host Controller and then click on Uninstall.
4. Repeat this for all entries with USB Host Controller to uninstall drivers for all the
USB ports.
5. Once deleted, restart the PC and Windows will automatically reinstall the drivers
and fix any driver issues.

Method 3: Disable USB selective suspend

USB Selective Suspend is a Windows power saving feature that suspends unused or idle
USB ports to conserve power. Sometimes it could stop a USB port from working. Here is
how to disable it: 1

1. Press Windows + R keys and type powercfg.cpl in the Run dialog to open
Windows Power options.
2. Here click on Change plan settings next to your current plan and then click on
Change advanced power settings.
3. Now, expand USB settings and disable USB selective suspend setting.
4. Restart the PC to see if it fixes the USB port issue.

Note: This option should be kept enabled if you want to save battery power. If it doesn’t
fix the USB port issue, then enable it again.

3. PC keeps disconnecting from WiFi

If your Wi-Fi is working fine but your PC keeps disconnecting from it, then your PC’s
network card may not be receiving full power. Windows has a built-in power saver option
that gives less power to the network card. You need to disable this feature: 1 2 3

1. Go to Advanced settings in the Power Options.


2. Here expand Wireless Adaptor Settings and then expand Power Saving
Mode.
3. Set this to Maximum Performance.
4. PC beeps
The PC motherboard is smart enough to detect problems and sounds beeps in different
rhythms to tell you. Here is an article on what it actually means
when the PC beeps multiple times.
If the PC doesn’t start after the beeps, then it’s usually difficult to solve the problem
yourself. However, I’m going to list down two of the most common problems due to which
beeps occur, and thankfully, you can solve them yourself as well.

Problem 1: Out of place RAM


A problem I recently dealt with. If the RAM inside your PC gets loose or out of place, then
your PC will beep 2-3 times and won’t boot at all. The solution is simple, open up the PC
(laptop users should let an expert handle this) and reinsert the RAM. Here’s how: 1

1. Take out the RAM completely and clean any dirt inside the slot using a
cotton bud.
2. Now insert back the RAM and put enough pressure on both ends to ensure it is
fully inside.
3. Afterward, close the clips and make sure they’re properly locked. Even a slightly
loose RAM will be unable to work.

Read What Causes Memory Damage?


• Power surges can damage most computer components, including RAM. You should
plug your computer and other expensive electronics into a surge protector. Make sure you
know the difference between a surge protector and a power strip.
• Before you handle any parts in your computer, make sure you ground yourself by
touching a piece of grounded metal to discharge static electricity. Electrostatic discharge
can damage your computer.
• Excessive heat can cause RAM and other parts to wear out over time.
Individual components can overheat, or heat from one component can cause damage to
adjacent parts.
• If you have overclocked any part of your computer incorrectly, it may cause damage in
the form of excess heat.
• Your memory module may have some fault that passed through quality control and
worsened over time. This is the most likely cause behind a damaged RAM. It is also
possible that the memory module is fine, but one or more memory slots on your
motherboard are defective, hindering the RAM's performance. The defect may even be so
bad that it damages the memory stick.

Diagnosing the Problem


• If the symptoms started after you recently added more memory, the new module could
be faulty. This seems obvious, but any time a problem begins after making a change, first
check to see if the change caused the problem.
• Your computer may produce multiple beeps or a continuous beep when you turn it on.
These beeps can indicate many different problems, including being a symptom of bad
RAM. Beep codes vary depending on the manufacturer of your BIOS. You can look up the
beep codes for your specific computer to figure out its specific problem.
• If you are not comfortable fixing your computer yourself, I recommend taking your
computer to a local repair store rather than a big retail store. Big stores are in the business
of selling additional parts, not fixing problems.
• If you are an advanced user, there are diagnostic programs that can help you figure out if
you have a memory problem. Your computer may have one preinstalled by the
manufacturer or you can download a third-party program. The Windows Memory
Diagnostic by Microsoft is also good if you suspect memory problems on a Windows PC.
• If the above programs indicate your memory sticks are functioning, but you still suspect a
RAM problem or if you need to find which memory module is the problem, you can try
removing the modules and placing them in different slots.

10 Pieces of Hardware you should replace rather than repair

Any time a computer component stops working, or just becomes unstable -- as we all
know will happen from time to time -- we have to decide whether to replace it, have
it repaired, or just get by as is with perhaps a temporary fix. Repair or just getting
by will nearly always be the cheapest solution, at least in the short run. Replacement,
however, will usually provide a good opportunity to upgrade. In fact, given the rate
at which the various technologies behind computer hardware are advancing, unless
you replace something a week after you buy it, you may almost be forced to
upgrade.Following are a few items which, if replaced (and generally upgraded), can
provide excellent benefits, from an enhanced user experience to additional
compatibility, greater longevity, and stability for the whole system.
#1: Power supply
One of the most overlooked pieces of computer hardware is the power supply unit
(PSU). Computer enthusiasts often brag about their blazing fast processors, top-of-
the- line video cards, and gigs upon gigs of RAM, but rarely about their great PSUs.
The truth is, the power supply is the last thing we should skimp on when choosing
components for our system. If a computer's brain is its processor, its heart is the
power supply. And having one that is worn out, underpowered, unstable, or just
generally cheap can be a major cause of hardware failure.
Every computer's power requirements are different, but a good minimum for a
modern PC is 450 watts. Some systems, especially those with multiple high-end video
cards or lots of add-on cards and peripherals may require a PSU rated at 800 watts
or more. Replacing a failing or inadequate power supply can make a previously
unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A common
cause of "unexplained" lockups and system crashes is a drop in voltage supplied to
the system when under load, caused by a poorly
manufactured PSU. The easiest way to find a quality PSU is to stick to the consistently top
brands such as Antec, EnerMax, and PC Power & Cooling.
#2: Fans
As computers have gotten more powerful over the last decades, they have also gotten hotter.
Gone are the days of a passively cooled Pentium 100; now we have fans on our massive
CPU heatsinks, on our monster video cards, and on intake and outtake vents to our
computer cases. All of these fans are playing important roles by keeping our computers
safely cooled, and we should try to ensure that they continue doing so.
Fans are one of the few parts that when replaced will not usually be replaced with
something better. But they deserve mention because:
• As one of the few moving parts in our system, they are one of the most likely to actually
break.
• When they break, it's likely to pass unnoticed or not cause much concern. Also, fans are
cheap and easy to replace. It generally takes about 10 dollars, 15 minutes, and a
screwdriver to install a new one, so there's really no good excuse for not doing so.
#3: Surge protector / UPS
This is another item that keeps our computers safe and should not be neglected. A surge
protector can be a stand-alone power strip, but one is also built into virtually every
Uninterruptible Power Supply (UPS). The surge protector guards our devices against
spikes in energy that occur in our circuits at the home or office, usually due to lightning or
the powering up of high-powered devices, such as hair dryers or refrigerators. Repairing a
surge protector would be difficult and expensive at best; replacement is almost always the
best option.
It can be tricky to know when it's time to replace a surge protector, because the component
inside that diverts excess power from surges to the ground simply wears out with repeated
use. However, there is often no interruption of power or other indication that it's done. You
may still have juice but not be protected. The cheapest protectors may wear out after fewer
than 10 small surges, while the better ones can last through hundreds. The safest thing to
do is to get higher quality protectors but still replace them occasionally.
#4: Video card
The video card is one of the most important elements in the performance of your system
and overall user experience. Even though it is also one of the priciest components, there are
two good reasons to replace it should your old one bite the dust.
First, video cards are one of the components that are being improved upon seemingly every
day. Just like with CPUs, a video card that's two years old simply isn't as fast as a current
one and won't have the newest features (such as support for DirectX 10).
Also, the video card is the number one hardware stopgap as we migrate to Vista.
Manufacturers just aren't providing new Vista-compatible drivers for lots of their old video
cards. This means that many of us will have to replace our video cards whether they are
broken or not, if we plan to switch to Vista.
#5: Flash media reader
All kinds of devices use flash cards these days: cameras, MP3 players, even cell phones.
These small devices let us take our data anywhere easily. Since it seems as if every device
uses a different format of flash media, most of us have all-in-one type card readers. If the
reader breaks or gets lost (which seems to happen a lot), there are two excellent reasons for
upgrading to a newer model instead of trying to repair the old one.
First, many old card readers are USB 1.1. The newer ones use USB 2.0 instead, which is 40
times faster. This is more than enough reason to replace an old reader, even if it's not
broken.
In addition, new formats are constantly coming out for flash cards, and when they do, you
need a new reader to use them. For example, Secure Digital High Capacity (SDHC) and xD
from Fujifilm are not supported by older readers.
#6: CD/DVD drives
Considering that it has moving, spinning parts, the average CD/DVD drive is actually fairly
robust. Because of that, however, many people are still using old read-only (or CD RW)
drives instead of amazingly cheap (and handy) DVD writers. If you're still using an old
drive and it finally gives up the ghost, you'll probably be glad it did when you replace it
with a DVD/CD RW combo drive for less than 50 dollars.
#7: Hard drives
The computer component we all least want to fail is the hard drive. It's easier to cope with
the loss of the much more expensive processor or video card as long as we still have our
precious data, so your first instinct is to try to repair it. But if you've been practicing good
backup habits, you can actually come out of the situation better off when you replace the
old drive with something bigger and faster.
The "giant" 100-GB hard drive of a few years ago is no longer so large. Today, you can get
750 GB for less than 200 bucks. In addition to being much, much larger, newer hard drives
will generally be Serial ATA II (SATA II), which has a
maximum data transfer rate of about 300 MB/s as opposed to SATA I's 150 MB/s and the
older Parallel ATA (PATA) rate of 133 MB/s. SATA II is fairly new, so many motherboards
don't support it. But even if yours doesn't, the SATA II drives generally have a jumper that
can put them in SATA I mode.

TIP: Right now, most SATA II hard drives ship with this limiting jumper in place by
default, so if your board does support SATA II, be sure to change the jumper before you
install the drive.
#8: Monitor
With the exception of servers, a computer isn't much good without a monitor. Monitors
rarely make it all the way to the stage of completely not working, because we replace them
when they start to fade. If you replace a monitor that's more than a few years old, the new
will likely not much resemble the old.
Any reluctance you may have had to switch from the giant 50-pound cathode ray tube
(CRT) monitor to a slim and featherweight liquid crystal display (LCD) should be gone by
now. The gap in performance in terms of color rendering and refresh rates between CRTs
and LCDs is very small. Unless you're a graphics designer who needs a multi-thousand
dollar large screen CRT, the benefits of size, weight, power consumption, and less eye
fatigue that LCDs enjoy will far outweigh any small performance advantages of a CRT.
With the exception of the extremely high and extremely low end markets, it's quite hard to
find a new CRT monitor anyway.
If you were already using an LCD that's a few years old, when you replace it you'll enjoy
those leaps in performance that the LCDs have made in the last few years.
#9: Keyboard
Since so many of us spend hours every day banging away at them, it's important to have a
keyboard that's comfortable and efficient. And since we use them so much and often so
brutally, it is no wonder that they break often. Keys come off, get stuck, or just get really
dirty. When these things happen, you should usually go ahead and replace the keyboard
rather than live with the hassle.
Today's keyboards have new, handy features. Some have built in user-defined macro keys
for often-repeated commands; some can fold up for easy transportability; some have built-
in ports so they can double as USB hubs. There is a keyboard with some unique feature to
suit nearly anyone's needs.
#10: Motherboard and processor
Replacing the motherboard is always the most involved upgrade. Since it usually means
"starting over" with a clean installation of the operating system, lots of people are reluctant
to change to a newer board even when the old one gives up the ghost, preferring instead to
replace it with the exact same model, thus avoiding having to wipe the OS. However, since a
motherboard upgrade is the most involved, it also can give the widest range of benefits.
First and foremost, replacing the motherboard usually gives us the chance to upgrade to
the latest processor technology. Today, you can get the benefits of a dual or even quad CPU
setup with only one processor, thanks to multi-core technology, in which more than one
processing core is placed on a single wafer. In a multitasking or multithreaded
environment, this effectively increases your computer's performance by a factor of two or
four.
Additionally, upgrading the motherboard gives you access to new technologies for other
components. PATA and SATA I hard drives (and optical drives) can be upgraded to SATA
II. AGP video cards can be upgraded to PCI-E. USB 1.1 ports become USB 2.0. The list
goes on for virtually every component. Sometimes, even though it can be a pain, starting
over can be the best thing.

SELF-CHECK 2.1-4

Repair or Replace Faulty


A.ESSAY: Gives the repair faulty system and explain brief it.
System
B.ENUMERATION: Gives the 10 Pieces of Hardware you should replace rather than
repair and networks explain brief it.

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.
TASK SHEET 2.1-4

Repair or Replace Faulty System


Performance Objective: given necessary tools,equipment and materials, you should

be able to Repair or Replace Faulty System ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation 3.Gather the necessary materrials

and equipment 4. Follow the steps / procedures below

steps to troubleshooting (almost) any IT issue

Step 1. What exactly is the problem?

Step 2. Gather more details, eliminate variables

Step 3.Reproduce the problem, develop hypothesis of root cause

Step 4.Attempt a fix based on findings

Problem Solved? Prepare for future issues

Looking for free help desk software?


Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-4

YES NO
CRITERIA
Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

What exactly is the problem?

Gather more details, eliminate variables

Reproduce the problem, develop hypothesis of root cause

Attempt a fix based on findings

Problem Solved? Prepare for future issues

Looking for free help desk software?


> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks

LESSON CONTENT: Use and Operation of Tools,Instrument


And Testing Devices

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-5

Use and Operation of Tools,Instrument And

Testing Devices

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Use and Operation of Tools,Instrument and Testing Devices

2. Determine the Use and Operation of Tools,Instrument and Testing Devices

The following tools and equipment are classified


according to their functions and uses.
Equipment & Accessories Tools Materials
LAN Card Screwdriver (standard) Software
UPS Screwdriver (Philips) Application
Server Long Nose pliers Network
24 port-hub Mechanical pliers OS Software
Modem Allen wrench RJ 45
Fax Machine Multi tester UTP Cat 5 cable
PC Video Camera Crimping tools Motherboard’s manual
USB External CD Writer Soldering iron (30watts) Installer
USB Scanner Wire Stripper Sound
USB Printer LAN Tester Device
USB Flash Dive Anti-static wrist strap Device Driver installer
drivers/installers
Use and operation of tools instruments and testing devices
1. When referring to software, tools (also known as toolkits) are a set of basic
components and accessories that help software developers create programs in a more
efficient manner.

• See the Computer Hope tools for a list of available online tools.
2. With hardware, tools are what enable a person to install, remove, or perform
other actions on the components within their computer.

Tools to have when working on a computer

The following list of tools is in order of importance, in our


opinion. Ideally, any technician that goes onsite to repair
or troubleshoot computers should have most, if not all, of
them. However, most situations don't require all of these
tools at the same time. So, we have broken the list into
sections to help identify which tools you need for each job.
TOOLS FOR COMPUTER HARDWARE

A. ESD TOOLS:

Antistatic wrist strap: Protects computer equipment when grounded to a computer


chassis.

preventing static electricity from accumulating on the hardware or


B.HAND TOOLS :

Most tools used in the computer assembly process are small hand tools. They are
available individually or as part of a computer repair toolkit. Toolkits range widely in
size, quality, and price. Some common hand tools and their uses

Flat-head screwdriver. Used to tighten or loosen slotted screws.

Phillips-head screwdriver. Used to tighten or loosen cross-headed screws.


Torx screwdriver. Used to tighten or loosen screws that have a star-like
depression on the top, a feature that is mainly found on laptops.

Hex driver. Used to tighten or loosen nuts in the same way that a screwdriver tightens or
loosens screws (sometimes called a nut driver).
Needle-nose pliers: Used to hold small parts.

Wire cutters: Used to strip and cut wires.


Tweezers: Used to manipulate small parts.

Flashlight: Used to light up areas that you cannot see well.

Wire stripper: A wire stripper is used to remove the insulation from wire so that it can
be twisted to other wires or crimped to connectors to make a cable.
Crimper. Used to attach connectors to wires.

Punch-down tool: Used to terminate wire into termination blocks. Some cable
connectors must be connected to cables using a punch down tool.
Latex gloves are natural material, made out of rubber.

They are a popular choice of protective glove for medical or industrial use. The

primary reason people would choose an alternative to latex is because e many people

suffer from latex allergies.

C.CLEANING TOOLS

Having the appropriate cleaning tools is essential when maintaining and repairing
computers. Using the appropriate cleaning tools helps ensure that computer components
are not damaged during cleaning. Cleaning tools include the following:

Soft cloth: Used to clean different computer components without scratching or leaving
debris
from different computer parts without touching the components

Cable ties: Used to bundle cables neatly inside and outside of a computer

Parts organizer: Used to hold screws, jumpers, fasteners, and other small parts and
prevents them from getting mixed togethe
D.DIAGNOSTIC TOOLS

Digital multimeter: is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.

Loopback adapter: is also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
Toner probefThe toner part is connected to a cable at one end
using specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates a
tone that travels the length of the cable. The probe part traces the cable. When the probe
is in near proximity to the cable to which the toner is attached, the tone can be heard
through a speaker in the probe.

EQUIPMENT AND ACCESSORIES LAN CARD


It is a network interface card. This is a computer circuit
board or card that is installed in a computer so that it can
be connected to a network.
SERVER

It is a part of a network.

It is a special computer that users on the network can

access to carry out a particular job.

HUB / PORT

It is a connector on the back of a

computer or other device.

A port is either a serial port or a

parallel port.
MODEM

The modem is a device that allows a

given computer to share data or

otherwise a device which let computers

exchange information

SCANNER

It is an input device that read text or

illustration printed on paper, translates

the information into a form that a

computer can use

USB

Universal Serial Bus, a hardware

interface for low-speed peripherals such

as the keyboard, mouse, joystick, scanner,

printer and telephony devices.


PRINTER

It is a piece of hardware that produces a paper copy

(also known as ‘hardcopy’) of the information

generated by the computer

RAM

Random Access Memory, is a primary memory. This

memory is used inside the computer to hold programs

and data while it is running.

BIOS

Basic Input / Output System, chip that controls the most

basic functions of the computer and performs a self-test

every time you turn it on.

FLASH DRIVE

RAM that can retain data without electrical power.

It is widely used for BIOS chips

and for digital camera and digital music storage


USB WEB CAM device class that describes devices

capable of streaming video like


webcams, digital camcorders,
transcoders, analog video converters
and still-image cameras.

SOLDERING IRON

It is used to join two or

more metal conductors with the

support

of soldering lead melted around it.

LANTESTER
For RJ11,12,45 & BNC w/ Remote Unit This
ergonomic tester is designed to test most network cable
wiring.
You can either conduct an auto or manual test.

UTP
Unshielded Twisted Pair, is a popular
type of cable used in computer
networking that consists
of two shielded wires twisted around each.
Multitester

is an instrument use to measure


voltage,currentandresistance.

RJ45

RJ45 is a type of connector commonly used

for Ethernet networking.

It looks similar to a telephone jack, but is

slightly wider.

Since Ethernet cables have an RJ45

connector on each end, Ethernet cables are

sometimes also called RJ45 cables.

MOTHERBOARD

motherboard serves as a single platform to

connect all of the parts of a computer together.

It connects the CPU, memory, hard drives,

optical drives, video card, sound card, and other

ports and expansion cards directly or via cables.


SELF-CHECK 1.1-6

Directions.

A. Identify the following tools,and materials and give their uses.


Use a separate sheet of paper in answering.

1.

2.

3.

4.
B.Fill in the blanks with the correct answer.

_1. It’s a RAM that can retain data without electrical power.

It is widely used for BIOS chips

and for digital camera and digital music storage.

_2. This ergonomic tester is designed to

test most network cable wiring. You can either conduct an auto or manual test. _3. device

class that describes devices capable of streaming video like


webcams, digital camcorders,transcoders, analog video converters and still-image
cameras

_4. It is used to join two ormore metal conductors

with the support of soldering lead melted around it.

_5. It is a piece of hardware that produces


a paper copy (also known as ‘hardcopy’) of the

information generated by the computer.


TASK SHEET 2.1-5

Use and Operation of Tools,Instrument

_And Testing Devices_

Performance Objective: given necessary tools,equipment and materials,

you should be able to Use and Operation of Tools, Instrument and Testing
Devices ff. Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE, all


Tools,Instrument

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4. Follow the steps / procedures below PROPER TOOL

MAINTENANCE
1.Clean, Inspect and Care for Tools 2.Store Tools Properly
3.Keep Power Tools Clean 4.Store Power Tools Correctly
5.Inspect for Wear or Damage
6. Lubricate Moving Parts
7. Keep Batteries in Shape

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-5

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Clean, Inspect and Care for Tools

Store Tools Properly

Keep Power Tools Clean

Store Power Tools Correctly

Inspect for Wear or Damage

Lubricate Moving Parts

Keep Batteries in Shape


> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks

LESSON CONTENT: Occupational health and safety policies

And procedures ASSESSMENT CRITERIA:


1. Appropriate personal protective equipment is used in line with
standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-6

Occupational health and safety policies And procedures

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Occupational health and safety policies And


procedures

2. Determine the Occupational health and safety policies And


procedures

Occupational Health and Safety Policy

Occupational Health and Safety Policies


Refers to the legislation, policies, procedures, and activities that aim to protect the health,
safety, and welfare of all people at the workplace.
An OHS Policy is simply a method of stating how you, your employees, contractors and
visitors are expected to behave when they are on Company property or performing
Company related activities. As an employer or responsible contractor, you are required by
law to provide a ‘safe system of work’.

OCCUPATIONAL HEALTH AND SAFETY PROCEDURES BEFORE AND


DURING ASSEMBLING COMPUTER SYSTEM

Computer Precautions
15 OCCUPATIONAL HEALTH AND SAFETY PROCEDURE

Reminders before you start disassembling your computer tower to keep both your unit
and yourself safe. And always remember on these “doesn’t fit doesn’t belong”.
■ Read and follow instruction on the manual carefully.
■ Do not work alone so that there’s someone who can take care of you in case of accident
or emergency.
■ Always power off and unplug the computer before working on it.
■ Take off any metal objects on your arms or fingers such as bracelets, rings or watches.
Even if your unit is unplugged, there may still be some remaining electric charge.
■ Always ground or discharge yourself before touching any part of the computer (such
as the computer casing) and make sure your hands are completely dry to avoid damaging
any mechanical parts as well as to avoid electrocution.
■ Be careful with the tools that may cause short circuit (such as screw drivers)
■ Handle all parts with care. Place each piece you remove carefully down onto a
stable surface, if a component does not come out easily, do not use excessive
force if things don’t quite slip into place or when you’re removing it. Instead,
check if you are removing it correctly and no wires still connected in the
hardware.
■ Always full the cable connector on the handle and not on the cable itself
■ Be sure you’re standing in a dry place and use only rubber shoes when
standing on the ground or in a concrete floor.
■ Make sure that the pins are properly aligned when connecting a cable
connector.
■ Take away any liquid such as mineral water or soft drinks near your working
area or near computers, the three of the most damaging things to a computer
are moisture (sweat, drinking water), shock (electric or from being dropped)
and dust (any debris from household dust to bits of food).
■ Personal protective equipment is correctly used in accordance with
organization OHS procedures and practice.
■ Hazard/risks in the workplace and their corresponding indicators are
identified to minimize or eliminate risk to co-workers, workplace and
environment.
■ Take necessary precautions to protect the component of the computer from
damaged cause by Electrostatic Discharge (ESD).
■ Hold the components by edges and do not touch the IC’s.

Importance of occupational health and safety management at workplace

Multidisciplinary field of occupational health and safety with the goal of occupational
safety and health programs is concerned to foster a safe and healthy work environment.
The main focus of occupational health include promotion and maintenance of working
capacity and employee health; improvement of working environment; development of work
cultures and organizations to support health and safety; promotion of positive social
climate and smooth operation; enhanced productivity of the organization. Occupational
health and safety (OHS) standards mandate reduction, removal or replacement of job site
hazards. OHS programs also help minimize the effects of such hazards. Occupational
health and safety considerably benefits the company, as healthy employees are guaranteed
to be more productive. Company management and employers are obliged to provide a safe
working environment for all of the employees. Working conditions at employment in the
existing economy need to embrace important determinants of working hours, salary,
maternity policies, provisions for health promotion and protection.
The employer or supervisors acting as the representatives are legally responsible for the
safety and health of the workforce at workplace. The common goal remains to identify
hazardous materials, conditions and practices at workplace; assist employers and workers
in reducing or eliminating the risks. With the goal to ensure that employees work
effectively, occupational health and safety targets employers and employees. Occupational
health and safety cooperation experts promote workplace conditions. Occupational safety
professionals are concerned about all workplace hazards with emphasis on prevention of
workplace fatalities and traumatic injuries. Industrial hygienists are a source of special
expertise to identify and control hazards associated with acute or chronic exposure to
chemical, physical and biological agents. Occupational medicine physicians and
occupational health nurses are distinguished by providing clinical care programs aimed at
health protection and promotion of disease prevention. The services provided include
health screening and surveillance programs; diagnosis, prevention and treatment of work
related injury and illness; pre-placement and periodic return-to-work examinations;
independent medical examinations; impairment evaluations; disability and case
management; drug testing; behavioural and emotional counselling to avoid affect on job
performance. Such simple improvements can increase competitiveness, profitability and
motivates the workforce.
Practice Occupational Health And Safety Procedures

1. Hazard and Risk Control

A hazard is any source of potential damage, harm or adverse health effects on something or
someone.
Risk is the chance or probability that a person will be harmed or experience an adverse
health effect if exposed to a hazard. It may also apply to situations with property or
equipment loss, or harmful effects on the environment.
2. Environments for Safety Regulations

A common factor in whether regulation is used is the seriousness of the outcome being
addressed in terms of human health. For this reason regulation is more common in
transportation and the workplace, where the potential for fatal injury is perceived to be
relatively great, and less common in the home and in sports environments, where the
potential for fatal injury is perceived to be less. Regulations are often introduced in
situations where the actions of one person can injure other persons who do not have the
ability or opportunity to decide whether to accept the risks associated with those actions.
The most common examples relate to regulations protecting the safety of children and of
workers.
Using the Think Safe Steps 1 2

1. Spot the hazard

A hazard is anything that could hurt you or someone else.

Examples of workplace hazards include:


frayed electrical cords (could result in electrical shock) boxes stacked
precariously (they could fall on someone) noisy machinery (could result in
damage to your hearing)

2. Assess the risk

Assessing the risk means working out how likely it is that a hazard will harm
someone and how serious the harm could be.
For example:

ask your supervisor for instructions and training before using equipment ask for help
moving or lifting heavy objects

tell your supervisor if you think a work practice could be dangerous

3. Make the changes


It is your employer's responsibility to fix hazards. Sometimes you may be able to fix simple
hazards yourself, as long as you don't put yourself or others at risk. For example, you can
pick up things from the floor and put them away to eliminate a trip hazard.
The best way to fix a hazard is to get rid of it altogether. This is not always possible, but
your employer should try to make hazards less dangerous by looking at the following
options (in order from most effective to least effective):
Elimination - Sometimes hazards - equipment, substances or work practices -can be
avoided entirely. (e.g. Clean high windows from the ground with an extendable pole
cleaner, rather than by climbing a ladder and risking a fall.) Substitution - Sometimes a
less hazardous thing, substance or work practice can be used. (e.g. Use a non-toxic glue
instead of a toxic glue.)
Isolation - Separate the hazard from people, by marking the hazardous area, fitting screens
or putting up safety barriers. (e.g. Welding screens can be used to isolate welding
operations from other workers. Barriers and/or boundary lines can be used to separate
areas where forklifts operate near pedestrians in the workplace.)
Safeguards - Safeguards can be added by modifying tools or equipment, or fitting guards to
machinery. These must never be removed or disabled by workers using the equipment.
Instructing workers in the safest way to do something - This means developing and
enforcing safe work procedures. Students on work experience must be given information
and instruction and must follow agreed procedures to ensure their safety.
Using personal protective equipment and clothing (PPE) - If risks remain after the options
have been tried, it may be necessary to use equipment such as safety glasses, gloves, helmets
and ear muffs. PPE can protect you from hazards associated with jobs such as handling
chemicals or working in a noisy environment.
SELF-CHECK 2.1-6

A. ENUMERATION: Write the 15 occupational health and safety procedure


1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12.

13.

14.

15.

B. List down practice occupational health And safety procedures


C. ESSAY: Why is Importance of occupational health and safety management at
workplace and explain it .

1. Hazard and Risk Control

2. Environments for Safety Regulations

3. Make the changes


TASK SHEET 2.1-6

Occupational Health and Safety Policies and Procedures

Performance Objective: given necessary tools,equipment and materials, you should be

able to Occupational Health and Safety Policies and Procedures ff. Standard operating

procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE Steps /

Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

Steps to Control Workplace Hazards:

Step 1: Design or re-organise to eliminate hazards

Step 2: Substitute the hazard with something safer

Step 3: Isolate the hazard from people

Step 4: Use engineering controls

Step 5: Use administrative controls

Step 6: Use Personal Protective Equipment (PPE)

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-6

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Design or re-organise to eliminate hazards

Substitute the hazard with something safer

Isolate the hazard from people

Use engineering controls

Use administrative controls

Use Personal Protective Equipment (PPE)


> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks

LESSON CONTENT: Procedures in Maintenance Scheduling

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-7

Procedures in Maintenance Scheduling

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Procedures in Maintenance Scheduling

2. Determine the Procedures in Maintenance Scheduling

A Computer Maintenance Schedule

Computers keep your business running, but your computer is like a car- it needs regular
computer maintenance to perform at its best. From the inside and out, your computer is a
machine that is capable of amazing things, but it can’t do it alone. It needs your help, or the
help of an IT solutions provider, to stay running at full capacity.
Use this checklist to stay up-to-date with the tasks you should do daily, weekly, monthly,
quarterly, and yearly to keep your computer functioning at its best.

DAILY

❖ Virus/Adware/Spyware Scans
❖ Delete internet temp files
❖ Delete Windows temp files
WEEKLY

❖ Windows Update
❖ Check for Other Software
Updates
❖ Java
❖ Flash
❖ Antivirus/Adware Software
❖ Adobe
❖ Data backups
❖ Empty the desktop Recycle
Bin
❖ Delete cookies
MONTHLY
❖ Run Disk Cleanup
❖ Run Disk Defragmenter
❖ Uninstall unused programs
❖ QUARTERLY
❖ Clean the keyboard
❖ Clean the mouse
❖ Dust the computer monitor
YEARLY

❖ Dust inside the computer


❖ Renew antivirus subscriptions
Why Keep Up with Regular Computer Maintenance?
In the same way that your car will break down if you do not change
its oil, check its fluids, and inspect the belts, your computer will
suffer from performance issues if you don’t keep some form of
routine maintenance schedule.
❖ Reduce security risks with properly updated applications.

❖ There are always new network threats- keep your antivirus

❖ updated.

❖ Free hard disk space from unnecessarily files.

❖ Improve your computer’s speed.

❖ Resolve internet browser problems.


❖ In other words, like any machine, a computer needs a little bit of
love to work the way it needs to.
Computer Maintenance Checklist
The following is a list of basic maintenance steps you can implement if you’d like to try to
improve your computer’s performance on your own (for Windows only). Don’t worry; if
you don’t feel comfortable doing these maintenance steps yourself, CONTACT US and we
can do it for you!

Step 1: Anti-virus

Update your anti-virus software and run a scan.


How you do a scan will depend on what program
you’re using but most have very clear instructions
right from the start. Unless you know there’s a
problem I recommend doing the programs’
default scan. You only need a full scan if you
know you’ve got a virus and the default hasn’t
found it. I also recommend plugging in any
external hard drives so they get checked at the
same time.

Step 2: Anti-spyware/anti-malware

most anti-virus programs do a basic


spyware check too, but do both to make
sure. There are many options for spyware
removal software, Malware Bytes Pro,
Super Antispyware and Spybot: Search and
Destroy are recommended. Many also offer
to protect your browser(s) against future
incursions which I’d recommend as it can
save you a lot of time and trouble.
Like anti-virus programs how they work
will vary but it’s usually easy to

see what you need to do, often you just click a button and let it go.
Step 3: Empty your recycle bin (best done with CCleaner)

Just because you’ve deleted something doesn’t


mean it’s actually gone, if it’s sitting in the
recycle bin then it’s still on your hard drive and
still taking up memory. Disc Cleanup (See Step
4) will empty the recycle bin automatically, but
I like to do it manually just in case anything
important ended up in there by accident.
There should be a recycle bin icon on your
desktop, but if not it’s on the start menu. Just
open the folder, check what’s

in there and click ’empty recycle bin’.

Step 4: Disk and Application/Software


i Cleanup for
Cleanup
This is another easy step because it’s built into
Windows. You’ll find it by going to Start>All I MBcf 4sk

Hnxo deMe
Programs>Accessories>System Tools. Pick the
l^iJOowrtOdded Ptograen 0 bytesA
drive you want to scan (your main hard 471 MB
0 J Terrpwwy HemcC He*
drive(s), any that are just used for data storage CD Sytten *dwed WrxJowi Error Rtocr IOC MB

won’t have problems) and let it go. □ A Recydt Bn Csy.es


D _ TerrporsryMes 6 83 MBV

It finds files that aren’t needed any more and


odd bits of data that got left behind.
Stuff like web pages that were archived
automatically, temporary files that never got
deleted, old service pack backups and so on. It
then presents you with a list of what it’s found
and how much memory each item is taking up.
You can pick and choose which ones to delete
but I like to do the whole lot.

Also look in control panel for unwanted or unnecessary programs. Uninstall anything that
has leached on to the system over time such as Internet Browser toolbars.

Remove any unwanted or unnecessary Internet Browser extensions, plug-ins or add-ons

Expert level technicians may want to clean up the system registry (do not attempt this
unless you are absolutely sure you know what you are looking for)
Step 5: Defragment

Again this program comes with Windows, it’s


in the same place as the Disk Cleanup tool.
It’s a straightforward process; pick a drive,
ask for analysis and if it says it needs
defragmenting let it do its thing.
Step 6: Configure your startup

This is a bit more complicated, but


extremely useful. First, you need to open
the Run program. Type ‘msconfig’ and
click OK. When it opens go into the
‘Startup’ tab. This is a list of everything
that runs automatically when you switch
your computer on. If you’re not sure what
something is, it’s best left alone but there
should be some familiar names there too
like iTunes or MSN.

Ask yourself if these really need to be running in the background each and every time you
switch the computer on and uncheck any that don’t make the cut. Then click apply, then
OK. Next time you start up your computer those programs won’t start with it. You can still
open them manually and they’ll work exactly the same way, but they won’t be hogging
resources when you’re not using them.

Step 7: Check Windows Updates, Update plugins and basic applications

Check Microsoft Updates, including


weekly scheduled updates as well as the
latest Service Packs.
Some of the applications to look for to
update:
Browsers - Google Chrome, Safari, Opera and Firefox

Messaging - Skype, Windows Live Messenger, Pidgin, Digsby, Google Talk,


Thunderbird, Trillian, AIM and Yahoo IM

Media - iTunes, Songbird, Hulu, VLC, KMPlayer, AIMP, foobar2000, Winamp,


Audacity, K-Lite Codecs, GOM, Spotify, CCCP, MediaMonkey, Quicktime

Runtimes - Adobe Flash, Java, NET, Silverlight, Adobe Air, Shockwave Imaging - Paint,
NET, Picasa, GIMP, Infranview, XnView, Inkscape, FastStone

Documents - OpenOffice, Adobe Reader, SumatraPDF, Foxit Reader, CutePDF,


LibreOffice, PDF Creator

Security - Microsoft Security Essentials, Avast, AVG, Norton, McAfee, Malware Bytes,
Ad-Aware, Spybot, Super AntiSpyware etc.
Online Storage or Backup - Carbonite, Dropbox, Google Drive, Mozy, Microsoft
SkyDrive

Utilities - TeamViewer, ImgBurn, Auslogics Disk Defrag, RealVNC, TeraCopy,


CDBurnerXP, TrueCrypt, Revo, Launcy, WinDirStat, Glary, InfraRecorder

Compression - 7-Zup, PeaZIP, WinRAR

Step 8: Check file backup plan disks if and create system recovery
applicable

Make sure to have a file backup plan and


create system recovery disks if available.
System images are always a good idea as
well.
Step 9: Clean and dust internal computer parts and fan (check fans and computer temp.)

SELF-CHECK 2.1-7

A. ENUMERATION: List down the Computer


Maintenance Checklist
1.

2.

3.

4.

5.

6.

7.

8.

9.
B. ESSAY: What is the computer maintenance schedule and explain it?
TASK SHEET 2.1-7

Procedures in Maintenance Scheduling

Performance Objective: given necessary tools,equipment and materials, you should be

able to Occupational Health and Safety Policies and Procedures ff. Standard operating

procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2 computer

systems unit,table, printer scanner,PPE Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below


Computer Maintenance Checklist
Step 1: Anti-virus
Step 2: Anti-spyware/anti-malware
Step 3: Empty your recycle bin (best done with CCleaner)
Step 4: Disk and Application/Software Cleanup
Step 5: Defragment
Step 6: Configure your startup
Step 7: Check Windows Updates, Update plugins and basic applications Step 8: Check
file backup plan and create system recovery disks if applicable Step 9: Clean and dust
internal computer parts and fan (check fans and computer temp.)

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-7

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Anti-virus

Anti-spyware/anti-malware

Empty your recycle bin (best done with CCleaner)

Disk and Application/Software Cleanup

Defragment

Configure your startup

Check Windows Updates, Update plugins and basic applications

Check file backup plan and create system recovery disks if applicable

Clean and dust internal computer parts and fan (check fans and computer temp.)
> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks

LESSON CONTENT: Preventive Maintenance of Computer

System and Network

• Operating Systems Update


• Backup Scheduling
• Creating Restore Point
• Guarding Againts VIrus
ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities


METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 2.1-8

Preventive Maintenance of Computer System and

Network LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Preventive Maintenance of Computer System and Network

2. Determine the Preventive Maintenance of Computer System and Network

PREVENTIVE MAINTENANCE
The primary goals of preventive maintenance include the following:

■ reducing the likelihood of hardware failures


■ extending the useful life of the system
■ minimizing system crashes caused by outdated hardware and other software
problems,
■ securing the system against viruses and other malware, and
■ preventing data loss.
There are some general prevention tasks
that non-techmcal personnel can run on your system’s hardware. Refer to this link:
http://mvitgenius.com/PDF/PMCheck-1.pdf.

TyMatt can provide you with preventive maintenance assistance either on-site or via
remote diagnostic support. Please contact us for a monthly maintenance price quotation.

Data Backup

Data backup is the most critical aspect of preventive maintenance. Surprisingly it is often
overlooked, resulting in devastating losses for businesses of all types and networks of all
sizes. Data backup should be performed daily to ensure that vital documents are protected.
Whether it’s on-site or off-site (or a combination of both), TyMatt will help you find a
solution that meets your needs for data protection and backup and ensures the fastest
recovery of your data in the event of a system crash.
Benefits of Off-Site Backup

Off-site backup protects against hardware failures and localized damage such as fire,
flooding, vandalism, and theft. Since data is stored off-site on redundant and secure servers.
In the event of a failure, data can be restored quickly to get your business back up and
running.
Benefits of On-site

The benefit of having your data backed up on-site is allows you to restore lost data very
quickly. The on-site backup is a local, physical device directly connected to your network.
With off-site backup, data is restored over the internet from the off-site servers; a reliable,
but slower process.
Understanding The Importance Of Preventive Maintenance In Computer Systems

Preventive maintenance is something that’s often overlooked in computers.


But, just like changing the oil and rotating the tires of your car, caring for your computer
properly will ensure a long lifespan - and top-notch performance. Here are just a few of the
reasons that preventive maintenance is so important for computer systems.
Prevent Data Loss

If you don’t maintain your computer by checking the health of your hard disk or making
backups, you could risk sudden data loss of absolutely critical data. Whether it’s a business
document or a precious family photo album, regular backups of data are critical for
protecting your data.
Remember, as the old IT adage says. “There are only two types of hard drives. Hard drives
that already have failed, and hard are going to fail.” Back up your data regularly, or you
risk losing it forever!
Ensure Better Overall Performance

Doing basic things like checking what programs run on start-up, looking for malware, and
removing unused programs will help your computer function more effectively, and keep it
from slowing down. Think of this like a “tune-up” on a car, that helps your computer
perform more reliably.
Fix Security Vulnerabilities

One of the most important parts of computer maintenance is updating your operating
system, and the programs you use, like your web browser. This helps fix security
vulnerabilities, which could be exploited by hackers to place malware or viruses on your
computer. Malware and viruses can slow down your system, and even steal your personal
data, like banking information.
Get A Longer Lifespan From Your Computer

Keeping your system updated and backed up, protected from malware, and free of
unnecessary files, folders and programs helps you get better performance, and a longer
overall lifespan.
In addition, doing things like cleaning the keyboard and screen and spraying dust out of the
fan can help keep the physical components of the computer in better shape, and prolong its
lifespan - saving you money.
Free Up More Data Storage

Running out of storage is always a problem on computers, so consider doing periodic


backups, and removing unnecessary files from your computer. This will free up more data
storage, and give you more storage for your important files and documents.

Need Help Maintaining Your Computer? Contact Us Now!

From backups to security patching, antivirus installation, cleaning and more, we can do it
all - and make your computer feel brand-new again. Need a computer “tune-up?” Call us
for an appointment, bring in your computer, and let us take care of the rest.

What are Operating System Updates?

Operating System Updates contain new software that helps keep your computer current.
Examples of updates include service packs, version upgrades, security updates, drivers, or
other types of updates.
Important and high-priority updates are critical to the security and reliability of your
computer. They offer the latest protection against malicious online activities.
You need to update all of your programs, including Windows, Internet Explorer, Microsoft
Office, and others. Visit Microsoft Update to scan your computer and see a list of updates,
which you can then decide whether to download and install.
NOTE: Microsoft offers security updates on the second Tuesday of the month.

It's important to install new security updates as soon as they become available.

The easiest way to do this is to turn on automatic updating and use the recommended
setting, which downloads recommended updates and installs them on a schedule you set.
In Windows Vista, you control the automatic updating settings through the Windows
Update Control Panel. For more information, see Turn automatic updating on or off.

Three Reasons Why Upgrading Your Test Operating System is a Priority


Is your test system still running on an old operating system? In order to take full advantage
of the gamut of improvements in audio and visual technology, it is necessary to modernize
your equipment beyond the stock capabilities of the standard VHS player. Similarly, your
test system - and any hardware or software system - also needs upgrades to continue to
function reliably and avoid ever more costly downtime.
Three Reasons Why Upgrading Your Test Operating System is a Priority
Whether designed using off-the-shelf or proprietary technology, your test and
measurement system will be more secure and easier to maintain with an updated operating
system (OS). Three reasons upgrading is important: cyber security, product obsolescence,
and enhanced capability.

1. Cyber and System Security


Microsoft no longer supports security updates for Windows XP; this can make your test
system more vulnerable to attacks.

Also according to Microsoft:


• Over 300K new malware samples are being created and spread every day
• 87% of senior managers have leaked data accidentally
• 63% of breaches involve weak or stolen passwords
• $3.5 Mil is the average cost of data breach per incident

In order to comply with the latest Department of Defense (DoD) regulations all government
contractors must update their security guidelines; in turn, this means many contractors
upgraded or need to upgrade their operating systems. If you are a government contractor,
the DoD policy requires protection of controlled unclassified information as required
under the National Institute of Science and Data security requirements known as
NIST SP 800-171. NIST Special Publication 800-171 breaks down the minimum cyber
security standards into 14 areas, listed here.

Upgrading your system’s OS may also help your business avoid becoming a victim to
increasingly common security threats. As you have seen - but hopefully not
experienced within your business - the hacking industry and malware continue to
evolve and pose greater and greater threats.

2. Product Obsolescence

The longer a test system is allowed to languish on old platforms, the more
obsolescence threatens the test system’s ability to remain online and well-
supported.

Aged systems are subject to support difficulties in many areas and may cause the
following:
• Increasing likelihood of failures
• Higher frequency downtimes
• Longer duration downtimes
• Difficulty finding replacement parts
• Difficulty finding supported drivers
• Elongated time on support calls (as staff are trained in latest technology)

Some common signs that your software is incompatible with a new operating system
include:
• Software fails to launch
• Software used to generate reports and no longer does
• Software displays permission errors
• Software can no longer save configuration data
• Software can no longer print
• Software no longer collects data or data is wrong

If your software exhibits any of these traits it is likely not compatible with modern OS rules
and requirements.
3. Preserving Capability
Migrating test software to a newer operating system extends the overall lifespan of the test
system. Migration also allows the test system to take advantage of faster, more reliable
modern hardware and drivers and increases the overall supportability of the system.
An experienced integrator can migrate your test system to a modern, reliable platform
Migrating to a new OS is not as simple as installing the new OS. New OS versions come
with new rules and requirements, often rendering old software unable to properly run. G
Systems can update your test software to make it compatible with the new environment.

For more than 25 years, G Systems has performed OS upgrades to maintain test system
functionality. Our experience includes working with prime aerospace and defense
contractors and many other markets. As part of an OS upgrade, we will guide you through
these topics and help ensure your system continues to run reliably.

Download our Complete Guide to Managing Obsolescence to learn more about how to
identify obsolescence issues early and manage them once they are identified.
With all the backup-focused products available on the market today, there is no excuse not
to back up systems and data. The key to making all of this work is having a backup
schedule.

It's important to know how to create a backup schedule and develop a thorough
scheduling strategy.

The principal goal of backup scheduling is to establish time frames to back up


an entire system, multiple systems, data and databases, network files, and other critical
systems and data.

Why is a backup schedule needed?


Backup schedules are essential IT activities, as they ensure several important activities are
performed and issues are addressed, such as:

Create your data backup strategy: A comprehensive guide

• Disaster recovery. Recovering and restarting critical systems, VMs, data files and
databases.

• Start times and completion times for all regular backups defined. The
schedule must include all data backup activities and include testing activities as needed; in
addition, the backup tool and network resources being used can be specified.
• Restore files that are accidentally deleted. It's happened to all of us at

some time and it helps to have a safety net in case work files or other critical data are
erased.

• Effect of backup activities on production activities. A backup schedule can help keep
production systems operating at peak performance, with backups occurring outside of
production schedules.
• Satisfaction of compliance and audit requirements. If the organization is required to
comply with certain regulations and standards regarding data protection, and is
periodically audited for general IT controls, schedules are important sources of
evidence in these areas.
• Compliance with recovery time and recovery point objectives (RTOs/RPOs). These
important metrics are essential for managing data backup and recovery; schedules can
demonstrate that they are being addressed.
Key issues in backup scheduling

Although scheduling backups might seem like a no-brainer, several components of the
process must be addressed within IT departments and reviewed with business unit
leaders and senior management.

Addressing these items will ensure a comprehensive, auditable schedule that is easily
understood and can be implemented by designated data backup team members and
others, if needed, in an emergency. Following is a list of key concerns for planning and
executing data backups.
1. What needs to be backed up?

Data and system owners should specify the frequency of their backups and what should be
backed up. Normally, data administrators should back up everything -- or specific
parts -- in the IT environment with a frequency acceptable to business unit leaders and
cost-effective operations.

Organizations should also consider the cost of backups and the effect of backups on system
-- and company -- performance. For example, it might make sense to replicate the
entire system or critical portions of the system and specific individual files and
databases to an alternate storage medium and perform incremental backups to that
environment.
2. Location of systems and files to be backed up

Identify if the working location will be an on-site server, storage device or perhaps a cloud-
based backup arrangement. This can be included in the backup schedule and should also be
specified in data backup policies and procedures, especially from compliance and audit
perspectives.
3. Who performs backups?

The data backup administrator's activities should be governed based on discussions with
system owners and data owners. Individual users might also back up their own data files;
this should be addressed by an IT policy for data management. Other IT employees should
be identified as potential backup staff to the primary backup administrator(s). This might
involve some internal training from the data admins as well as vendors whose technology
resources are used for backups.
4. Time frames for backups

Points in time when data and system backups can occur should be defined based on
business requirements. For example, some systems and data files might need to be backed
immediately when they have been modified. This reflects their criticality to the business.
Full backups are often performed after business hours weekdays and over weekends. More
frequent backups are governed by the business and their execution might depend on
specific systems and network resources.

Backup time frames are influenced by several variables:

• system or service that performs the backups;

• location of the backups -- for example, on site or remote;

• time of day for performing backups;

• use of mounted or unmounted file systems;


• RPO/RTO metrics to be satisfied; and

• requirements as specified by system/data owners and senior management.

Backup administrators should periodically consult with system owners on these criteria to
ensure backup policies, procedures and schedules are appropriate.

5. How frequently do systems and data files need to be backed up?

Some files are updated often during a typical day, such as customer data files, requiring
admins to back up these files more frequently. They might consider backing them up at the
end of each day -- factoring in all incremental revisions -- so that an up-to-date backup is
saved.

Other situations might require the immediate backup of changes so files are always
current. Other files might not need to be backed up regularly and, as such, could be
candidates for alternative storage, such as tape.

RPO requirements might also influence the frequency of backups. For example, if the RPO
for certain critical files is 10 seconds or less, the backups will likely be more frequent, and
the technology used for those backups -- e.g., data mirroring, data replication, high-speed
low-latency networks -- will also need to be considered.

System backups might need a different schedule than data files and databases. Backups
should occur any time one or more parameters in a system change in the course of daily
operations. This suggests a more ad hoc approach to system backups; each organization
will need to establish those requirements.
6. Restoration of data from backups

Backups are created to ensure that if the recovery or restoration of a system and/or data is
needed, those resources will be as current as possible. An organization should consider
the criticality of systems and files at this point so it can establish the priority of backing
up and the priority of restoration. These items should be factored into backup
scheduling.
7. Location of restored systems and data

In an emergency, it might be necessary to restore systems or data to an alternate platform,


as opposed to the original system. This is a key consideration for disaster recovery.
Cloud-based platforms are increasingly popular approaches to this requirement.
Managed service providers (MSPs) that specialize in data backup and storage are also
viable alternatives. The key is to locate backed-up resources at a sufficient distance
from the firm's primary location so that the risk of loss at alternate storage locations is
greatly reduced.
Types of backups and examples

The following are the typical types of backups:

• Day zero backups are performed when a new system is fully installed and accepted by
the system owner. It establishes the initial baseline for future updates.

• Full backups store all the systems and files within the system, or they store selected
systems and files as defined by the system/data owner. Companies should perform these
on a regular basis, such as once a week, and they should also consider backups when a
major change to the IT infrastructure occurs.

• Incremental backups create a copy of all the files that have changed since a previous
backup.
• Differential backups create a copy of all the files that have changed since the last full
backup.

Examples of frequently used systems and files for backup scheduling include:

• Individual user files

• Databases

• VMs

• Password and group files

• Accounting files

• Configuration files

• Terminal and port files

• Network files
Developing and implementing a backup schedule

Organizations might need to perform some incremental backups several times each day,
whereas others might need more infrequent updates. The increased use of VMs makes
efficient and timely backups even more important. In a disaster, enterprises will need
to recover and restore quickly to resume operations with minimal downtime.

Setting up a schedule requires a detailed and accurate list of all systems to be backed up,
as well as all data files and databases to be backed up. The schedule should be
prepared on a platform that facilitates timely changes, as data and system backup
schedules can be very dynamic. Use RPO values to assist with the creation of schedules,
as satisfaction of the RPO values will be affected by how frequently their backups are
scheduled. Work with the organization's backup software vendor to assist with
schedule preparation. The same is true of external resources, such as MSPs and cloud-
based backup and storage firms. Figure 1 is an example of a backup schedule.
How to Create a System Image Backup in Windows 7, 8, or 10

The built-in backup utilities in Windows are pretty solid. Let’s take a look at how

Normal backup programs, like CrashPlan or Windows’ built-in File History feature,
essentially copy your files to another location. A system image backup, on the other hand, is
like a full snapshot of an entire hard drive. The advantage of a system image is that if a
hard drive crashes, you can replace it, restore the image, and have your system right back
to where it was when the image was captured. No need to reinstall Windows or your apps.

The biggest disadvantage with system image backups—other than taking a bit longer—is
that you can’t restore the backup to a different PC. You’re creating an image of your full
Windows installation and, since Windows is set up specifically for your hardware, it just
won’t work as-is in another PC. It would be like trying to plug your hard drive into another
PC and expecting everything to load well. With that in mind, though, image backups can
still be really handy.
Step One: Open System Image Backup

The process of finding the System Image Backup tool is different in Windows 7 than in
Windows 8 and 10, so we’ll show you to find the tool in all versions, and then explain how
to create and use the system image.

Open System Image Backup in Windows 10

In Windows 10, hit Start, type “backup,” and then select the entry.

In the “Backup and Restore (Windows 7)” window, click the “Create a system
image” link.
Open System Image Backup in Windows 8
In Windows 8, hit Start, type “file history,” and then select the “File History” entry.

Search
Everywhere v

In the “File History” window, click the “System Image Backup” link
Open System Image Backup in Windows 7
Hit Start, click the arrow to the right of the “Getting Started” item, and then click
“Back up your files.”

In the “Backup and Restore” window, click the “Create a system image” link.
Creating A Windows System Image
Here we’ll show you how to create Windows 7 backup system image, the steps for Vista
and Win 8 compatible versions are broadly the same. You can only do this from within
Windows itself. There are a few ways of running the Windows Backup and Restore Tool
which will also allow you to create a repair disc or backup files and folders, choose 1 from
any of the following:
■ Click the Start orb and type backup into Search. You should see Backup and Restore
appear in Programs, press Enter.
■ Click the Start orb -> All Programs -> Maintenance -> Backup and Restore.
■ Go to Control Panel and select Backup and Restore from an icon view, or System and
Security -> Back up your computer in Category view.
Now in the Backup and Restore tool, click Create a system image in the left pane.

-
CZI 0

, y « All C... ► Backup an... T 5sarch Control Pans! P|

OG v
Control Panel Home

Back up or restore your files Backup

Create a system image 1? Create a


Windows Backup has not been set 'fijf'Set up backup up,
system repair disc

Resto re

Windows could not find a backup for this computer. '^'Select

another backup to restore files from


See also Action Center
Recover system settings or your computer
Windows Easy Transfer

This will open up the Create a system image window. Alternatively, you can get directly to
this window from the desktop by using Win Key+R and typing the following into the Run
dialog box:

sdclt.exe /BLBBACKUPWIZARD
Now select where you’re going to backup the system image to, which can either be to hard
drive, multiple DVD discs or a network location if your Windows version supports it.
Removable USB devices such as flash drives will show under hard disks. If you try to select
another partition on the same physical hard disk you’re backing up from, there will be a
warning about it because that hard drive failing will result in both operating system and
the backup being lost. If you place ANY value in your backups at all, it’s strongly
recommended to use a different physical device to save them to.

The volume selected is on the same physical disk that is being backed up, If this disk fails, you will lose your
backups,
The next screen will offer to backup any other volumes you might want to include in
the process, the main system partition and the small 100MB boot partition if present
will be automatically selected and cannot be touched.

Which drives do you want to include in the backup?

The drives that are required forWindowsto run will be included by default. You cannot includethe drive that you are saving the backup
to.

Your backups are being saved on Data [□:).

Drive Total size Used space

,, System Reserved [System) 100.00 MB 23.14 MB

Win7 [Cl) [System) 60.09 GB 30.65 GB

□ .. .^JXP (E:) 35,00 GB 6,69 GB j

□ -^tFH) 44.64 GB 21.51 GB

Space required to save a backup of the selected drives: 30.65 GB

Space available on Data [D:): 219,05 GB

Note: Sometimes in a multiboot system, one of your other operating system partitions
will be auto selected and grayed out so you can’t turn it off. This is usually the case
when you install Windows 7 after another operating system and the bootloader system
files are located on that partition and not Windows 7’s. Apart from some tricky methods
of manually moving all the boot files onto the windows 7 partition and making it an
Active / System volume, it is recommended to either accept the included volume or use
another backup software.
At the final confirmation window, the Backup and Restore tool will tell you how much
space it could take to create the backup and clicking the Start backup button will start the
process. Depending on the amount of data to backup and the speed of the hardware, this
could obviously take from a few minutes to an hour or more. If you receive an error at this
point, you might like to read our article on a possible cause for a
system image backup failure.
After the backup process completes, you will be asked if you want to create a system repair
disc. This is highly recommended if you don’t have a full Windows install DVD to hand
and can also be created later on from the Backup and Restore tool main window. If you
would like to create a repair CD on a USB stick, please follow the
repair disc to USB instructions in our post detailing how to do it.
On page 2 we’ll show you the various ways you can restore your system image. Read
More:
https://www.raymond.cc/blog/create-windows-7-system-image-for-full-backup-and-restora
tion/

Create system image in Windows Server 2008 with Windows Server Backup

Windows Server Backup is a free tool in Server 2008, 2008 R2, 2012, 2016 etc, which allows
you to create a full server backup, system state backup, bare metal backup, or backup
selected volumes, specific files and folders.
However, this tool is not installed by default and you need to manually install it using
Server Manager. Just Open Server Manager, then go to Features > Add
Features > Windows Server Backup Features and click Install to start the installation
process.
Then, to create a system image backup in server 2008 with Windows Server Backup, use
the following steps. Please note that you must be a member of the Backup Operators or
Administrators group, or you must have been delegated the appropriate authority. And
this software only backs up volume formatted with NTFS file system.

1. Open Windows Server Backup. Just click Start and type Window Server Backup in
the search box, then select it from the list result.
2. Click “Backup Once” at the right panel. If you want to create a schedule backup, you
can click “Backup Schedule”.
3. Tick “Different options” and click Next.

4. Check “Full Server” in the “Select backup configuration” page.


5. Click "Local drives" and Next. Then, in the new window, click the inverted triangle and
select a drive from drop-down menu as backup destination. You can choose local disk or
external drive as destination as long as it can be recognized.
6. Select “VSS copy backup(recommended)” and click Next.
7. Confirm the backup items and click “Backup” to start this operation.
Now, you may successfully create a system image. It’s very luck. Also, you can use
Windows Server Backup command line to create a backup for your computer.
But there are still some users who may not create a backup and run into issues with error
message like incorrect function, greater than 2TB, reading data please wait, system writer
is not found in the backup etc. To avoid these
issues, you could consider using a professional backup software as
replacement.

Create system image backup for Windows Server 2008 with AOMEI Backupper
Server

AOMEI Backupper Server is a trust and reliable backup software that is widely used to
create system image in Windows server 2008, 2012, 2016, 2019 etc. This operation is very
easy, just a few clicks. It supports full backup, incremental backup and differential
backup. It backs up system partition with NTFS, FAT32, FAT, EXT2, EXT3 file system.
In addition, there are some useful feature you may use during the backup process. They
makes the task simple and efficient.
• Get backup result more easily. With “Email Notification”, you no longer need to wait
unless the backup task is 100% completed. Because it will inform you the final result and
any error message during the backup process.
• Save disk space. Don't want waste a lot of time and disk space when create a server 2008
image backup? You could backup system with incremental backup or differential backup
feature.
• Support automatic backup. To keep the newly installed apps, added or modified files,
you can schedule backup at a regular basis, such as, daily, weekly, monthly.
• Support off-peak hours backup. Its feature "Wake the computer to run scheduled tasks
” allows you to backup system at midnight or any other time without human intervention.
• Manage backup disk space. Backup space not enough is a big headahe for users who
create schedule backup regularly. So, it’s recommended to enable backup scheme to
delete old backup.
Then, follow steps below to create Windows Server 2008 image backup with AOMEI
Backupper Server. If you want to backup Windows Server 2008 to external hard drive, you
need connect the device in advance.
Creating Restore Point

| What is system restore point?

System Restore is a built-in feature in Windows that backs up computer state (including system
files, Windows Registry, local user profiles, and system settings). When your system is running
into issues, you can use System Restore to recover system to earlier state.
There are many unexpected things that may lead to system crash like Virus attacks,
Ransomware, accidental deletion of system files, etc. Therefore, it is essential to create system
restore point in Windows 7.

System Restore was first introduced in Windows ME and it has been included in all the
following Windows operating systems.
| How to create system restore point in Windows 7 with built-in tool?

By default, Windows will automatically create system restore point when new software is
installed, when new Windows updates installed, and when a driver is installed. Besides,
Windows 7 will create a system restore point automatically if no other restore points exist in 7
days.
Of course, you can also manually create system restore point in Windows 7.

You can follow the steps below to ensure System Restore is enabled and custom the settings. 12

1. Click Start > type “create a restore point” in the search box > click Create a restore
point to open the System Properties window.
2. Enable system restore: In Windows 7, C: drive protection is on by default. If you also
want to create restore point on other drives, you can turn the protection on for the specific
disk by clicking Configure.
You can specify what you like to protect and disk space used for system restore points. 3

3. Create restore point: click the Create option.


4. A pop window will appear and you can type a description to help you identify
the restore point. Finally, click Create to confirm.

5. Once the process is completed, you will see the restore point was created
successfully message.

The restore points will be saved on the volume that you are protecting, so if the volume is
corrupted, the restore points will not work. If the disk free space on the volume is too low
for System Restore to operate, it will automatically disable itself.

You can use Disk Cleanup to delete the previous restore points but the latest one to free
up some disk space.
| How to create restore point in Windows 7 automatically?

If you are not content with the gap between restore points creation interval, you can use
Windows Task Scheduler to automatically create system restore point on a scheduled time
or event. For example, to create system restore point in Windows 7 at startup:

1. Click Start > type Task Scheduler in the search box and hit Enter.
2. On the left panel, navigate to Task Scheduler Library > Microsoft > Windows >
SystemRestore.
3. Double click on the task named SR to edit it. 4

4. Under Triggers tab, you can click New to add a new trigger at Startup. Or you
can just click Edit to change the trigger.
5. Set the scheduled time to perform the task and click OK to confirm.
Now, a new system restore point will be created automatically at your preferred schedule
and intervals. If you ever need to change the frequency, you can just modify this task in
Task Scheduler.
| How to restore Windows 7 to previous status with the restore point?

When your system gets corrupted or something else goes wrong, you can use system
restore point to restore the system to the previous good state. Two ways are available. You
can simply go to System Restore utility to make it. Or when you cannot boot into Windows
7, you can go to Safe Mode to use restore system.
Restore Windows 7 to previous status with System Restore utility:

1. Click Start > type “create a restore point” in the search box > click Create a restore
point to open the System Properties window. Click System Restore option.
2. A window will appear and click Next to go to the next step.
3. It will list the recent restore points and the most recent restore point is selected. You
can click Show more restore points to see more. Choose the
Note: If you are not sure whether the restore will cause some of your programs to loss data,
you can click Scan for affected programs to have a check.
4. Click Finish to start the restore.
Systerm restore in Safe mode:
1. At your computer startup (before showing the Windows logo), Press the F8 key
repeatedly.
2. At Advanced Boot Options, select Safe Mode with Command Prompt.

3. Type:”rstrui.exe” without quotes and press Enter.

4. Then you can choose one of the available restore points to system restore Windows
7 in Safe Mode.
If you cannot boot into Safe Mode, you can also use a system repair disc to access
System Restore to restore your computer.
Guarding Againts Virus

What is a computer virus?

As defined by Malwarebytes Labs, a computer virus is “malware attached to another


program (such as a document), which can replicate and spread after an initial execution on
a target system where human interaction is required. Many viruses are harmful and can
destroy data, slow down system resources, and log keystrokes.”
Most computer viruses target systems running Microsoft Windows. Macs, on the other
hand, enjoy a reputation as virus-proof super machines. In reality, Macs are not inherently
safer. There are more Windows users in the world than Mac users and cybercriminals
simply choose to write viruses for the operating system (OS) with the largest amount of
potential victims.
Whatever OS you choose, Windows or Mac, don’t worry too much, because viruses just
aren’t a thing anymore. That may sound odd coming from a cybersecurity company but
hear us out.
Cybercriminals aren’t creating new viruses, instead they are focusing their efforts on more
sophisticated and lucrative threats. When people talk about “getting a virus” on their
computer, they usually mean some form of malware— often a computer worm.
The terms “virus” and “malware” are often used interchangeably, but they’re not the same
thing. While a computer virus is a type of malware, not all malware are computer viruses.
“Cybercriminals aren’t creating new viruses, instead they are focusing their efforts on
more sophisticated and lucrative threats. When people talk about “getting a virus” on their
computer, they usually mean some form of malware—
often a computer worm.”

The easiest way to differentiate computer viruses from other forms of malware is to think
about viruses in biological terms. Take the flu virus, for example. The flu requires some
kind of interaction between two people—like a hand shake, a kiss, or touching something
an infected person touched. Once the flu virus gets inside a person’s system it attaches to
healthy human cells, using those cells to create more viral cells.
A computer virus works in much the same way:
1. A computer virus requires a host program.
2. A computer virus requires user action to transmit from one system to another.
3. A computer virus attaches bits of its own malicious code to other files or replaces
files outright with copies of itself.
It’s that second virus trait that tends to confuse people. Viruses can’t spread without
some sort of action from a user, like opening up an infected Word document. Worms,
on the other hand, are able to spread across systems and networks on their own,
making them much more prevalent and dangerous.
Famously, the 2017 WannaCry ransomware worm spread around the world, took
down thousands of Windows systems, and raked in an appreciable amount of
untraceable Bitcoin ransom payments for the alleged North Korean attackers.
Computer viruses don’t capture headlines like that—at least not anymore.
To recap, the bad guys aren’t focused on creating new viruses and most of the really
bad stuff is actually malware. Should we still take computer viruses seriously?
Definitely, yes.
Continuing the virus analogy, if a given population stops receiving vaccinations for
diseases thought to be eradicated, like the measles and polio, those diseases can and
do come back. Likewise, it’s important to be proactive about cybersecurity and take
some basic protective measures against computer viruses. Otherwise, computer viruses
could make a comeback.
With that said, let’s take a look at computer viruses under the microscope.
Computer virus examples

Sometimes to understand what something is, we have to examine what it isn’t. Keeping
that in mind, let’s play: Is It a Virus?
In the Is It a Virus game we’re going to take a look at examples of things people on the
Internet commonly believe to be a virus and explain why it is or isn’t. What fun!
Is a Trojan a virus? Trojans can be viruses. A Trojan is a computer program
pretending to be something it’s not for the purposes of sneaking onto your computer
and delivering some sort of malware. To put it another way, if a virus disguises itself
then it’s a Trojan. A Trojan could be a seemingly benign file downloaded off the web
or a Word doc attached to an email. Think that movie
you downloaded from your favorite P2P sharing site is safe? What about that “important”
tax document from your accountant? Think twice, because they could contain a virus.
Is a worm a virus? Worms are not viruses, though the terms are sometimes used
interchangeably. Even worse, the terms are sometimes used together in a strange and
contradictory word salad; i.e. a “worm virus malware.” It’s either a worm or a virus, but it
can’t be both, because worms and viruses refer to two similar but different threats. As
mentioned earlier, a virus needs a host system to replicate and some sort of action from a
user to spread from one system to the next. A worm, conversely, doesn’t need a host system
and is capable of spreading across a network and any systems connected to the network
without user action. Once on a system, worms are known to drop malware (often
ransomware) or open a backdoor.
Is ransomware a virus? Ransomware can be a virus. Does the virus prevent victims from
accessing their system or personal files and demands ransom payment in order to regain
access a la ransomware? If so, then it’s a ransomware virus. In fact, the very first
ransomware was a virus (more on that later). Nowadays, most ransomware comes as a
result of computer worm, capable of spreading from one system to the next and across
networks without user action (e.g. WannaCry).
Is a rootkit a virus? Rootkits are not viruses. A rootkit is a software package designed to
give attackers “root” access or admin access to a given system. Crucially, rootkits cannot
self-replicate and don’t spread across systems.
Is a software bug a virus? Software bugs are not viruses. Even though we sometimes refer
to a biological virus as a “bug” (e.g. “I caught a stomach bug”), software bugs and viruses
are not the same thing. A software bug refers to a flaw or mistake in the computer code
that a given software program is made up of. Software bugs can cause programs to behave
in ways the software manufacturer never intended. The Y2K bug famously caused
programs to display the wrong date, because the programs could only manage dates
through the year 1999. After 1999 the year rolled over like the odometer on an old car to
1900. While the Y2K bug was relatively harmless, some software bugs can pose a serious
threat to consumers. Cybercriminals can take advantage of bugs in order to gain
unauthorized access to a system for the purposes of dropping malware, stealing private
information, or opening up a backdoor. This is known as an exploit.
Latest news on computer viruses

Scammers use old browser trick to create fake virus download


Our computers, ourselves: digital vs. biological security
What is the history of computer viruses?

Today’s malware authors owe a lot to the cybercriminals of yesteryear. All the tactics and
techniques employed by cybercriminals creating modern malware were first seen in early
viruses. Things like Trojans, ransomware, and polymorphic code. These all came from
early computer viruses. To understand the threat landscape of today, we need to peer back
through time and look at the viruses of yesteryear.
1949, John von Neumann and “self-reproducing machines”
It was in those salad days of computing that mathematician, engineer, and polymath John
von Neumann delivered a lecture on the Theory and Organization of Complicated Automata in
which he first argued that computer programs could “self-reproduce.” In an era where
computers were the size of houses, and programs were stored on mile-long punch tapes,
Neumann’s ideas must’ve sounded like something from a sci-fi pulp novel.
1982, The proto computer-virus
In 1982 a fifteen-year-old boy pranking his friends proved Neumann’s theory a reality.
Rich Skrenta’s Elk Cloner is widely regarded as the first proto-computer virus (the term
“computer virus” didn’t exist just yet). Elk Cloner targeted Apple II computers, causing
infected machines to display a poem from Skrenta:
Elk Cloner: The program with a personality It will get on all your disks It will infiltrate
your chips Yes, it’s Cloner!
It will stick to you like glue It will modify RAM too Send in the Cloner!
Other notable firsts—Elk Cloner was the first virus to spread via detachable storage media
(it wrote itself to any floppy disk inserted into the computer). For many years to come,
that’s how viruses travelled across systems—via infected floppy disk passed from user to
user.
1984, Computer virus, defined
In 1984 computer scientist Fred Cohen handed in his graduate thesis paper,
Computer Viruses - Theory and Experiments in which he coined the term “computer virus,”
which is great because “complicated self-reproducing automata” is a real mouthful. In the
same paper, Cohen also gave us our first definition of “computer virus” as “a program that
can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.”
1984, Core War
Up to this point, most talk about computer viruses happened only in the
rarified air of college campuses and research labs. But a 1984 Scientific American article let
the virus out of the lab. In the piece, author and computer scientist A.K. Dewdney shared
the details of an exciting new computer game of his creation called Core War. In the game,
computer programs vie for control of a virtual computer. The game was essentially a battle
arena where computer programmers could pit their viral creations against each other. For
two dollars Dewdney would send detailed instructions for setting up your own Core War
battles within the confines of a virtual computer. What would happen if a battle program
was taken out of the virtual computer and placed on a real computer system? In a
follow-up article for Scientific American, Dewdney shared a letter from two Italian readers
who were inspired by their experience with Core War to create a real virus on the Apple II.
It’s not a stretch to think other readers were similarly inspired.
1986, the first PC virus
The Brain virus was the first to target Microsoft’s text-based Windows precursor, MS-
DOS. The brainchild of Pakistani brothers and software engineers, Basit and Amjad
Farooq, Brain acted like an early form of copyright protection, stopping people from
pirating their heart monitoring software. If the target system contained a pirated version of
the brother’s software, the “victim” would receive the on-screen message, “WELCOME TO
THE DUNGEON . . . CONTACT US FOR VACCINATION” along with the brothers’
names, phone number, and business address in Pakistan. Other than guilt tripping victims
in to paying for their pirated software, Brain had no harmful effects.
Speaking with F-Secure, Basit called Brain a “very friendly virus.” Amjad added that
today’s viruses, the descendants of Brain, are “a purely criminal act.”
1986, Viruses go into stealth mode
Also in 1986, the BHP virus was the first to target the Commodore 64 computer. Infected
computers displayed a text message with the names of the multiple hackers who created the
virus—the digital equivalent of scrawling “(your name) was here” on the side of a building.
BHP also has the distinction of being the first stealth virus; that is, a virus that avoids
detection by hiding the changes it makes to a target system and its files.
1988, Computer virus of the year
1988, one could argue, was the year computer viruses went mainstream. In September of
that year, a story on computer viruses appeared on the cover of TIME magazine. The cover
image depicted viruses as cute, googly eyed cartoon insects crawling all over a desktop
computer. Up to this point, computer viruses were relatively harmless. Yes, they were
annoying, but not destructive. So how did computer viruses go from nuisance threat to
system destroying plague?
“Viruses were all about peace and love—until they started crashing people’s
computers.”
1988, A message of peace goes haywire
Viruses were all about peace and love—until they started crashing people’s computers. The
MacMag virus caused infected Macs to display an onscreen message on March 2, 1988:
How do I prevent computer viruses?

Preventing computer viruses from infecting your computer starts with situational
awareness.
“Situational awareness is something law enforcement and militaries have practiced for
decades. It refers to a police officer or a soldier’s ability to perceive threats and make the
best decision possible in a potentially stressful situation,” said Malwarebytes Head of
Security, John Donovan.
“As it applies to cybersecurity, situational awareness is your first line of defense against
cyberthreats. By staying on the lookout for phishing attacks and avoiding suspicious links
and attachments, consumers can largely avoid most malware threats.”
Regarding email attachments and embedded links, even if the sender is someone you know:
viruses have been known to hijack Outlook contact lists on infected computers and send
virus laden attachments to friends, family and coworkers, the Melissa virus being a perfect
example.
If an email reads oddly, it’s probably a phishing scam or malspam. When in doubt about
the authenticity of an email, don’t be afraid to reach out to the sender. A simple call or text
message can save you a lot of trouble.
Next, invest in good cybersecurity software. We’ve made a distinction between computer
viruses and malware, which now begs the question, “Do I need antivirus software or anti-
malware software?” We’ve covered this topic before in great detail so checkout our article
on antivirus vs. anti-malware. For now, though, here’s a quick gloss on the subject.
Antivirus (AV) refers to early forms of cybersecurity software focused on stopping
computer viruses. Just viruses. Anti-malware refers to all-encompassing threat protection
designed to stop old-fashioned viruses as well as today’s malware threats. Given a choice
between traditional AV with limited threat detection technology and modern anti-malware
with all the bells and whistles, invest in anti-malware and rest easy at night.
As mentioned previously in this piece, traditional AV solutions rely on signature-based
detection. AV scans your computer and compares each and every file against a database of
known viruses that functions a lot like a criminal database. If there’s a signature match, the
malicious file is thrown into virus jail before it can cause any damage.
The problem with signature-based detection is that it can’t stop what’s known as a zero-
day virus; that is, a virus that cybersecurity researchers have never seen before and for
which there is no criminal profile. Until the zero-day virus is added to the database,
traditional AV can’t detect it.
Malwarebytes’ Multi-Vector Protection, conversely, combines several forms of threat
detection technology into one malware crushing machine. Amongst these many layers of
protection, Malwarebytes uses what’s called heuristic analysis to look for telltale malicious
behavior from any given program. If it looks like a virus and behaves like a virus, then it’s
probably a virus.
How do I remove computer viruses?

Going back to our virus analogy one final time—removing a virus from your body requires
a healthy immune system. Same for your computer. A good antimalware program is like
having a healthy immune system. As your immune system moves through your body
looking for and killing off invading viral cells, anti-malware scans for files and malicious
code that don’t belong on your system and gets rid of them.
The free version of Malwarebytes is a good place to start if you know or suspect your
computer has a virus. Available for Windows and Mac, the free version of Malwarebytes
will scan for malware infections and clean them up after the fact. Get a free premium trial
of Malwarebytes for Windows or Malwarebytes for Mac to stop infections before they
start.
SELF-CHECK 2.1-8
A. ENUMERATION: List down the Create your data backup strategy: A
comprehensive guide

1.

2.

3.

4.

5.

6.

B. ESSAY: Write the answer brief it.

1. What are operating Upadates?

2. What needs to be backed up?

3. What is a computer virus?


_TASK SHEET 2.1-8_

Preventive Maintenance of Computer

System and Network

Performance Objective: given necessary tools,equipment and

materials,
you should be able to Preventive Maintenance of Computer System
and Network ff. Standard operating procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2 computer

systems unit,table, printer scanner,PPE Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

Steps to create a backup system image


1. Open the Control Panel (easiest way is to search for it or ask Cortana).
2. Click System and Security
3. Click Backup and Restore (Windows 7 & Window 2008 R2
4. Click Create a system image in the left panel
5. You have options for where you want to save the backup image: external hard drive or
DVDs. I suggest the former, even if your computer has a DVD-RW drive, so connect your
external drive to your PC, select On a hard disk and click Next.
6. Click the Start backup button.

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-8

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Open the Control Panel (easiest way is to search for it or ask Cortana).

Click System and Security

Click Backup and Restore (Windows 7 & Window 2008 R2)

Click Create a system image in the left panel

You have options for where you want to save the backup image: external hard drive or
DVDs. I suggest the former, even if your computer has a DVD-RW drive, so connect
your external drive to your PC, select On a hard disk and click Next.

Click the Start backup button.


> LEARNING OUTCOME NO.2

> Maintain Computer Systems and Networks

LESSON CONTENT: Cleaning Computer Systems and Networks

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with


standard procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in accordance
with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-9
Cleaning Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Cleaning Computer Systems and Networks

2. Determine the Cleaning Computer Systems and Networks

How to Clean Common Computer Parts and Devices

From dusty computer fans to fingerprints on compact discs, computer parts and devices
can get awfully dirty. Here are some tips to help keep things clean.
From dusty computer fans to fingerprints on compact discs, computer parts and devices
can get awfully dirty from normal everyday use or when left sitting unused. The best way
to have any computer component cleaned is to have it professionally serviced, but if you
no longer have a service warranty, or if you picked up a second-hand item and want to
clean it to see if it even works, here are some tips on how to clean some common items.
General Precautions
When working around electronics there are some precautions you should always take
when cleaning:
• The best way to clean any computer component or device is to follow the
manufacturer's instructions in your user manual.
• Always power off the system first
• Always use anti-static wristband or other professional grounding devices
• Never work on carpeted surfaces
• Never spray cleaning fluids directly onto computer components. Always spray the
cleaner onto a cloth then wipe
• Do not allow any cleaner to run or drip near circuit boards, or near seams on device
casings.
• Never allow circuits or electronics to become damp or wet.
• Some cleaning solvents can damage components. In most cases, water will work just as well.
• Cleaning electronics and circuit boards requires experience, knowledge and special
electronics cleaners. This type of cleaning is best left to professionals.
General Cleaning Tricks & Tips
• If compressed air is too strong for little dust jobs, try using a plastic liquid medicine
plunger style dispenser. Pull the plunger all the way back to fill it with air and then push it
forward quickly for a quick output of air to blow away dust in small places such as USB
ports or SD memory card slots. The small ends of these dispensers enable you to reach a
more concentrated area with the air then you could get with just blowing our air yourself
(from your mouth).
• When using compressed air, always release in short blasts. Longer blasts can actually result
in condensation.
• Anti-static cloths are great for attracting dust and are safe to use around computer
equipment.
• The cleaner you keep your work space, the cleaner your equipment will be
• Be sure to hang on to your user manuals as they provide you with the best cleaning
methods for that particular device.

Why clean your computer?

Cleaning your computer’s hardware and software is important for a lot of reasons.
Clean hardware can help your computer run more smoothly and extend your computer’s
lifespan, which can save time and money. Regular cleaning protects your investment and
your data. When you wipe off the screen and empty crumbs from your keyboard, you’re
helping your equipment perform better and you reduce the risk it will break down.
Dust and other unwanted dirt can build up and suffocate your PC’s hardware. By regularly
cleaning dust out of the fan vents and case, you can help protect the system from
overheating and causing permanent damage to the internal parts of your computer and the
information you store on it.
How often does it need to be done? If you don’t want to hurt your PC’s performance and
lifespan with the added stress and heat, give it a good cleaning at least every six month to a
year.
While the average user’s computer lasts several years, true cleaning of hardware and
software could extend your PC’s useful life by a few more years.
Clean software helps protect your data. Antivirus software and regular program updates
help ensure viruses, malware, and cybercriminals stay out of your system.
When you back up your files, delete unused programs, and perform maintenance tasks like
defragmenting the hard drive, you help to ensure your computer can save your files
without accidentally corrupting them.
You probably like a tidy home. It’s a good idea to keep your computer tidy, too. For
instance, using an external hard drive or cloud-based storage can declutter your computer
while helping to keep valuable data safe and secure.

Cleaning the keyboard

Dust, food, liquid, and other particles can get stuck underneath the keys on your keyboard,
which can prevent it from working properly. The basic cleaning tips below can help keep
your keyboard clean.
1. Unplug the keyboard from the USB or PS/2 port. If the keyboard is plugged into the
PS/2 port, you will need to shut down the computer before unplugging it.
2. Turn the keyboard upside down and gently shake it to remove dirt and dust.
3. Use a can of compressed air to clean between the keys.

4. Moisten a cotton cloth or paper towel with rubbing alcohol and use it to
clean the tops of the keys. Do not pour alcohol or any other liquid directly
onto the keys. 5
5. Reconnect the keyboard to the computer once it is dry. If you
are connecting it to a PS/2 port, you will need to connect
it before turning on the computer.
Dealing with liquids

If you spill liquid on the keyboard, quickly shut down the computer and disconnect the
keyboard. Then turn the keyboard upside down and allow the liquid to drain.

If the liquid is sticky, you will need to hold the keyboard on its side under running water to
rinse away the sticky liquid. Then turn the keyboard upside down to drain for two days
before reconnecting it. Please note that keyboard may not be fixable at this point, but the
method above is probably the best option.

To prevent this situation altogether, we recommend keeping drinks away from the
computer area.

Cleaning the mouse

There are two main mouse types: optical and mechanical. Each is cleaned in basically the
same way, although the mechanical mouse requires a bit more work.

• Optical mice require no internal cleaning because they do not contain any
rotating parts; however, they can get sticky over time as dust collects near
the light emitter. This can cause erratic cursor movement or prevent the
mouse from working properly.

Mechanical mice are especially susceptible


to dust and particles that can accumulate inside the mouse,
which can make it difficult to track—or move—properly. If the
mouse pointer does not move smoothly, the mouse may need to be cleaned.

The basic cleaning tips below will help keep your mouse clean:

1. Unplug the mouse from the USB or PS/2 port. If the mouse is plugged
into the PS/2 port, you will need to shut down the computer before
unplugging it.
2. Moisten a cotton cloth with rubbing alcohol, and use it to clean the top
and bottom of the mouse.

3. If you have a mechanical mouse, remove the tracking ball by


turning the ball-cover ring counter-clockwise. Then clean the tracking ball
and the inside of the mouse with a cotton cloth moistened with rubbing
alcohol. 4

4. Allow all of the parts to dry before reassembling and


reconnecting the mouse. If you are connecting it to a PS/2 port,
you will need to connect it before turning on the computer.
If you just want to give the mouse a quick cleaning, place it on a clean sheet of paper and
move the mouse back and forth. Some of the dust and particles should rub off onto the
paper.

Cleaning the monitor

Dirt, fingerprints, and dust can make your computer screen difficult to read; however, it's
easy to clean your screen when needed. There are monitorcleaning kits you can buy, but
they may damage your monitor if they're designed for a different type of monitor. For
example, a monitor cleaner that is designed for glass screens may not work with some non-
glass LCD screens. The safest method is simply to use a soft clean cloth moistened with
water.

Do not use glass cleaner to clean a monitor. Many screens have anti-glare coatings that can
be damaged by glass cleaner.
1. Turn off the computer.

2. Unplug the monitor from the power. If you are using a laptop, unplug the laptop.
3. Use a soft clean cloth moistened with water to wipe the screen clean.

Do not spray any liquids directly onto the screen. The liquid could leak into the monitor
and damage the internal components.
Tips for cleaning other computer surfaces

From time to time, you should clean your computer case and the sides and back of the
monitor to avoid a buildup of dust and dirt. Here are a few tips you can use when cleaning
these surfaces.
1. Dust is your computer's main enemy. Use an antistatic cloth to lightly dust your
computer casing. Do not use furniture cleaners or strong solvents.

2. Use a can of compressed air to blow out debris from the air intake
slots.
3. Ammonia diluted with water—or glass cleaner comprised mostly of
ammonia and water—is a safe cleaning solution for computer surfaces. The
milder the solution, the better.
4. Clean the monitor housing and case (but not the monitor screen) by
spraying a safe cleaning solution onto a paper towel or anti-static cloth and
wiping in a downward motion.

Keep it cool

Don't restrict airflow around your computer. A computer can generate a lot of heat, so the
casing has fans that keep it from overheating. Avoid stacking papers, books, and other
items around your computer.

Many computer desks have an enclosed compartment for the computer case. If you have
this type of desk, you may want to position the case so it is not
against the back side of the desk. If the compartment has a door, you may want to leave it
open to improve airflow.

Protecting your computer

Your computer faces many potential threats, including viruses, malware, and hard drive
failure. This is why it's important to do everything you can to protect your computer and
your files.
Safeguarding against malware

Malware is any type of software that is designed to damage your computer or gain
unauthorized access to your personal information. It includes viruses, worms, Trojan
horses, and spyware. Most malware is distributed over the Internet and is often bundled
with other software.

The best way to guard against malware is to install antivirus software, such as Bitdefender,
Norton, or Kaspersky. Antivirus software helps to prevent malware from being installed,
and it can also remove malware from your computer.
It's also important to stay smart when you're browsing the Web or using email. If a website
or email attachment looks suspicious, trust your instincts. Keep in mind that your antivirus
program may not catch everything, so it's best to avoid downloading anything that might
contain malware.

Backing up your computer

Imagine what would happen if your computer suddenly stopped working.


Would you lose any important documents, photos, or other files? It may be possible to
repair your computer, but your files may be lost forever. Luckily, you can prevent this by
creating backup copies of all of your files (or just the important ones) on an external hard
drive or an online backup service.

External hard drives

You can purchase an external hard drive and copy the contents of your computer to it. The
initial backup could take several hours, so you will need to select a period of time when you
do not need access to your computer. Running the backup overnight usually works best.
Follow-up backups should be conducted on a regular basis, but they should not take as
long.

One drawback is that an external hard drive can be lost, damaged, or stolen— just as your
computer might be. This is why it's important to keep your drive in a secure location when
not in use.
Online backup services

You can also back up your files to an online backup


service like Mozy, Carbonite, or Box. These services will back up your your files in the
cloud, which means you'll be able to recover them from any computer with an Internet
connection. The amount of storage provided by these sites varies, and you will probably
need to pay a fee for adequate storage space.

One drawback to online backup services is that the initial backup can be slow and may
even take days to upload if you have a lot of files. However, subsequent backups should
not take as long.

Other maintenance techniques

To keep your computer running smoothly, it's important to keep files and folders
uncluttered. Cluttered or unorganized folders make it more difficult to find the files you
need. Additionally, unwanted files can eventually fill up your hard drive, which will make
your computer slower and more difficult to use. Here are a few things you can do to delete
unwanted files and improve your computer's performance.
• Delete files: If you have any unwanted files, you can delete them manually. To do this,
drag them to the Recycle Bin or Trash, then empty it to permanently delete the files.
• Run the Disk Defragmenter: Windows includes a Disk Defragmenter program in the
Control Panel. If your computer is running slowly, running Disk Defragmenter can help
to speed it up.
• Run a Disk Cleanup: Windows also includes a Disk
Cleanup program in the Control Panel. It scans your computer for
temporary files and other files that can be deleted. You can then delete the
files to free up space on your hard drive.
Creating a safe workspace

In addition to keeping your computer healthy, it's important to think about your own
health. Using a computer involves a lot of repetitive motions such as typing and using the
mouse. Over time, these motions can begin to negatively impact your body, especially your
wrists, neck, and back. Staring at a monitor for long periods of time can also cause eye
strain. To minimize these risks, you should take a few moments to make sure your
workspace is
arranged in a comfortable and healthy way.

Avoiding Strain and Injury

Computer ergonomics is the science of equipment design and how specific equipment usage
and placement can reduce a user's discomfort and increase productivity. Some equipment
is designed with special attention to ergonomics, like ergonomic keyboards and ergonomic
chairs.

Here are a few tips to help you avoid injury in your workspace.

• Adjust your chair: Make sure your chair is adjusted to allow you to sit in a
natural, comfortable position. Many office chairs are specially designed to support
the lower back and promote good posture.
• Keep the keyboard at a comfortable height: Try to place the keyboard in a
position that allows you to keep your wrists straight and relaxed to avoid wrist
strain. Many desks have a keyboard tray that can keep the keyboard at a better
height. You can also buy an ergonomic keyboard that is designed to minimize wrist
strain.
• Keep the mouse close to the keyboard: If possible, place the mouse right next
to the keyboard. If the mouse is too far away, it may be uncomfortable or
awkward to reach for it.
• Place the monitor at a comfortable distance: The ideal position for a monitor
is 20 to 40 inches away from your eyes. It should also be at eye level or
slightly lower.
• Avoid clutter: The computer area can quickly
become cluttered with paper, computer accessories, and other items. By keeping
this area as uncluttered as possible, you can improve your productivity and
prevent strain and injury.
• Take frequent breaks: It's important to take breaks while you're working at
your computer. To avoid eye strain, you should look away from the monitor
every once in a while. You can also stand up and walk around to avoid
sitting in the same position for long periods of time. Programs such as
Workrave can automatically remind you to take breaks.
SELF-CHECK 2.1-9

A. ENUMERATION: Write the tips for cleaning other computer surfaces

1.

2.

3.

4.

5.

6.

B. ESSAY: Write the answer brief it.

1. How to Clean Common Computer Parts and Devices?

2. Why clean your computer? 3

3. What is the basic cleaning tips below can help keep your keyboard clean?
4. What is the basic cleaning tips below will help keep your mouse clean

5. What is a cleaning the monitor?


_TASK SHEET 2.1-9_
Cleaning Computer Systems and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to Cleaning Computer Systems and Networks and Network ff.
Standard operating procedures within 3 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE Steps /

Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below How to clean your computer, Step

1: Hardware
1. Wipe down your computer.
2. Clean Your keyboard.
3. Blow dust buildup out of computer vents, fans and accessories.
4. Run check disk tool.
5. Check surge protector.
6. Keep PC ventilated.
7. Back up your hard drives.
8. Get antivirus software to protect from malware.

Assessment
Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-9

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Wipe down your computer

Clean Your keyboard

Blow dust buildup out of computer vents, fans and accessories

Run check disk tool

Check surge protector

Keep PC ventilated

Back up your hard drives

Get antivirus software to protect from malware


UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO.3


> Diagnose Faults of Computer Systems and Networks

LESSON CONTENT: Diagnostic Procedures

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard procedures.


2. Normal function of computer systems and networks are checked in accordance with
manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with manufacturer’s
requirements.
4. Where necessary, needed repairs/replacements are made in accordance with
established procedures.
5. Unplanned events or conditions are responded to in accordance with established
procedures
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 3.1-1

Diagnostic Procedures

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. IDentify the Diagnostic Procedures

2. Determine the Diagnostic Procedures

A Diagnostic Program (also known as a Test Mode) is an automatic computer program


sequence that determines the operational status within the software, hardware, or any
combination thereof in a component, a system, or a network of systems. Diagnostic
programs ideally provide the user with guidance regarding any issues or problems found
during its operation.
Diagnostics programs may be simple or complex, operating unknowingly within everyday
devices or awaiting their invocation to make more complex performance assessments.
Everyday examples are a microwave oven that
displays code F6 to warn of a shorted temperature probehl or a garage door opener that
flashes its control board's LED four times warning of critically misaligned safety sensors
and impending shutdown.12
Diagnostic programs are also inserted into consumer electronic products and
electronic games. Sometimes if the owner of an electronic device asks the manufacturer
how to access the hidden diagnostic program, they may reply to the consumer saying that
the information is considered to be "proprietary" and cannot be shared.

Taking a systematic approach to troubleshooting PC issues will save you time and
frustration and get your clients back to work more quickly.
It's a given: PCs go south and do so often. Whether it's hardware, software, or user error,
there will always be something in the way of that PC running smoothly. Problem is, there
are so many things that can go wrong, it's often difficult to know where to start to simply
discover the problem.
I do a lot of remote support, so I've had to learn many ways to troubleshoot a sick PC
without the luxury of being in front of the patient. Of course, there are countless routes to
take with this process, but I thought I'd share the steps I like to follow. These are not your
standard "Run your antivirus" or "Defrag the drive" approaches, either. This is the method
I follow from the beginning of the phone call to the client.
1: Describe the problem
The first thing I have the client do is describe the problem. Before jumping onto the PC, I
gather as much information as possible. This means having the client describe what is
happening, when it started happening, and whether there was any particular incident that
coincided with the problem starting. Many times, this information gathering will lead you
directly to the solution. Sometimes, the information gathering will lead you to realize a
reboot is all that is necessary to solve the problem.
2: Define the affected subsystem
There are instances when a problem is isolated to a specific subsystem of a machine --
such as printing. Although you might think this a no-brainer, many end users will call
saying, "My computer isn't working," when in reality what they mean is, "My printer isn't
printing." In some cases, multiple subsystems might be affected, such as printing and
mapped network drives... you can see where this is leading. If multiple subsystems are
having issues, the combination of those will often lead you directly to a solution.
3: Is it hardware or software?
If a client describes an issue such as a slow PC, one of the first things I do is check out the
hardware. Is there enough RAM? Is there enough free space on the C drive? And if the
problem is network related, are the lights on the network card blinking, on, or dark? If
these don't highlight an issue, don't immediately assume the issue is software related --there
could be hard drive issues. But before you dig deeper into hardware issues, this would be a
good jumping point for software. If nothing becomes apparent after you've investigated
software issues, come back to hardware and do a drive test or defrag.
4: Diagnose printing woes
Printers can be tricky. But there are ways to make this troubleshooting job a bit easier.
First, find out what type of printer you are dealing with. If the printer is a networked
printer, make sure the network is actually up. If it is, ask whether other machines can print
to the printer in question. If they can, check to see whether any jobs are stuck in the
machine's printer queue. If you open up the Printers And Devices window and the printer is
not listed, find out if it just recently disappeared. If it did, the driver most likely is corrupt
and will need to removed from within Regedit. If the printer is still listed and no jobs are in
the queue, have the client restart the machine and then try to print. A good restart will cure
a host of woes in Windows.
5: Deal with networking trauma
Can the client see the internal servers? If not, can they open their browser and see
google.com? If not, this becomes a challenge, as you can't do remote troubleshooting. But
never fear, help is near. I start by walking the client through rebooting the machine and
starting in safe mode. Usually, if there isn't an actual hardware issue, safe mode will
circumvent the nasties that are keeping the machine from getting online. Once in safe mode,
let the fun begin!
Of course, if no one can get online, the first thing to be done is power cycling the
router/modem/switch hardware. If that fails, there is always DNS to troubleshoot. But that
gets beyond standard triage (as it will often lead you away from the client machine and to a
DNS server issue).
6: Resolve login issues
How often do you get this one: "Where's my password?" A client calls in to say they can't
log into their computer. Have they forgotten their password? Is the machine on a domain?
If it's on a domain, is the machine online? There are so many problems with this one, it's
hard to know where to start. But here's the first thing you should do: If the client is on a
domain and you have access to their Active Directory server, try to log onto that server with
their credentials. If
you can do that, the issue has been narrowed down to either their network connection or
the manner in which they are logging in. If they are to be logging in to a domain, make sure
they are doing so at their computer and not logging in to the local machine.
7: Troubleshoot specific software
Sometimes, it will boil down to a single piece of software that's giving the user fits. This, in
turn, can give the support technician fits (especially if it's a niche piece of software). The
first thing I would do is double-check to make sure the issue is, in fact, isolated to one
particular piece of software. If the problem is network related and all other applications
can get online, the issue is most likely isolated to that one piece of software. If so, and the
software depends upon a network connection, make sure neither the firewall or the
antivirus software has started blocking the software from getting packets in or out. When I
discover the problem is isolated to a single piece of software, often a repair install will solve
the issue.
8: Look for virus issues
I find that 50 percent of support calls wind up being viruses. Since viruses cause all sorts of
differing behavior, how can you quickly determine whether the issue is a virus? I know
support techs who have spent hours trying to track down a virus on a machine that wasn't
actually infected. There are a few questions I like to ask. The first is "What behavior is
your computer displaying that makes you believe it has a virus?" The answer to that
question will dictate where you go from there. Other questions to ask are:
• Did your computer recently show signs of drastic slowdown?
• Are strange or unwanted popup windows appearing at random times?
• Were you recently on a Web site you don't normally visit?
• Did someone else use your machine?
• Did you recently open an email attachment?
• Has a strange security window recently started popping up?
The above questions will help guide you in the right direction to help cure a possibly
infected PC.
9: Ask for a demonstration
If a discussion about the issue brings up nothing and you can remote into the user's PC, it
will do you a world of good to see the problem in action. This is especially true when the
issue is unique to a client's PC, network, or software. Although the majority of issues can be
figured out from description, some issues simply need to be viewed in action. Have the
client reproduce the error for you. Make sure the error happens in the same way every
time. With this
visual reproduction, you will have confirmation that there is an issue, and you'll have a
definitive place with which to start your troubleshooting.
10: Use your tools
When all else fails, you have that outstanding collection of tools you can use to throw at a
machine. When this is the case, I tend to start with the most innocuous software, such as
Malwarebytes, and then go up from there. This is a good time to run those hard drive
diagnostic tools (should the issue possibly point toward a faulty or degraded drive). This is
the kitchen sink approach and can sometimes lead to more issues. But when you've gone
down every rabbit hole you can think of, it might be your best shot.

Diagnostic Tools for Computers

POST
Your computer completes a Power On Self Test, or POST, every time you turn on your
computer. POST performs basic diagnostics on your computer’s memory and hard drives,
checks for the presence of a keyboard and mouse, and tests the clock and other system
settings. POST resides in a small, permanent memory area called BIOS, which stands for
Basic Input Output System; this contains compact, simple programs the computer uses
when you first turn it on. If a problem exists with the computer’s hardware, POST signals
this through coded audio beeps. Though hardware makers have produced different
versions of POST over the years, they all ensure that the computer works correctly before it
starts the operating system.
Check Disk

The program “CHKDSK,” or Check Disk, is part of Microsoft’s Windows software. It tests
and repairs the file system information on hard drives. For example, if you work on your
computer during a storm, a sudden power failure may shut your computer down
immediately. Electrical noise from the power line may write random data into hard drive
files that were open as you worked. This random data can corrupt the Windows file system,
making files unreadable. If Windows senses a problem with the file system, it runs Check
Disk automatically when you restart your computer; you can run it manually from
Windows Explorer or a command prompt. Check Disk scans the file structure, looking for
and reporting on problems. If you run it in “fix” mode --“chkdsk /f” -- the program
attempts to repair any damage it finds. Check Disk is sophisticated and fixes file system
problems for the vast majority of cases.
Task Manager

The Windows operating system runs dozens of programs on your computer and you will
seldom notice them unless problems arise. These programs monitor the state of your
printer, network, mobile devices and other hardware. If your computer becomes unusually
sluggish, the cause may be one of these programs running excessively. The Windows Task
Manager displays a list of all the programs running on your computer, along with the
amount of memory they consume and how active they are. To see the Task Manager, press
"Ctrl-Shift-Esc.” If a program in the Task Manager window uses more than 20 percent of
the computer’s CPU time for a prolonged period, the program may be caught in an error
state. To solve this problem, try restarting the computer.
Windows Defender

If your PC has a malware infection, your computer’s performance suffers. Malware may
cause your Web browser to display unwanted pop-up ads and you may experience other
annoyances. The Windows operating system includes a program called Windows Defender,
which scans your hard drives for viruses, spyware and other malicious programs. Windows
Defender reports on the problems it finds, isolates the malware and removes it.
Windows Defender uses a database of known malware, and the database is continually
updated by Microsoft so that the program catches even the newest viruses.
Drivers

Your PC uses a variety of devices for data storage, communications, input and display.
Each of these has a program called a driver that carries data between the hardware and
Windows. Frequently, drivers have a diagnostic capability that checks the device’s
operation and troubleshoots problems. Windows organizes these drivers in its Device
Manager, which you can see by clicking the Windows "Start" button, right-clicking
“Computer,” selecting “Properties” and clicking the “Device Manager.”
Techniques for Diagnosing Computer Systems

Computer Diagnosis
Sometimes when the problem
with a system is not totally
apparent and the problem
may be intermittent, using a
basic common diagnostic
procedure may help
determine what is wrong.

This procedure has a


number of steps that, if
followed each time, can be
of help.

Rules in Diagnosing Computer Systems


1. Know the
facts
Educate oneself on all aspects and operation of
computer parts. Continuous learning on computer
technology.
2. Use your common sense

3. Focus on Field Replaceable Units


Identify the different types of FRU that can be used for replacement or sub assembly.

4. Proper assembly and disassembly

5. Problem Isolation
Problem isolation is a detective work in which you need to determine what is out of the
ordinary by making detailed observation of what is not working normally and record any
information as you proceed. The information you will be able to gather will help
diagnose your computer. You need to observe wisely. Look for any abnormalities in the
unit, any change in smell or foreign smell, listen to all the sounds, and error codes. 6

6. Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor, system unit, and
printers. Some have multiple external devices. To troubleshoot, you need to isolate
major components which are failing to operate.

Factors Causing Computer Failures and Defects People ware

Untrained personnel would probably damage programs in PC. Firmware


Programs or software burnt in chips may be corrupted.

Software

Corrupted operating systems would cause the system to fail. Hardware


Defective hardware components would lead to computer malfunction. Hardware
conflicts and viruses can hinder your computers performance.
ESD (Electro Static Discharge)
Electro static discharge can easily damage sensitive components in your computer.
Electricity
Incoming supply from AC outlet must be regulated; power surges can damage
computer units

Things to Consider

There are many devices, parts, cords, and connections on a computer, which means
that there are many possible problems that could arise. In addition, your computer uses
a variety of software, which can also cause problems. However, no matter what the
problem is, you can use the following tips to help you find a solution:
Always check the cables: Many computer problems are related to an issue in the
cables and connections. The easiest first step you can take to troubleshoot most
problems is to check all related cables and connections.
Isolate the problem: If possible, try to isolate the problem. For example, if you can't
get the cursor to move on the screen, try to determine if the issue is with the mouse. If
you have an extra mouse, you can alternate devices to see if the one plugged in is the
issue, or use the arrow keys on the keyboard to help determine if the mouse is the source
of the problem. When trying to isolate the problem, only make one change at a time.
Take notes about error messages: If your computer gives you error messages, be sure
to write down as much information as possible. If the basic troubleshooting steps don't
work, you may need the information.
Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't repeat
yourself. If you can't remember it, then write it down. If you end up asking someone for
help, it will be much easier if they know exactly which steps you've taken.

Simple Solutions to Common Problems


Most of the time, problems can be fixed by using simple troubleshooting techniques,
such asclosing and re-opening the program. It's important to try these simple solutions
before resorting to more extreme measures. If the problem still isn't fixed, you can then
try other troubleshooting techniques, such as reinstalling the software.
Program Runs Slowly or Isn't Working Right
If a program is running slowly or otherwise isn't working right, the f irst thing you
should try is closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and boot it up again. Some
minor problems will work themselves out when you do this.
Check with the company for any known problems or updates to the software.
Program is Completely Unresponsive
If a program has become completely unresponsive, you can press (and hold)
Control+Alt+Delete on your keyboard to open the Task Manager . You can then select
the program that isn't working and click End Task. If you are using a Mac, you can
press Option+Command+Esc to open a similar dialog box.
Problems Starting or Shutting Down the Computer Power Button Will Not Start
Computer
If your computer does not start, begin by checking the power cord to confirm that it is
plugged securely into the back of the computer case and the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often, this will require
you to plug a lamp or other electrical device into the outlet to make sure it is receiving
power.
If the computer is plugged into a surge protector , verify that it is turned on. You may
have to it's possible that you could make the situation worse, so it's best to consult a
professional if you think a drastic solution is needed
SELF-CHECK 3.1-1
A. ENUMERATION: Write a systematic approach to troubleshooting PC issues
will save you time and frustration and get your clients back to work
more quickly.

1. 6.

2. 7.

3. 8.

4. 9.

5. 10

B. List down the rules in diagnosing computer systems

1. 4

2. 5

3. 6

C. ESSAY: Write the answer brief it.

1. What is the diagnostic computer?

2.What is a problems starting or shutting


down the computer power button will
not start computer?
_TASK SHEET 3.1-1_

Diagnostic Procedures
Performance Objective: given necessary tools,equipment and
materials,

you should be able to diagnostic procedures ff. standard


operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2

computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below Steps to Diagnosis


1. Taking an appropriate history of symptoms and collecting relevant data.
2. Physical examination.
3. Generating a provisional and differential diagnosis.
4. Testing (ordering, reviewing, and acting on test results)
5. Reaching a final diagnosis.
6. Consultation (referral to seek clarification if indicated)

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 3.1-1

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Taking an appropriate history of symptoms and collecting relevant data

Physical examination

Generating a provisional and differential diagnosis

Testing (ordering, reviewing, and acting on test results)

Reaching a final diagnosis

Consultation (referral to seek clarification if indicated)


UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO.3


> Diagnose Faults of Computer Systems and Networks

> LESSON CONTENT: Identifying and Isolating


Faults/Problems
o Diagnostic Software Utilities o Gathering of Information

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard procedures.


2. Normal function of computer systems and networks are checked in accordance with
manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with manufacturer’s
requirements.
4. Where necessary, needed repairs/replacements are made in accordance with
established procedures.
5. Unplanned events or conditions are responded to in accordance with established
procedures

RESOURCES:

Tools, Materials and Equipment and Facilities


METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 3.1-2

Identifying and Isolating Faults/Problems

■ Diagnostic Software Utilities


■ Gathering of Information accomplish form
■ Diagnostic Report
■ Proposal Report

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Identifying and Isolating Faults/Problems

2. Determine the Identifying and Isolating Faults/Problems

Fault-Isolation Definitions

Filters
Determining the cause of a problem. Also known as "fault diagnosis," the term may refer
to hardware or software, but always deals with methods that can isolate the component,
device or software module causing the error. Fault isolation may be part of hardware
design at the circuit level all the way up to the complete system. It is accomplished by
building in test circuits and/or by dividing operations into multiple regions or components
that can be monitored separately. After fault isolation is accomplished, parts can be
replaced manually or automatically (see fault tolerant).Fault Isolation vs. Fault
DetectionAlthough the terms "fault isolation" and "fault detection" are sometimes used
synonymously, fault detection means determining that a problem has occurred, whereas
fault isolation pinpoints the exact cause and location.Built Into Normal OperationSoftware
can also be created and run with fault isolation in mind. Many techniques can be used. For
example, program modules can be run in different address spaces to achieve separation. In
addition, generating intermediate output that can be examined as well as recording
operational steps in a log are ways to assist the troubleshooter to manually determine which
routine caused the application to stop working or stop working properly.In a network,
intelligent agents can be placed in various nodes that continuously collect traffic statistics
that are analyzed in real time to detect and pinpoint the fault. See fault detection.
Problem Isolation

Troubleshooting requires that you find the root cause of the problem and then fix it. The
process to find the root cause begins with problem isolation. Problem isolation moves you
from the general ideas about a problem, to a specific idea of what the problem is, as follows:

Before problem isolation: I have no idea, except for some general symptoms.

After problem isolation: I have an idea of what is not working, a comparison to how it
should be working, and I know on which devices it should be working differently.
Isolate Computer Problems

The following are the fundamental rules in isolating computer problems.

• Approach the problem systematically: start at the beginning and walk through the
situation in a careful way. Remember it and apply it every time.
• Divide and conquer: This rue is the most powerful. Isolate the problem. In the overall
system, remove one software or hardware component after another, until the problem is
isolated to a small part of the whole system.
• Don’t overlook the obvious: ask simple questions. Is the computer plugged in? Is it
turned on? Is the monitor plugged in? Most problems are so simple that we overlook them
because we expect the problem to be difficult.
• Check the simple things first: it is more effective to first check the components that are
easiest to replace.
• Make no assumptions

• Write things down: keep noting down the symptoms. They will help you think more
clearly.
• Reboot and start over: This is an important rule. Fresh starts are good for us and
uncover events or steps that might have been overlooked.
• Keep your cool: In an emergency, protect the data and software by carefully
considering your options before acting, by not assuming data is lost even when hard drive
and floppy drive errors occur, and by taking practical precautions to protect software and
OS files.

• Don’t assume the worst:

• Know the starting point.

• A careful visual inspection should catch the following types of Faults

-Loose wires

- Broken wires

- Blown fuses

- Wrong switch settings

- Missing jumpers

- Loose connectors

- Burnt PCB track

- PCB track cut

- PCB track short

- Wrong insertion of connector/cable

- Cold solder joints


- Solder bridges

- Broken IC leads

When solving a computer problem, apply above rules and, prepare course of action. The
course of action involves the, following:

• Interact with the user.

• Isolate the problem by eliminating the unnecessary.

• Then follow established guidelines towards a solution


Utility Software is system software designed to help analyze, configure, optimize or
maintain a computer.
Utility software usually focuses on how the computer infrastructure (including the
computer hardware, operating system, software and data storage) operates. Utility
software, along with operating system software, is a type of system software, distinguishing
it from application software.

Utility Software

• Anti-virus utilities scan for computer viruses.


• Archivers output a stream or a single file when provided with a directory or a set of
files. Archive utilities, unlike archive suites, usually do not include compression or
encryption capabilities. Some archive utilities may even have a separate un-archive utility
for the reverse operation.
• Backup software can make copies of all information stored on a disk and restore either
the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental
deletion).
• Clipboard managers expand the clipboard functionality of an operating system .
• Cryptographic utilities encrypt and decrypt streams and files.
• Data compression utilities output a shorter stream or a smaller file when provided with
a stream or file.
• Data synchronization utilities establish consistency among data from a source to a target
data storage and vice versa. There are several branches of this type of utility:
o File synchronization utilities maintain consistency between two sources. They may be used
to create redundancy or backup copies but are also used to help users carry their digital
music, photos and video in their mobile devices.
o Revision control utilities are intended to deal with situations where more than one user
attempts to simultaneously modify the same file.
• Debuggers are used to test and “debug” other programs, mainly to solve
programming errors. Also utilized for reverse engineering of software or systems.
• Disk checkers can scan operating hard drive.
• Disk cleaners can find files that are unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete
when their hard disk is full.
• Disk compression utilities can transparently compress/uncompress the contents of a
disk, increasing the capacity of the disk.
• Disk defragmenters can detect computer files whose contents are scattered across
several locations on the hard disk, and move the fragments to one location to
increase efficiency.
• Disk partitions can divide an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
• Disk space analyzers for the visualization of disk space usage by getting the size for
each folder (including sub folders) & files in folder or drive. showing the distribution
of the used space.
• Disk storage utilities
• File managers provide a convenient method of performing routine data management
tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying,
merging, generating and modifying data sets.
• Hex editors directly modify the text or data of a file. These files could be data or an
actual program.
• Memory testers check for memory failures.
• Network utilities analyze the computer’s network connectivity, configure network
settings, check data transfer or log events.
• Package managers are used to configure, install or keep up to date other software on
a computer.
• Registry cleaners clean and optimize the Windows Registry by removing old registry
keys that are no longer in use.
• Screensavers were desired to prevent phosphor burn-in on CRT and plasma
computer monitors by blanking the screen or filling it with moving images or
patterns when the computer is not in use. Contemporary screensavers are used
primarily for entertainment or security.
• System monitors for monitoring resources and performance in a computer system.
• System profilers provide detailed information about the software installed and
hardware attached to the computer.
Gathering Information about Your Computers

One of the most valuable benefits of conducting an asset discovery project is the large
amount of data that is obtained about the client and server computers on the
network. When you start designing and planning your
isolation zones, you must make decisions that require accurate information about the
state of all hosts to ensure that they can use IPsec as planned.

Capture the following Information from each Computer

• Computer name. This name is the computer's NetBIOS or DNS name that identifies the
computer on the network. Because a computer can have more than one media access
control (MAC) or IP address, the computer's name is one of the criteria that can be used to
determine uniqueness on the network. Because computer names can be duplicated under
some circumstances, the uniqueness should not be considered absolute.
• IP address for each network adapter. The IP address is the address that is used with the
subnet mask to identify a host on the network. An IP address is not an effective way to
identify an asset because it is often subject to change.
• Operating system, service pack, and hotfix versions. The operating system version is a
key factor in determining the ability of a host to communicate by using IPsec. It is also
important to track the current state of service packs and updates that might be installed,
because these are often used to determine that minimum security standards have been met.
• Domain membership. This information is used to determine whether a computer can
obtain IPsec policy from Active Directory or whether it must use a local IPsec policy.
• Physical location. This information is just the location of the device in your organization.
It can be used to determine whether a device can participate in a specific isolation group
based on its location or the location of the devices that it communicates with regularly.
• Hardware type or role. Some tools that perform host discovery can provide this
information by querying the hardware information and running applications to determine
its type, such as server, workstation, or portable computer. You can use this information to
determine the appropriate IPsec policy to assign, whether a specific computer can
participate in isolation, and in which isolation group to include the computer.
After collecting all this information and consolidating it into a database, perform regular
discovery efforts periodically to keep the information current. You need the most complete
and up-to-date picture of the managed hosts on their networks to create a design that
matches your organization's requirements.
You can use various methods to gather data from the hosts on the network. These methods
range from high-end, fully automated systems to completely
manual data collection. Generally, the use of automated methods to gather data is
preferred over manual methods for reasons of speed and accuracy.
Automated Discovery

Using an automated auditing network management system such as Microsoft System


Center Configuration Manager (formerly known as Systems Management Server)
provides valuable information about the current state of the IT infrastructure.
For more information about how System Center Configuration Manager 2007 can help
perform automated information gathering, see
https://go.microsoft.com/fwlink/?linkid=110412.
Manual Discovery

The biggest difference between manual discovery methods and automated methods is time.
You can use the Windows Script Host (WSH), VBScript, and Windows Management
Instrumentation (WMI) to create a script file that can collect the system configuration
information. VBScript and WMI are built-in to Windows 8, Windows 7, Windows Vista,
Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2. Starting with
Windows Server 2008, Windows PowerShell is included with the operating system. For
more information, see “Scripting with Windows PowerShell”
(https://go.microsoft.com/fwlink/?linkid=110413).
Whether you use an automatic, manual, or hybrid option to gather the information, one of
the biggest issues that can cause problems to the design is capturing the changes between
the original inventory scan and the point at which the implementation is ready to start.
After the first scan has been completed, make support staff aware that all additional
changes must be recorded and the updates noted in the inventory.
This inventory will be critical for planning and implementing your Windows Firewall with
Advanced Security design.
How To Create A System Diagnostics Report In Windows 7

Your PC with Windows 7 is not running as it should? Or are you experiencing slow downs
or other errors regularly? Then it may be time to run a System Diagnostics report in
Windows 7 to find out why.
Windows 7 comes with several internal tools that can be used to diagnose the computer
system. One of them is the System Diagnostics Report which is part of the Windows Control
Panel.
Microsoft has hidden the tool deep inside the Control Panel which is why the majority of
users has probably never heard of the option before.
To run the system diagnostics report users need to open the Windows Control Panel first.
They can do that by clicking on the Start Orb and selected Control Panel from the start
menu. They then need to click on Performance Information and Tools, and there on
Advanced Tools in the left sidebar.
This opens a listing of tools to get additional performance and system information.
Locate the Generate a system health report link near the bottom of the listing and click
on it.

Windows will automatically start collecting data for 60 seconds to analyze the data
afterwards.
The report lists warnings at the top of the results window and test information below that.
Warnings can for instance remind the user that no antivirus software is installed.

The Basic system checks group lists checks that have been performed by the system
diagnostics tool and how the system fared in the tests. Results are shown for each test
which should read passed for successful tests.
Basic System Checks

Tests Result Description


□ OS Checks o Passed Checks for attributes of the operating system

Test Groups Tests Failed Description


OS Version Check 1 0 Passed

El Disk Checks c Passed Checks for disk status


El Security Center Tests G Passed Checks for state of Security Center related information.
El System Service Checks G Passed Checks for state of system services

Test Groups Tests Failed Description

Abnormally Terminated Services Check 1 0 Passed


Workstation Service Check 1 0 Passed

El Hardware Device and Driver Checks G Passed Survey of Windows Management Infrastructure supported devices.

Performance

Resource Overview

Component Status Utilization Details

CPU • Idle 9% Low CPU load.


Network G Idle 1% Busiest network adapter is less than 15%.
Disk G Idle 12 /sec Disk I/O is less than 100 (read/write) per second on disk 0. ^
Memory G Normal 33% 5526 MB Available.
Users find here information about the system's average load, network utilization or
computer memory usage. Since this data is collected in the 60 seconds period it should be
clear that users need to work normally on the system during the test.
Lastly, there are loads and loads of in depth information about system processes, services
and other data that has been collected during the test period. Some of the interesting
information include files causing most disk IOs, the processes that were using the most
RAM memory or the IPs with the most inbound or outbound traffic.
The System Diagnostics Report (or System Health Report) can help users find problems
quickly. It should be used as one of the first tools to analyze the operating system.
NETWORK DESIGN PROPOSAL

FEASIBILITY STUDY

Situation in which the Project Exists: This proposal is for a data communication
network to serve the Maryland public education system.
The Maryland legislature recently approved funding sufficient to pay for the
development of this proposal. Pending proposal acceptance by the Maryland State
Public Education Office of Technology (a department within the state Office of
Education), funding will be sought to implement the proposal.

Network Scope: The proposed network is designed to serve the state Office of Education
and two of its school district offices. The state office, located in Kenzington, contains five
departments to be served by this network. Each district office contains four departments to
be served. The North School District is located in Ricksville, 25 miles from the state office.
The South School District is located in Albanton, about 40 miles from the state office. Note
that this network does not serve instructional needs of students; other resources have been
allocated for that purpose. This network is for administrative purposes and is specifically
designed to be independent of student computing facilities.

Objectives of the Network. The network is designed to achieve several specific


business/operational objectives:
1. Secure Service: The main objective of this network is to provide secure administrative
computing service to the State Office and two districts. It is designed to be functionally and
physically isolated from access by people not employed by the Maryland public education
system so as to minimize the risk of unauthorized use. 2

2. Integration and Update: Presently there are many LANs in


the Maryland public education system, but much of the equipment is out of date,
many of the LANs are incompatible with each other, and not connected in a
system-wide network. This proposal describes a WAN that integrates and updates
these LANs to support productive collaboration across the system.
3. Versatile Information Processing: The network will enable users to retrieve, process,
and store ASCII and non-ASCII text, still graphics, audio, and video from any
connected computer.
4. Collaboration: The network will combine the power and capabilities of diverse
equipment across the state to provide a collaborative medium that helps users
combine their skills regardless of their physical location. A network for this
educational community will enable people to share information and ideas easily so
they can work more efficiently and productively.
5. Scalability: The design is scaleable so that more district offices can be added as
funding becomes available without having to redo the installed network.

Intended Users. The primary users of the network at the state level will be the three
administrators, three secretaries, ten members of the Curriculum Department, eight
members of the Human Resource Department, six members of the Finance/Accounting
Department, and three members of the Computer Services Department. At the district level
the primary users will be four administrators, four secretaries, four members of the
Computer Services Department, sixteen members of the Human Resource Department, and
two members of the Finance/Accounting Department. Parents, pre-service teachers,
teachers, and the public are secondary users of the network in that they will receive
information produced on the network, but they will not directly use the network.

Design Assumptions. This design assumes the following:

1. The State Education Network has a firewall that protects all information coming and
going from the network. 2

2. Internet service is provided by the State Education Network, which is


subsidized by the state government.
NETWORK NEEDS ANALYSIS

Data Types. The types of data served by the network will be reports, bulletins,
accounting information, personnel profiles, and web pages. The majority of the data will
be text (ASCII and non-ASCII), but there will be some still graphics and possibly a small
amount of voice and video (primarily for PC-based teleconferencing).

Data Sources. Data will be created and used at all end stations on the network. The data
will be produced by software applications in Windows 2000, primarily Dream Weaver
and Office 2000 Professional (Word, Excel, Access, PowerPoint, and Outlook). Other
data sources to be supported on at least a limited basis will Windows 2000 Accessories
(Paint, Notepad, etc.), NetMeeting, Media Player, and PhotoShop. Note that the network
will be not be accessible from outside...

Numbers of Users and Priority Levels. At the state level, the users will be
administrators, secretaries, and members of four departments. At the district levels, the
users will be administrators, secretaries, and members of three departments. The
maximum estimated number of users on the network at any given time is 100: 33 regular
users in the State Office, 30 regular users in the North District Office, 30 regular users in
the South District Office, and seven otherwise unanticipated users.

Three priority levels will be supported: management (top priority), user (medium priority),
and background (low priority). Note that these designations do not correspond to
administrative levels in the Maryland public education system; rather, they are network
service levels. Network management processes will receive top-priority service; most
network processes will receive medium-priority service; a few processes (e.g., e-mail
transfers, backup, etc.) will be given low-priority service. It should be noted that network
management will usually consume a small amount of the available bandwidth; this means
that management and user processes will usually enjoy identical support.
Background processes will also usually receive more than adequate service, but they
will be delayed as needed to maintain support for management and user services.

Transmission Speed Requirements. The network is to be transparent to the users. Thus,


remotely executed applications, file transfers, and so forth should ideally appear to operate
as quickly as processes executed within an end-station. Interviews with users to ascertain
their needs and expectations indicate that an average throughput of 20 mbps per user
within each LAN and 10 mbps per user between LANs will more than support the needed
performance in most cases (teleconferencing being the possible exception).

Load Variation Estimates. Interviews with users and observation of LAN use at the three
locations yielded data on hourly average and peak loads from January to March, 2001. The
data are tabulated in the appendix. The data indicate that the highest average traffic
volume will occur from 8:00 a.m. to 6:00 p.m., Monday through Friday. The peak network
traffic volume is expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00
p.m. to 5:00 p.m. At night and on weekends the network traffic is minimal except for the
daily backups of the PCs to the LAN servers in the districts and several batch data
transfers anticipated from the districts to the State Office. The data indicate the following
network design parameters:
• The average required throughput on any LAN during work hours (7:00 a.m. to 6:00
p.m.) will be only about 0.2 mbps.
• The average required throughput on the WAN during work hours (7:00 a.m. to 6:00
p.m.) will be only 0.04 mbps.
• The peak expected traffic load on any LAN will be about 10.4 mbps.
• The peak expected traffic load on the WAN will be about 6.4 mbps.
Of course, to avoid user complaints, the network is designed for the peak traffic loads, not
the average throughput.

Stora.ge Requirements. Storage requirements need to be large enough to store all student,
teacher, and state data (note: student data are data about students, not data generated by
students). Interviews and observations of users’ present and anticipated storage
requirements indicate that each user will need an average of 100 MB of server space (in
addition to secondary storage on local PCs); the maximum estimated server-side storage
requirement
per user is about 1 GB. Additionally, the network operating system will occupy about
500 MB on each LAN server. Taking price-performance issues into account, each PC
will have a minimum storage capacity of 10 GB, each LAN server will have a minimum
storage capacity of 20 GB. A main data server in the State Office will have a 36 GB
capacity.

Reliability Requirements. In keeping with user expectations and industry standards,


both the LANs and the WAN are expected to operate at 99.9% uptime and an
undiscovered error rate of .001%.

Security Requirements. A firewall will be used so unauthorized users will be restricted.


Part of the security will be Users accounts and passwords that will give limited access.
There will be different access capabilities for network managers and users.

Existing Network. There is no existing network.


HIGH-LEVEL NETWORK DESIGN

Top-Level Network Diagram

State Office Network Diagram


(LAN cabling is 100BaseT CAT5)
State Office Network Sub-Diagram
Administration LAN

State Office Network Sub-Diagram


Finance/Accounting LAN

(LAN coring is 100BaseT CATS)


State Office Network Sub-Diagram
Curriculum LAN

State Office Network Sub-Diagram


Human Resources LAN
State Office Network Sub¬
Diagram
Computer Services LAN

North District Network Diagram


(LAN cabling is 100BaseT CAT5)
North District Network Sub¬
Diagram
Administration LAN

North District Network Sub-Diagram


Finance/Accounting & Computer Services
LAN
North District Network Sub-Diagram
Human Resources LAN

South District Network Diagram


(LAN cabling is 100BaseT CAT5)
South District Network Sub¬
Diagram
Administration LAN

South District Network Sub-Diagram


Finance/Accounting & Computer Services
LAN
South District Network Sub-Diagram
Human Resources LAN

SELF-CHECK 3.1-1
A. ENUMERATION: Write a capture the following Information from each
computer 1 2 3 4 5

1.

2.

3.

4.

5.
6.
B. List down the NETWORK NEEDS ANALYSIS

1. 5.

2. 6.

3. 7.

4. 8

C. List down Utilities Software

1. 6

2. 7

3. 8

4. 9

5 10
_TASK SHEET 3.1-2_

Identifying and Isolating Faults/Problems


Performance Objective: given necessary tools,equipment and materials,

you should be able to Identifying and Isolating Faults/Problems ff. standard operating
procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2 computer

systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below


1. Collect the Evidence. All the evidence collected must be relevant
to the problem in hand.
2. Analyse the Evidence.
3. Locate the Fault.
4. Determination and Removal of the Cause.
5. Rectification of the Fault.
6. Check the System.
Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-2

YES NO
CRITERIA

Did you......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Collect the Evidence. All the evidence collected must be relevant to the problem in hand

Analyse the Evidence

Locate the Fault

Determination and Removal of the Cause

Rectification of the Fault

Check the System


UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes needed
to set-up computer servers for LANs and SOHO systems. It consists of competencies to
set-up user access and configures network services as well as to perform testing,
documentation and pre-deployment procedures.

> LEARNING OUTCOME NO.4

> Rectify/Correct Defects in Computer Systems and Networks

LESSON CONTENT: Defects in Computer Systems and


Networks

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard procedures.


2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established procedures
4. Unplanned events or conditions are responded to in accordance with established
procedures.
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning

INFORMATION SHEET 4.1-1 Defects in

Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should


be able to:

1. IDentify the Defects in Computer Systems and Networks

2. Determine the Defects in Computer Systems and Networks


What are the Most Common Computer Network Problems ?

Getting to grips with problems relating to your computer network can be a frustrating
affair, but it’s one which is likely to happen on a daily basis.

Computer networks are, after all, highly complex systems that comprise various
components and are in use by multiple users. These structures may
bring many benefits, but they can also be a recipe for disaster. And, if your network fails or
experiences any issues, then your organization’s productivity is going to be affected.

Your main objective, with your computer network, should be to keep it online and
functioning correctly. But you can only do this if you know what the most
common computer network problems are, so let’s take a look:

• Slow Connectivity: If there’s one thing that frustrates an employee then it’s
slow connectivity over a network. PCs can grind to a halt and even the simplest task can
take an age to complete. It’s often caused by large file transfers, so a limit should be put in
place on the size that is permitted e.g. no email attachments that total more than 20mb as a
standard rule. Sometimes this lag can also be caused by faulty network cards, so it’s
important to investigate this possibility.
• IP Conflicts: Each PC on your network should have a unique IP address such as
209.85.255.255, but sometimes two PCs can be assigned
the same IP address. And this can create major connectivity issues for both parties.
Sometimes these conflicts will work themselves out, but you can help speed up the
process. Restarting the router is the simplest approach as it should assign new IP
addresses to every PC on the network.
• Unable to Connect to Local Printer: Printers on a network tend to be shared by
multiple users, but occasionally an error can arise that leaves
people unable to access the printer. This problem is often caused by a sharing issue
whereby different security settings between PCs and the printers fail to agree with each
other. When this occurs it’s recommended that you check firewall settings and that
your Windows network adapters have printer sharing enabled.

• Faulty Cables: A computer network relies on cables to facilitate its connectivity. And
when just one cable fails it can have massive implications for your network. However,
it’s easy to overlook cables as the source of network issues. People tend to concentrate
on software and hardware troubleshooting first. Nonetheless, investigating the
condition of cables in the affected network area is vital. Cables can easily become
dislodged or damaged, so sometimes the fix can be as simple as plugging them back in
or replacing.
• Weak Wi-Fi Signal: If you rely on wireless connections in your organization then you
will be well aware of the issues caused a weak signal. This can often be caused by
environmental issues such as the presence of a microwave or even the layout of an
office. It’s important to eliminate these factors to identify the cause of the fault.
Alternatively the connection issues could be caused by out-dated firmware, so make
sure all updates are installed.

Most Common Computer Problems


Although most complex computer issues at work can often be solved by the
business IT support team, there are many other small, but common, issues
that occur on a regular basis on a personal computer. The good news is that
many problems with computers have simple solutions, and learning to
recognise a problem and fix it yourself will save you a lot of time and
money. The following are the top 10 common computer problems that you
shouldn’t panic over. 1

1. The Computer Won’t Start


A computer that suddenly shuts off or has difficulty starting up could have a
failing power supply. Check that the computer is plugged into the power point
properly and, if that doesn’t work, test the power point with another working
device to confirm whether or not there is adequate power.
2. The Screen is Blank
If the computer is on but the screen is blank, there may be an issue with the connection
between the computer and the screen. First, check to see if the monitor is plugged into a
power point and that the connection between the monitor and computer hard drive is
secure. If the problem is on a laptop, then you may need to get a professional to fix it as
some of the internal wires may be worn.

3. Abnormally Functioning Operating System or Software


If the operating system or other software is either unresponsive or is acting up, then try
restarting your computer and run a virus scan. To avoid having this happen, install reliable
anti-virus software.

4. Windows Won’t Boot


If you are having troubles booting Windows, then you may have to reinstall it with the
Windows recovery disk.

5. The Screen is Frozen


When you computer freezes, you may have no other option than to reboot and risk losing
any unsaved work. Freezes can be a sign of insufficient ram, registry conflicts, corrupt or
missing files, or spyware. Press and hold the power button until the computer turns off,
then restart it and get to work cleaning up the system so that it doesn’t freeze again.

6. Computer is Slow
If your computer is slower than normal, you can often fix the problem simply by cleaning
the hard disk of unwanted files. You can also install a firewall, anti-virus and anti-
spyware tools, and schedule regular registry scans. External hard drives are great storage
solutions for overtaxed CPU’s, and will help your computer run faster.

7. Strange Noises
A lot of noise coming from your computer is generally a sign of either hardware
malfunction or a noisy fan. Hard drives often make noise just before they fail, so you may
want to back up information just in case, and fans are very easy to replace.

8. Slow Internet
To improve your Internet browser performance, you need to clear cookies and Internet
temporary files frequently. In the Windows search bar, type ‘%temp%’ and hit enter to
open the temporary files folder. 9

9. Overheating
If a computer case lacks a sufficient cooling system, then the computer’s
components may start to generate excess heat during operation. To avoid your computer
burning itself out, turn it off and let it rest if it’s getting hot. Additionally, you can check
the fan to make sure it’s working properly.
10. Dropped Internet Connections
Dropped Internet connections can be very frustrating. Often the problem is simple and
may be caused by a bad cable or phone line, which is easy to fix. More serious problems
include viruses, a bad network card or modem, or a problem with the driver.

Common Network Issues & Solutions : Solved


l.Computer Viruses

The Problem: Help! I think I have a virus on my network!


Network viruses can completely disable a computer network, so this is the first issue we’re
going to tackle. There can be a number of causes of computer viruses.
Viruses can come from a wide range of sources, such as e-mail attachments, malicious
software, online advertisements, and yes, even social media.
What are some signs of computer viruses? While remediating an infection on a single
computer can be daunting, removing a virus from an infected network is a real challenge
since it can hide on any computer. So, here’s how you can fix it:
The Solution:

Step 1: Check the severity of the infection by running a complete network scan to find
malicious files or programs. Make sure that your antivirus and antimalware programs are
up to date and able to scan hidden files, the root directory, and all running programs. Also,
try to have your antivirus/anti-malware software scan your e-mail inbox for any malicious
materials.
Step 2: Back up all of your system files using the necessary tools. Running a complete
system backup will ensure that your data isn’t lost and that the network will remain stable.
The Windows’ “System Restore” option will allow you to set up a restoration that can often
be useful in an emergency.

Step 3: Confine all suspicious, irregular files. Isolating them will prevent their exchanging
with other files or your network system. Then, disinfect or
completely wipe all quarantined files. Manually delete any emails that were identified
by your antivirus software.
2. Unable to Connect to the Internet

The Problem: The wireless network shows a signal, but my device won’t connect

Using a wireless network is great for mobility, but can hinder your productivity when it
decides to malfunction. There are a few different reasons why your wireless network is
having connectivity issues, such as the wireless router or the network card itself. This issue
will require a bit of network troubleshooting to find a solution, so let’s get to work:
The Solution:

Step 1: If your router won't connect to the internet, try putting your computer or device
right next to the router. If this causes your equipment to connect, then the system
hardware may have been the issue. If this didn’t fix the problem, proceed to Step 2.
Step 2: Update the network card. Sometimes, your network card will receive a strong
signal, but won’t be able to transmit it quickly and effectively resulting in the need for
network troubleshooting. Updating the driver might solve the problem entirely, but if it
doesn’t, you might need to contact your IT department or provider and consider
replacing the hardware altogether.

3.Duplicated IP Address

The Problem: I got an error message that says that the IP address is already in use.
A small error window just popped up on your screen saying that your IP address is already
in use. How is this even possible and what causes this IP address conflict? Well, there are a
few reasons why this can happen:
• Your system administrator could have assigned two computers on a local area network
(LAN) the same static IP address.
• Your internet service provider accidentally assigned two people the same IP address.
• The network’s Dynamic Host Configuration Protocol (DHCP) server has allowed
the same dynamic address to be assigned to multiple computers automatically.
• Your system administrator has assigned a static IP address to a computer within
the local network’s DHCP range, and the same address is automatically given by
the local DHCP server
These are just a few of the plethora of reasons why IP address conflicts take place.
Here are some ways to fix this issue:
The Solution:

Windows - If you have a dynamic IP address:

Step 1: Click the “Start” button and click “Run”. Enter “cmd” into the text box and click
“OK”. The Windows command prompt will open.
Step 2: Type “ipconfig/renew” into the command prompt and press “Enter”. This will
refresh your dynamic IP address.
Step 3: Check your network connection. Your computer will receive an available IP
address that isn’t already taken.

Windows - if you have a static IP address:

Step 1: Right click “Network Neighborhood” on your desktop. On Windows 7 or Windows


Vista, this will be labeled “Network”. Next, click “Properties”.
Step 2: Rick click onto your network card and click “Properties”. In most cases, your
network card will be labeled “Local area LAN Connection.”
Step 3: Select “TCP/IP” in the list and then, click the “Properties” button under the list of
options. Enter in a new IP address in the opened window. Click “OK” to confirm the
changes you’ve made.
Mac

Step 1: Click on “System Preferences” in your dock. Then, click on “Network”.

Step 2: Select “Wi-Fi” on the left side of the window. Then, click “Advanced”, which is
located on the bottom right.
Step 3: On the next page, select the “TCP/IP” tab and then click “Renew DHCP Lease” on
the right side of the window.
4. Slow Performance

Problem: My applications are responding very slowly.

Why is my computer so slow? Slow-running applications can put a damper on your


productivity in the workplace. One of the most common network issues that business
networks fight with is slow applications. This happens especially when a computer first
turns on or connects to a network. In most cases, this is caused by heavy bandwidth usage.
In other instances, it can be caused by lack of hard drive space, running too many
applications at once, having too many browser tabs open at one time, or even just a dusty
room! The solution for this issue depends on the root of the problem.
Once you’ve gotten rid of some of your browser’s extensions, eliminated applications you
aren’t using, or identified the application that’s eating up all of your processing power, you
should be able to see a huge difference in your computer’s processing speed. (You can do
this by using the Task Manager for Windows or the Activity Monitor for Mac to see which
applications are slowing you down).
If this solution didn’t work for you, here’s what you can do:

The Solution:

Note: Be sure to enforce proper network use by making sure that users aren’t viewing too
much digital content via streaming or continuously downloading large files. Doing so will
help you keep your bandwidth use under control. However, if you find that your employees
are utilizing the network correctly, it might be time to upgrade your network to meet your
business needs.
If you feel that the sluggishness of your applications is due to another issue, proceed to Step
1.
Step 1: Try restarting your PC. Sometimes, a quick reset will fix any and all issues right
away. Doing so will clear your system memory (RAM). If this works, remember to shut
down your PC when it’s not in use. If this doesn’t help, proceed to Step 2.
Step 2: Now, it’s time to check on your hard drive and make sure that it’s not approaching
the end of its lifespan. So, let’s run a hard drive check:
Windows

Right click on “Drive”. Then, click “Properties” and then click “Tools”. Click “Check
Now”. Select “Scan for and attempt recovery of bad sectors”. Doing this will stop your
computer from tapping into any malfunctioning areas of the hard drive.
Mac

Click “Applications” from the “Finder”, then “Utilities”, and then “Disk Utility”. Highlight
the hard drive that’s giving you trouble and then select “First Aid”.
If your hard drive is healthy, but you think it’s becoming too full with data, proceed to Step
3.
Step 3: Get rid of unnecessary files from programs that have gone unused. System backups
and restore points can eat up a lot of space, so don’t hang onto more versions of this
software than you need. You might also consider uploading your data onto the cloud to
save your hard drive.
Step 4: If you’ve completely deep-cleaned your computer and checked all of the possible
issues above, but your computer is still running slowly, it might be time to upgrade your
RAM so that your computer has more memory. Certain programs take more RAM to run
properly than others and if you don’t have enough RAM ready, your computer will not be
able to handle it. Look into RAM upgrade options.
5. IP Address Exhaustion

The Problem: I can’t get an IP address.

So, your network seems to have gone down. Your operating system has sent you an alert
stating that the address was not received from the DHCP server. You’ve just checked the
network adapter status and noticed that there’s actually no IP address to be found. What
now?
There are a few different reasons why this could happen. It could be that the DHCP server
is out of addresses, the device might be set to use a static address rather than a DHCP
address, or maybe the DHCP request from the device never made it to the server. Either
way, here’s what we need to do:
The Solution:

Step 1: Check the network interface card (NIC). You can find this by opening the control
panel, then the device manager. Then, select “Hardware and Sound”
and then select “Device Manager”. Expand the Network Adapters item to view all network
adapters, although you will most likely only have one. Verify that your system is
configured to utilize DHCP.
Step 2: Check the switch to see which virtual LAN (VLAN) the port is set as a member.
Verify that other devices on this particular VLAN are able to get an IP address. If they
can’t, the issue is that the network is not sending DHCP requests to the server.
If this issue is taking place with more than one device, then the issue is likely the server
itself.
6. VPN Errors

The Problem: I got an error message saying that my device was “unable to establish the
VPN connection” or error 800.

Your virtual private network (VPN) works to provide a safe connection between a local
client and a remote server. When you can’t connect to a VPN, you’ll receive an error
message that usually states something along the lines of “VPN error 800 - Unable to
establish the VPN connection”. This can happen if the client device disconnected from the
local network, the network’s firewall is blocking the VPN traffic, or if the name/address
specified for the VPN server was incorrect.
Here’s how you can fix this issue:

The Solution:

Step 1: Check the connection between the client and server. Attempt to connect to the
server from a different client device to verify whether the network issue is a widespread
issue or if it is affecting only one client.
Step 2: Verify that the name entered on the client side matches the server name given by
the VPN administrator. In some instances, users can specify an IP address rather than a
name, while it’s more typical for users to mistype the address than the name. VPN servers
can also change their IP addresses in some instances, especially DHCP networks.
Step 3: If the first two steps didn’t clear up the issue, now it’s time to make sure that the
firewall isn’t blocking your connection with the VPN. Do so by temporarily disabling it to
retry the connection. If this solves the problem, you need to update the firewall settings
specific to the port numbers that the VPN on the network is using to prevent this issue
from happening again.
If none of this troubleshooting solved the issue, it could be possible that the server is
overloaded with clients or that it is offline. Check with your IT department to see what can
be done.
7.Connection Errors and Network Connectivity

The Problem: My network has limited connectivity or no connectivity at all.


Connection issues are some of the most annoying, frustrating network issues of all. These
issues can be a result of all types of glitches and issues within the computer and/or the
network itself. So, if your computer has handed you a lovely “Limited or no connectivity”
error message, here’s what you can do to fix it:
The Solution:

Step 1: Restart your computer. A quick reboot can often be a life-saver. If you’ve already
tried this or restarting the computer didn’t fix anything, proceed to Step 2.
Step 2: Restart your router or modem. DO NOT reset the router or modem or restore its
settings back to factory default. Simply turn the router or modem off and back on. If this
doesn’t work or only works for a moment, keep going to Step 3.
Step 3: If you are connected to your network via Ethernet cable, unplug the cable and then
reattach it. If needed, replace your network cable with a new or different cable to see if this
was the cause of the issue.
Step 4: If you’re connected via Wi-Fi when you see this error, it’s a possibility that the
network adapter is attempting to conserve power. Stop this by finding the Network and
Sharing Center in the Control Panel. Right click “Wi-Fi Connection”, select “Properties”,
click “Configure” and find the “Power Management” tab. Click and uncheck the option
that allows your computer to turn off device to conserve power.
Step 5: If you’ve tried all of this and there’s still no connection, unplug your router and
connect your computer directly to your modem. If this solves the issue, then your router is
likely to be malfunctioning. If not, contact the router manufacturer for support.
If the error remains and the network is still down, reach out to your internet service
provider for help.
SELF-CHECK 4.1-1

A. ENUMERATION: Write the most common computer problems

1. 6.

2. 7.

3. 8.

4. 9.

5. 10

B. List down the Common Network Issues & Solutions : Solved

1. 5.

2. 6.

3. 7.

4.
TASK SHEET 4.1-1

Defects in Computer Systems and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to defects in computer systems and networks ff. standard
operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE Steps /

Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

Steps to Troubleshoot a Network


1. Check the hardware.
2. Use ipconfig.
3. Use ping and tracert.
4. Perform a DNS check.
5. Contact the ISP.
6. Check on virus and malware protection.
7. Review database logs.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-1

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Check the hardware

Use ipconfig

Use ping and tracert

Perform a DNS check

Contact the ISP

Check on virus and malware protection

Review database logs


> LEARNING OUTCOME NO.4

> Rectify/Correct Defects in Computer Systems and Networks

LESSON CONTENT: Troubleshooting and Repair Techniques

ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with standard
procedures.
2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established procedures
4. Unplanned events or conditions are responded to in accordance with established
procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-2
Troubleshooting and Repair Techniques

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Troubleshooting and Repair Techniques

2. Determine the Troubleshooting and Repair Techniques

Troubleshooting is a form of problem solving, often applied to repair failed products or


processes on a machine or a system. It is a logical, systematic search for the source of a
problem in order to solve it, and make the product or process operational again.
Troubleshooting is needed to identify the symptoms. Determining the most likely cause is a
process of elimination—eliminating potential causes of a problem. Finally, troubleshooting
requires confirmation that the solution restores the product or process to its working state.
In general, troubleshooting is the identification or diagnosis of "trouble" in the
management flow of a system caused by a failure of some kind. The problem is initially
described as symptoms of malfunction, and troubleshooting is the process of determining
and remedying the causes of these symptoms.
A system can be described in terms of its expected, desired or intended behavior (usually,
for artificial systems, its purpose). Events or inputs to the system are expected to generate
specific results or outputs. (For example, selecting the "print" option from various
computer applications is intended to result in a hardcopy emerging from some specific
device). Any unexpected or undesirable behavior is a symptom. Troubleshooting is the
process of isolating the specific cause or causes of the symptom. Frequently the symptom is
a failure of the product or process to produce any results. (Nothing was printed, for
example). Corrective action can then be taken to prevent further failures of a similar kind.
Troubleshooting and Repair Techniques

Do you know what to do if your screen goes blank? What if you can't seem to close an
application, or can't hear any sound from your speakers? Whenever you have a problem
with your computer, don't panic! There are many basic troubleshooting techniques you can
use to fix issues like this. In this lesson, we'll show you some simple things to try when
troubleshooting, as well as how to solve common problems you may encounter.

General tips to keep in mind

There are many different things that could cause a problem with your computer. No matter
what's causing the issue, troubleshooting will always be a process of trial and error—in
some cases, you may need to use several different approaches before you can find a
solution; other problems may be easy to fix. We recommend starting by using the following
tips.
• Write down your steps: Once you start troubleshooting, you may want to write down
each step you take. This way, you'll be able to remember exactly what you've done and can
avoid repeating the same mistakes. If you end up asking other people for help, it will be
much easier if they know exactly what you've tried already.
• Take notes about error messages: If your computer gives you an error message, be sure
to write down as much information as possible. You may be able to use this information
later to find out if other people are having the same error.
• Always check the cables: If you're having trouble with a specific piece of computer
hardware, such as your monitor or keyboard, an easy first step is to check all related cables
to make sure they're properly connected.
• Restart the computer: When all else fails, restarting the computer is a good thing to try.
This can solve a lot of basic issues you may experience with your computer.
Using the process of elimination

If you're having an issue with your computer, you may be able to find out what's wrong
using the process of elimination. This means you'll make a list of things that could be
causing the problem and then test them out one by one to eliminate them. Once you've
identified the source of your computer issue, it will be easier to find a solution.

Scenario:

Let's say you're trying to print out invitations for a birthday party, but the printer won't
print. You have some ideas about what could be causing this, so you go through them one
by one to see if you can eliminate any possible causes.

First, you check the printer to see that it's turned on and plugged in to the surge protector.
It is, so that's not the issue. Next, you check to make sure the printer's ink cartridge still has
ink and that there is paper loaded in the paper tray. Things look good in both cases, so you
know the issue has nothing to do with ink or paper.

Now you want to make sure the printer and computer are communicating correctly. If you
recently downloaded an update to your operating system, it
might interfere with the printer. But you know there haven't been any recent updates and
the printer was working yesterday, so you'll have to look elsewhere.

You check the printer's USB cord and find that it's not plugged in. You must have
unplugged it accidentally when you plugged something else into the computer earlier. Once
you plug in the USB cord, the printer starts working again. It looks like this printer issue is
solved!

This is just one example of an issue you might encounter while using a computer. In the rest
of this lesson, we'll talk about other common computer problems and some ways to solve
them.
Simple solutions to common problems

Most of the time, problems can be fixed using simple troubleshooting techniques, like
closing and reopening the program. It's important to try these simple solutions before
resorting to more extreme measures. If the problem still isn't fixed, you can try other
troubleshooting techniques.

1. Problem.: Power button will not start computer


• Solution 1: If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case and the
power outlet.
• Solution 2: If it is plugged into an outlet, make sure it is a working outlet. To
check your outlet, you can plug in another electrical device, such as a lamp.
• Solution 3: If the computer is plugged in to a surge protector, verify that it is
turned on. You may have to reset the surge protector by turning it off and then
back on. You can also plug a lamp or other device into the surge protector to verify
that it's working correctly.

• Solution 4: If you are using a laptop, the battery may not be


charged. Plug the AC adapter into the wall, then try to turn on the laptop. If it
still doesn't start up, you may need to wait a few minutes and try again.
2. Problem.: An application is running slowly
• Solution 1: Close and reopen the application.
• Solution 2: Update the application. To do this, click
the Help menu and look for an option to check for Updates. If you don't find this
option, another idea is to run an online search for application updates.

3. Problem.: An application is frozen

Sometimes an application may become stuck, or frozen. When this happens, you won't
be able to close the window or click any buttons within the application.
• Solution 1: Force quit the application. On a PC, you can press (and hold)
Ctrl+Alt+Delete (the Control, Alt, and Delete keys) on your keyboard to open the Task
Manager. On a Mac, press and hold Command+Option+Esc. You can then select the
unresponsive application and click End task (or Force Quit on a Mac) to close it.
• Solution 2: Restart the computer. If you are unable to force quit an
application, restarting your computer will close all open apps.

4. Problem.: All programs on the computer run slowly


• Solution 1: Run a virus scanner. You may have malware running in the
background that is slowing things down.
• Solution 2: Your computer may be running out of hard drive space. Try deleting
any files or programs you don't need.
• Solution 3: If you're using a PC, you can run Disk Defragmenter.
To learn more about Disk Defragmenter, check out our lesson on
Protecting Your Computer.

5. Problem.: The computer is frozen

Sometimes your computer may become completely unresponsive, or frozen. When this
happens, you won't be able to click anywhere on the screen, open or close applications, or
access shut-down options.
• Solution 1 (Windows only): Restart Windows Explorer. To do this, press and hold
Ctrl+Alt+Delete on your keyboard to open
the Task Manager. Next, locate and select Windows Explorer from the
Processes tab and click Restart. You may need to click More Details at the
bottom of the window to see the Processes tab.

• Solution 2 (Mac only): Restart Finder. To do this, press and


hold Command+Option+Esc on your keyboard to open the Force Quit
Applications dialog box. Next, locate and select Finder, then click Relaunch.
• Solution 3: Press and hold the Power button. The Power button is usually
located on the front or side of the computer, typically indicated by the power
symbol. Press and hold the Power button for 5 to 10 seconds to force the
computer to shut down.
• Solution 4: If the computer still won't shut down, you can unplug the power
cable from the electrical outlet. If you're using a laptop, you may be able to
remove the battery to force the computer to turn off. Note: This solution
should be your last resort after trying the other suggestions above.

6. Problem.: The mouse or keyboard has stopped working


• Solution 1: If you're using a wired mouse or keyboard, make sure it's correctly
plugged into the computer.
• Solution 2: If you're using a wireless mouse or keyboard, make sure it's turned
on and that its batteries are charged.

7. Problem.: The sound isn't working


• Solution 1: Check the volume level. Click the audio button in the top-right or
bottom-right corner of the screen to make sure the sound is turned on and that the
volume is up.
• Solution 2: Check the audio player controls. Many audio and video players will
have their own separate audio controls. Make sure the sound is turned on and that
the volume is turned up in the player.
• Solution 3: Check the cables. Make sure external speakers are plugged in,
turned on, and connected to the correct audio port or a USB port. If your
computer has color-coded ports, the audio output port will usually be
green.
• Solution 4: Connect headphones to the computer to find out if you can hear
sound through the headphones.

8. Problem.: The screen is blank


• Solution 1: The computer may be in Sleep mode. Click the mouse or press any
key on the keyboard to wake it.
• Solution 2: Make sure the monitor is plugged in and turned on.
• Solution 3: Make sure the computer is plugged in and turned on.
• Solution 4: If you're using a desktop, make sure the monitor cable is properly
connected to the computer tower and the monitor.

Solving more difficult problems

If you still haven't found a solution to your problem, you may need to ask someone else
for help. As an easy starting point, we'd recommend searching the Web. It's possible that
other users have had similar problems, and solutions to these problems are often posted
online. Also, if you have a friend or family member who knows a lot about computers,
they may be able to help you.

Keep in mind that most computer problems have simple solutions, although it may take
some time to find them. For difficult problems, a more drastic solution may be required,
like reformatting your hard drive or reinstalling your
operating system. If you think you might need a solution like this, we recommend
consulting a professional first. If you're not a computer expert, it's possible that
attempting these solutions could make the situation worse.

SELF-CHECK 4.1-2

A. ENUMERATION: Write the general tips to keep in mind of the


troubleshooting and repair techniques

1.

2.

3.

4.

B.ESSAY: List down the simple solutions to common problems of the


troubleshooting and repair techniques and solution it 5

1.

2. 6.
3. 7.

4. 8.
TASK SHEET 4.1-2

Troubleshooting and Repair Techniques

Performance Objective: given necessary tools,equipment and

materials, you should be able to troubleshooting and repair

techniques ff. standard operating procedures within 4 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE Steps /

Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

Fixing your own computer

1. Run a thorough virus scan

2. Update your software

3. Cut down on the bloat

4. Test your Wi-Fi connection

5. Reinstall the operating system

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-2

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Run a thorough virus scan

Update your software

Cut down on the bloat

Test your Wi-Fi connection

Reinstall the operating system


> LEARNING OUTCOME NO.4

> Rectify/Correct Defects in Computer Systems and Networks

LESSON CONTENT: Problem Solving in Emergency Situation

ASSESSMENT CRITERIA:
1. Appropriate personal protective equipment is used in line with standard
procedures.
2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established procedures
4. Unplanned events or conditions are responded to in accordance with established
procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-3

Problem Solving in Emergency Situation

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Problem Solving in Emergency Situation

2. Determine the Problem Solving in Emergency Situation

Common Computer Emergencies And How To Fix Them

There is no doubt that smartphone technology is quickly catching up with computers.


There are many smartphone and tablet manufacturers that now try to match the
functions that you would be able to utilize when using a computer - whether a desktop or
a laptop computer. Still, there are some things that only a computer can do - or perhaps
a computer continues to do better compared to a smartphone.
Unfortunately, computers are not perfect. There are many problems that you may run
into when you constantly rely on a computer or laptop. Some problems are not major
and may simply require a restart of the device. On the other hand, there are also a few
computer-related problems that can be more serious.
No doubt, there is our emergency number that you can call in the middle of the night
which runs 24 hours a day and 7 days a week 1300723628 if you run into computer
troubles. The good news is, many computer problems can be diagnosed and treated
without the need for a professional right away. Many of these issues can be fixed by
yourself - but knowing when a pro is needed should be important too.

1.The Accidental Deletion Of An Important File


We will start with one of the most common problems that people tend to face -one that
often happens accidentally. That moment you realize you have accidentally deleted a file
on your computer that may be important.
When it comes to the deletion of an important file -
note that an important file can mean one of two things:
1. You may have deleted a file that is personally important to you. In such a case, this
may be a video, photograph, or perhaps a document that you need.
2. In other cases, you may have deleted a file that helps your operating system run
properly.
Both cases can be quite disastrous.
The first step would be to see if the file might have been added to the recycling bin. Head
over to your recycling bin and see if the file is present there.
If the file is not in your recycling bin, you should consider using a software application to
help you recover those files. If the file is not there our data recovery experts can assist you
in recovering the files we can assist over the phone and internet or attend to you in person
at your home or office.

2. Water Or Liquid Damage


Drinking a cup of coffee while checking your emails early in the morning is surely a
convenience. Unfortunately, when that cup of coffee tips over and covers your laptop - this
could put you in quite a panic. Liquid damage is very common.
If you have a desktop computer, you can simply plug the keyboard or mouse out,
depending on where the liquid spilled. Wait for the peripheral to dry and plug it back in.
Unfortunately, you may not be as lucky if you have a laptop. The first step to preventing
serious damage when you spill something on your laptop is to switch it off as fast as you
possibly can. Hold down the power button for a while until all the lights on the laptop are
off.
Remove the battery from the laptop if possible. Turn the laptop upside down -with the
keyboard and screen facing a downward position. Make sure your laptop is opened up
when you put it down this way.
Get a lint-free cloth and wipe your laptop off. Try to use the cloth to absorb as much of the
liquid as possible.
You should now allow adequate time to pass before you decide to turn the laptop on again.
You need to make sure that the liquid has effectively drained from the laptop. Turning on
your computer before all liquid has escaped can cause a short circuit - which may lead to
permanent hardware damage. We have a dedicated team specially dedicated to rescuing
your computer liquid damage. We can assist in recovering your important files and get
you up and running with a new computer and also can get your liquid damaged laptop
running like new again.
3. Internet NBN Access Failed
Another common problem that you may run into with either a desktop computer or a
laptop would be an internet connection that fails, runs slow or drops out intermittently.
The first step is obvious - check the router. This is often where the issue lies when your
internet simply won’t open up web pages. See that all lights on your router light up. Make
sure that you are connected to the router on your laptop or desktop computer.
If you have a wireless connection, then switch the Wi-Fi off on your computer and restart
the modem. Reconnect and see if the problem resolves.
If this does not help, open up the network settings for the internet connection on your
computer. Look for a “status” tab. If there is a problem noted with your internet
connection on this tab, then the problem may lie with your internet service provider. If no
problem is detected here, launch the troubleshoot tool on your operating system and follow
the appropriate prompts.
If these steps fail, connect the router directly to your computer with an RJ45 network cable.
If the internet problem still persists, it might be a good idea to contact your internet service
provider for troubleshooting. If that doesn’t get you a resolution your local pc doctor
technician can come out and diagnose the root cause of the problem and also help liaise
with your internet service provider if needed. We can also advise you on the latest and
greatest NBN modem routers on the market that will specifically suit your requirements. 4

4. Infected With A Virus


Millions of computers are infected with viruses every year. When your computer is
infected with a virus, it could put your personal and confidential data at risk. You
are also facing other issues that may interfere with your ability to effectively use
your computer - such as a computer that becomes simply too slow to use.
Prevention is a key factor when it comes to viruses. You should always have an
antivirus program installed on your computer to protect you against virus attacks.
Some software can also help to fight off malware and spyware. This adds more
protection for your computer and the data on your laptop that is confidential.
Sometimes, however, virus attacks still happen. In these cases, you need to take
action.
Downloading an effective virus scanning software is a useful step to take. Even if
your computer is slow at the moment, try to be patient. Download the software and
run it on the affected computer. In some cases, the program will be able to detect
and remove the virus. A restart after this procedure may help to solve the issue. If
this doesn’t help, we have our remote support team that
can dial into your computer anywhere in Australia and remove the virus and also tune up
your machine to have it running like new again.

5. Device Doesn’t Work Suddenly


We all use devices connected to our computers. Think about the peripherals you use, for
example. You rely on a mouse to move the cursor on the screen. Sometimes you may prefer
a touchpad instead. You rely on the keyboard to type. Some people connect their computers
to a printer - this is a convenient way of printing photographs and documents.
There are cases where these devices just suddenly stop working. Perhaps you are trying to
print an important document, and your computer simply fails to send the print command to
the printer.
In these cases, there is a good chance that the problem may lie with the drivers of these
devices. Drivers can become problematic in some cases - sometimes, the driver would be
deleted accidentally, or maybe the driver was updated, and the update no longer supports
the specific hardware you use. Two drivers may also clash.
First of all, visit the device manager on your computer. See if any devices have a yellow
exclamation mark next to them. If this is the case, then the driver has a problem. Right-
click on the device and choose the “uninstall” option. Once the driver has been uninstalled,
remove the device from your computer and restart your laptop.
After restarting, reconnect the device to your computer. The driver will be reinstalled. See if
this solves the issue. If you still run into the same problem, however, consider plugging the
device into a different USB port. You should also consider looking for updated drivers for
that particular device (including its model) on Google. Sometimes, manually installing the
device driver can help to solve the issue. Once again our remote support technicians can
assist you should neither of the tips above work. 6

6. Laptop Screen Won’t Come On


When a laptop’s screen doesn’t turn on, it can mean quite a few things. The screen
might be broken. The fault may also lie with the RAM, CPU processor, the
graphics processor, or another part of the laptop.
Diagnosing the problem definitely starts by plugging the laptop into an external
monitor. This can be the monitor you use with your desktop computer. You can
also connect an HDMI cable to the laptop and hook it up to your television. If you
are able to see your laptop working on the external monitor, then there is likely a
fault with your laptop’s built-in display. You can easily continue using the laptop
with the external monitor - it will be similar to using a desktop computer, after all.
If the laptop doesn’t display anything on the external monitor, however, then you are likely
facing a hardware problem. Once again we have a dedicated team that can assist with this,
that specializes with what we call chip level repairs to call our office and they can explain
pricing and how it all works.

7. Computer Takes Ages To Load


There are a few reasons why a computer may suddenly become slow. As we did mention
previously, sometimes a virus infects a computer. This can cause the computer to work
slower than it usually does. Downloading a virus scanner is a good way of determining if
this might be the cause.
Another thing that you should do is take a look at the startup services, as well as the
currently active programs on your computer.
Open up the task manager of your computer. Now, navigate to the “Startup Tab” to see
what programs will start when your operating system loads. If you find anything on the list
that you do not rely on every time you use your computer, turn it off.
Also, consider looking at the “processes” tab. This tab tells you what programs and
applications are running at the moment. See if there are any processes you do not use - turn
these off and see if it resolves the problem.
When Should You Call A Professional?
We considered some of the most common problems that you may run into when you use a
computer on a regular basis. These problems are experienced on a daily basis by millions of
people.
What many do not realize is that quite a large number of these common computer problems
can be effectively solved by themselves. When you do not realize that you are capable of
solving some of these problems, you may end up paying hundreds of dollars to get a
professional out.
At the same time, you should take note that there are cases where calling a professional may
be a better option. This is generally the case when you run into a problem caused by
hardware-related issues. When your computer runs into a hardware problem, then you will
likely need a computer specialist to take a closer look at the device. A replacement or repair
will generally be needed to ensure you can continue using your computer without the
current issue getting in your way.
Some signs of hardware problems that may require a professional include:
• When the computer is performing slowly due to an old processor, then steps taken to
improve the performance at a software level may not yield effective results. The same goes
for inadequate RAM on your computer.
• There are some cases where a computer is failing to recognize USB devices have a faulty
port, instead of the issue being linked to a driver issue.
• When all applications on a computer fail to start or work correctly.
• The feared Blue Screen of Death is sometimes also linked to hardware-related problems.
• Exceptional delays when trying to read the information contained in files.
• When the computer continuously shuts off suddenly without any warning or
notifications. This may happen a few minutes after the computer has been running. In some
cases, the computer will shut down while it is still booting up.
• When there are unusual noises that come from the computer, then it will often be a sign
of a hardware problem too.
Conclusion
There are a few problems that many people tend to run into while they are using a
computer. Whether you rely on a desktop computer or a laptop, there are several potential
issues that you may run into. Understanding what has happened to your computer and
what actions to take is important. At the same time, you should know when your local pc
doctor technician will be needed.

Problem Solving in Emergency Situation

Information Technology Consulting


We are your local IT Consulting / Computer Consulting experts who can assist in all
aspects of software implementation, as well as repairing your network and server, whether
they run on Windows or Linux. Like most small business, you may not have the luxury of
having your own Information Technology department to take on new projects or tackle
complex challenges. You may be just barely hanging on to what you currently have and
praying that your systems do not break down. We are here to come in with our knowledge,
expertise, and experience to do the job of the Information Technology Department you
wish you had.
IT Consulting

911 Emergency Service


We understand that downtime is expensive to your business and disruptive to your
operation. Give us a call so that we may get started right away and evaluate what is
needed to get you back up and running. We have the technical skills and experience to
think on our feet and decide what resources we can pull together in order to get you
operational as quickly as possible.

Emergency IT Service
Help Desk Technical Support
In the ever changing world of technology, users are expected to be more and more self
sufficient in adapting to and using new technology. The problem is that your business may
rely on employees who are more creative in nature or managerial and technology does not
come naturally to them. A question or technical issue can stop a user's productivity and
lead to frustration, unless they have somewhere to turn for assistance from Help Desk
Technical Support and Problem Solving. In larger corporations, this is called the Help
Desk, where an entry-level IT person would answer questions and solve problems on
technical issues. Unfortunately it is rare, especially for a small or medium sized business, to
have their own Help Desk. We can fill this void by serving the role of Help Desk Technical
Support and provide assistance with problem solving.
Help Desk Tech Support

Your computer network is the most used, most relied upon, most critical
asset for running your business.....but it is probably the least appreciated.
There are two types of computer networks in business today. Those that were designed and
installed well by competent professionals, and those that were not. Most likely your
network falls into the second category because you are looking for help and reading this!
Most networks that we encounter are a product of evolution. When you first set up a
network, it was a simple matter of running some wire around from computer to computer
until the lights started blinking. You either installed your first network yourself, or gave a
deserving kid an opportunity to earn some money and gain experience while on summer
vacation. Maybe it was your own kid or relative and nobody wants to criticize their work. It
all seemed simple enough, but then you started adding more computers and eventually a
server to share files. You added Internet and maybe some multi-user software, printers,
and other devices. At some point, you added a wireless router so that your employees could
use their laptops, smartphones, and tablets. Somehow it all magically worked,,,, until it
didn't! This was all great until things started slowing down. Strange error messages started
appearing on your screens, and some computers could not get reliably connected. Data got
corrupted and you started having some real problems. You can see from the variety of
types and colors of network cable lying around that different people have come through
and expanded or repaired your network, spendng no more than what it takes to get by. You
lost track of what goes where and what is actually being used. Employees come and go and
nobody today really knows exactly what you have or understands how it all works, nor do
they care. Eventually something breaks and you find out that the company, or individual
who installed your network is out of business, or grew up and moved on. Now you have a
mess and you want someone to come in and straighten it all out. Yes, we have seen it all
before. It is time for a new network, this time professionally installed!
Networking

Problems in your computing environment can drag down your entire business.
Your business relies heavily on technology. Technical problem solving is key to keeping
your business running smoothly. When there is a technical problem with your network
hardware, server, or software, it can effect employee morale, as well as productivity and
ultimately profitability. Are your employees complaining about the technology they use?
How many times do you have to stop and think about issues with your network server,
software or computer hardware? Are your computing resources being abused or used for
personal entertainment rather than business use? Have you had to shut your business
down, cancel appointments, or change your plans because of technical problems or
limitations? Do you have an employee that you cannot fire or are afraid will quit because
they are the only ones with the knowledge to keep your systems running? These are not the
type of problems that some technology whiz kid can solve. You need a team of trustworthy,
experienced business IT Consultants, who can be the problem solver to help make
management decisions and implement a solution. We will be happy to meet with you,
privately if necessary, and see what we can do to help solve your technology problems.
Problem Solving

Specializing in Business and Medical Computing


For over 30 years, CMI has been installing, upgrading, and maintaining business computer
systems all over Indianapolis and central Indiana. We enjoy working with small and
medium sized businesses and medical practices, helping them grow, and run smoothly. We
help you take the advantage with the best of available technology. Our customers include
Medical and Dental Practices, Retail Stores, and just about everything else from
Accounting to Manufacturing. Installing successful systems and establishing long
relationships with our customers, by maintaining those systems, is what we do best.
Home

There are times when you need to call in Experienced Technical Problem Solvers
Our extensive experience is our biggest asset. We take the time to listen to users, analyze
customer's needs, and recommend solutions that work. Whenever we install something,
we make sure we do the job right, according to well established industry standards and
best practices. We will
only use the best available computer hardware and software that will assure success. We
are used to solving problems that nobody else can.
With experience in the field, implementing and maintaining mission critical computer
systems, networking, and servers, we are in a position to recommend solutions that we have
used before. There is "No need to recreate the wheel" every time you need a solution. We
use our experience to your advantage. While we know what works and what to recommend,
we also will keep you from making the mistake of investing in a system that does not meet
your needs.
Home

Problem Solving

CMI can serve as your your Outsourced IT Department.


As a result of downsizing, cost reduction, or employee turnover, you may no longer have
anyone around to take care of your computer systems. Our services cost a lot less than
employing a full time IT person. We pride ourselves in saving our customers much more
money than our services cost. We help you make the right decisions on how to invest
your IT Budget wisely in order to keep your computing environment running smoothly.
We help you keep up with the ever changing technology, IT modernization and
computing demands, while at the same time recommending practical, cost effective
solutions. Give us a call. Tell us what you are trying to accomplish.
Home

IT Consulting

Training is a great opportunity to receive user feedback.


Successful computer system administrators address the concerns of users. Users have a
unique perspective that can only come from real life experience using the system everyday.
They will be the first to notice problems or come up with ideas to make the system better.
They care about their jobs. They will let you know what should be done to make their job
easier, more efficient, and help them meet expectations. Users ideas and suggestions need to
be fully appreciated and used to make improvements.
User Training

Some emergencies can be solved remotely.


Sometimes, what may seem like a big problem can be solved either over the telephone,
or, if you have Internet available, through a remote connection. Unless there is a
physical problem, involving smoke, or fried
electronics that require replacement, we can solve most problems remotely, either by
doing some simple troubleshooting over the phone, or using a remote access solution like
terminal services, or remotely controlling a workstation.
Problem Solving

Emergency IT Service

Companies need someone who is familiar with their entire computing


environment. Computer systems need Administration.
We provide guidance to help navigate your business through a sea of technology. We can
perform a management, decision making role as a member of your team.
Decisions need to be made, and right or wrong decisions can make or break a business.
Without consistant administration, your computer system will be adrift and eventually
show the signs of neglect. Your system needs someone to keep a watchful eye on changing
technology and innovations in Windows, Linux, network security issues, as well as all the
hardware and software in use. Someone needs to make practical recommendations on how
to utilize new technology to your best advantage. Someone needs to be looking down the
road at emerging technology and the future of your company.
Many companies no longer have the luxury of their own IT Departments to, or even
dedicated, qualified, IT Personnel as a result of downsizing or recent economic hardship.
Your computing environment is unique and it is wasteful to have different technicians
come in from time to time and try to fix or maintain a system they are not familiar with. By
performing regular maintenance and IT Technical support, we build a level of familiarity
that will allow us to diagnose problems and implement solutions much more quickly, thus
saving you a lot of money over time.
Maintenance Plans

Help Desk Remote Telephone Technical support is a service we provide


for our customers who are on a maintenance program.
We only provide technical support to customers with whom we have an ongoing
relationship or who are willing to pay for our srvice. We see Technical Support as a value
that we add to our overall IT Consulting Services and will allow for a certain amount of
Technical Support to be included in our Systems Maintenance Plans. We can not provide
free technical support to random callers looking to leach information from us. We receive
calls from desperate people who find us on the Internet every day and we are willing to help
if they are willing to pay our $150/hour base fee and our priorities allow for it.
Help Desk Tech Support

There is no such thing as a dumb question.


We treat users with the respect they deserve. We understand that users have other things to
do besides keep up with the latest technology and they are not interested in what makes
their computers work. We try to provide assistance and explain answers thoroughly. When
possible we try to go a step beyond answering the question to make sure the user becomes a
little more technically proficient from the experience. There will always be people who are
"Technically Challenged," but by using our skills and patience, we try our best to be
helpful. It is the end users, after all, who we depend on to make a computer system
successful.
Help Desk Tech Support

The tools we use to provide help have advanced greatly.


It is rare, these days, that we need to travel to your location in order to provide technical
support. With just a few keystrokes, you can allow us to access your computer and provide
remote support so that we may see and control your computer as if we were sitting next to
you. This eliminates most of the challenge of a user trying to describe a problem sufficiently
for a technician to understand what is going on and find the solution. Questions can be
answered quickly over the telephone and maintenance or repairs can be performed on your
computer software remotely using a Remote Support program. We also have the ability to
access and monitor servers and routers remotely so being on-site may not be required.
Help Desk Tech Support

Your technology problem may not be all that unique.


Chances are other companies we work with have been through a problem similar to yours
and we already know the solution. This is where our experience comes in handy. Many
companies face similar problems in growth, changing technology, data recovery, or disaster
management. We have the battle scars that come from solving a lot of problems over many
years and we have yet to see a challenge we can not meet.

We keep ourselves up to date on all the latest security patches, varnings, and various bugs
that are known problems. We know how to track down error codes and search for
solutions based on other peoples experiences with the same problem. There is often no
need to invent a solution. By keeping up and reading about problems, vulnerabilities and
their solutions, we can often prevent a problem on your system before it ever happens.
Problem Solving

Users need to know that they are supported.


The most frustrating thing for a user is not having someone to go to when they have a
question or concern. Leaving users to figure out a system on their own, or handing them a
stack of manuals is not the right approach. Proper training and ongoing support will lead
to a comfort level that will assure success. Users need to know that they are not alone, that
help is available, and they should know where to go and be encouraged to seek that help.
Sometimes we need to come in and assist in working with the technical support services of
your software vendor. By allowing us, your technical people, to work with their technical
people, we can work together to find a solution that we can bring back and implement in a
non technical way. In other words, we can fight the technical support challenges for you.

Help Desk Tech Support

Software Implementation

User Training

We know how to deal with Security Related Emergencies.


Has your system been hacked? Is your Internet connection under attack? Are your
computers infected with a fast spreading virus? Has someone taken over your server? Do
you need your system secured after an employee change? These are all issues that we have
dealt with in the past and know how to get under control. We have the tools and experience
necessary to figure out what is going on and find a solution. We will repair the damages,
find the source of the problem, and implement preventions to secure your systems.
Problem Solving

Emergency IT Service

We are not afraid to ruffle feathers in order to bring about positive change.
Some of the most difficult problems may be caused by your own employees. Users
generally do not like and are resistant to change or restrictions. End users may be too
used to having the freedom to do anything they want with company computers, regardless
of the problems they may cause. Many viruses and security problems are a result of
employees using their work computers the same way the do their personal computers at
home. Acceptable Use Policies need to be developed, implemented, and enforced with
backing from top levels of management. We can help by installing tools to keep your
employees and their computer use under control. We are not interested in corporate
drama, politics, or winning popularity contests. We are here to solve problems.
Problem Solving

The technology we deal with is not just limited to computers and networks.
We understand how to integrate different technoloies so that they work together. We are
versitle enough to work with practically any technology and interface multiple technologies
together for an overall solution.
Any kind of technology can be intimidating. We are also capable and have experience
installing medical equipment, phone systems, security systems, cash register point of sale
systems, and sometimes become involved in the technical design of customer products. We
can work with your vendors and their technical specifications to make sure their products
will interface with your computing environment and make any adjustments necessary.
We are used to reading manuals, working with technical specifications, and applying
technology to any type of business application. Bring us in and let us look at what you are
trying to accomplish. We can help with the research and evaluation of the next piece of
equipment you are wanting to buy. We may know of another customer who is facing the
same challenge or using the same technology.
IT Consulting

Problem Solving

IT System Modernization

We are not afraid to take on new technology.


All technology starts out as new technology. Every project and solution is unique. We are
not afraid to try something that nobody has done before in order to give your business a
competitive edge. We are constantly absorbing new technology as technology itself evolves
with time. There are several companies around Indianapolis where we installed their first
personal computers. We installed the first PC Network in Indianapolis. We were pioneers
when the Internet first started by setting up one of the first Internet Service Providers in
the area. Doctor and Dentist offices are constantly having us integrate new medical
equipment with their practice management software and servers. Just because something
has not been done before, does not mean that it can't be done and we can't do it. We are
also available to help you
evaluate new technology to see if it is necessary and will actually improve your business.
We can help in the decision and evaluational process to help decide which new technology
to take on.
IT Consulting

IT System Modernization

Once the problem is identified, we can quickly get the resources you need.
We consider all the resources available to us whether it be placing a temporary server,
offloading services to our own network, or knowing where to quickly obtain a critical
replacement part. We do whatever it takes to get you operational as quickly as possible. An
example of this is a customer who runs QuickBooks Enterprise on their server that
crashed. In order to buy time to build a new server, we installed their QuickBooks on one
of our servers for the customer to access remotely. Once the new server is up and running,
the QuickBooks and Data were transferred to the new or repaired server.
We have loaner Servers, Switches, Routers, Hard Drives, and pretty much anything else to
get your system back up and running so your business will not suffer.
Emergency IT Service

Many companies have downsized and no longer have their own IT


Technical Support staff to go to help.
Unfortunately, many companies do not realize until. after they have let their IT People go,
how critical they actually were. We do not advocate downsizing IT Staff, but we are
available to fill in the void that they leave behind. Help Desk Technical Support is critical to
the ongoing operation of your business. We can provide Help Desk Technical Support so
that your employees have someone to turn to for help their occasional questions and
technical problem solving needs.
IT Consulting

Problem Solving

Help Desk Tech Support


We have the skills and tools to find and correct problems on your network.
We have the ability to perform a full analysis of your network and find out what is going
on. We can find and correct connection problems due to bad cable, connectors, or electrical
interfearance. We analyze your network traffic to abnormalities, traffic restrictions, or
signs of virus activity. We make sure your network is secure from attackers and hackers
and that your corporate and customer data is protected. We often implement QOS or
Quality of Service Policies to make sure that your Internet connection is shared in a way
that nobody can hog all the Internet bandwidth. We monitor your network remotely and
are alerted whenever a problem arises.
Problem Solving

Networking

We are accustomed to dealing with the unknown.


The solutions to many problems are yet to be invented. You may be on the "bleeding edge"
of technology with new equipment or software that still needs some bugs worked out. We
often work directly with companies like Dell, Microsoft, and Intuit in order to bring a
problem to their attention and work on a solution as a team.
Problem Solving

Priority Service goes to our existing customers on Maintenance Programs.


This is one big advantage of being on a Maintenance Program with us. Not only do we
provide you with Priority Service, but we would also be familiar with your overall
computing environment. This is like a firefighter being familiar with a building before
fighting a fire there. If you are not one of our regular customers, give us a call anyway. We
charge on an hourly basis at the rate of $150/hour with a minimum of three hours per
incident.
Help Desk Tech Support

Maintenance Plans

Emergency IT Service

Once a server is set up and installed on your network, it must be secured.


Server Security, especially for servers accessible through the Internet must have the proper
security to keep them from getting hacked. We take server security very seriously because
we realize just how dangerous the world is. It is a given fact that there will be attempts to
hack into your server every hour of every day. This is just the nature of the Internet and a
properly setup and
secure server will be prepared and protected from such attacks. We utilize firewall
security, user and file security, as well as intrusion detection to keep your servers secure.
Servers, and the software they run, must be constantly maintained and updated to
protect against the latest security threat. Server Security is something that should be set
up and maintained by competent professionals like us. We can set up your server and
monitor and maintain it remotely keeping an ever watchful eye for problems.
Windows & Linux Servers

There is a silver lining in every cloud.


Emergencies are unfortunate, but usually our customers are better off once the problem is
solved. You may wind up with a better system than you had before. You may learn and
take corrective actions that will make your system more reliable. When we fix something,
we fix it right and leave our customers in better shape as a result of the experience.
Emergency IT Service

Give us a call so we may meet and discuss your unique situation and Help
Desk Technical Support Needs.
We can come up with a Technical Support plan that works for you and is within your
budget. We will start supporting your users right away to take care of their immediate
needs and get an idea of what is required to provide ongoing support.
Help Desk Tech Support
Maintenance Plans

Give us a call so we may meet and discuss your networking needs. We are
professionals who understand what it takes to build and maintain reliable networks.
We have experience building and maintaining reliable networks. We understand that
nothing is more critical to the operation of your business so we do not compromise on
quality. When we are finished, you can concentrate on running your business rather than
fighting computer and network problems.

Networking
Give us a call so we may meet and discuss your problem and help find a solution.
We have a lot of experience and resources that we can utilize to solve your problem. We
will work with you as a part of your management team with the common goal of solving
the problem. We have turned many problems into solutions and turned bad situations
around. We are often the Big Guns that come in and solve problems where others have
failed because we are experienced and know how to solve problems.
Problem Solving

Give us a call so we may meet and discuss your needs. We will give you a
fast and honest answer whether or not we can help.
We do not pretend to do anything and everything. The things we know best are computers
and computer networking. Chances are that your problem is not all that unique and we
have worked on something similar before. Most of the time our the solutions we
recommend are based on real life experiences or things we know we can handle. Just as
importantly, we are also honest enough to let you know our limitations and avoid the
disaster of taking on something we are not ready to handle.
SELF-CHECK 4.1-3
A. ENUMERATION: Write the common computer emergencies and how To fix them.

1.

2.

3.

4.

5.

6.

7.

B. List down the in problem solving in emergency situation atleast gives

1-10.
TASK SHEET 4.1-3

Problem Solving in Emergency Situation

Performance Objective: given necessary tools,equipment and

materials, you should be able to problem solving in emergency

situation ff. standard operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2 computer

systems unit,table, printer scanner,PPE Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below Four Main Problem Solving Steps
1. Understand the Problem. Solving the right problem is the most important part of
problem solving.
2. Design a Solution. Formulate an algorithm to solve your problem.
3. Implement your Solution. Write the code to solve your problem.
4. Check your Solution.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-3

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Understand the Problem. Solving the right problem is the most important part of
problem solving
Design a Solution. Formulate an algorithm to solve your problem

Implement your Solution. Write the code to solve your problem

Check your Solution


> LEARNING OUTCOME NO.4

> Rectify/Correct Defects in Computer Systems and Networks

LESSON CONTENT: Corrective Action Hardware

Configuration Software Configuration

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Defective components or parts are replaced or corrected without damage to the
surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-4

Corrective Action
• Hardware Configuration

• Software Configuration

LEARNING OBJECTIVES:

After reading of this Information Sheet, you

should be able to:


1. Identify the corrective action

2. Determine the corrective action


What Is Corrective Action?

Corrective action is an aspect of quality management that aims to rectify a task, process,
product, or even a person’s behavior when any of these factors produce errors or have
deviated from an intended plan. Corrective actions can be thought of as improvements to
an organization to eliminate undesirable effects. Corrective actions can apply to an entire
project when the deliverables, whether tangible or service, deviate from the required
output. In HR for higher education institutions in particular, corrective action also applies
to individual employees and functions to communicate to the individual what aspects of
attendance, unacceptable behavior, or performance require improvement

Hardware Configuration

What does Hardware Configuration mean?


Hardware configuration references the details and system resource settings allotted for a
specific device. Many computer specialists improve hardware performance by adjusting
configurations, which may also include settings for the motherboard and the BIOS, as
well as the bus speeds.
With newer technology, most computers have plug-and-play (PnP) allowing the OS to
detect and configure external and internal peripherals, as well as most adaptors. PnP has
the ability to locate and configure hardware components without needing to reset jumpers
and dual in-line package (DIP) switches.
Techopedia explains Hardware Configuration
Each device has a hardware configuration setting, which may include the following:
• Interrupt Request (IRQ) Lines: These are hardware interrupt lines, which signal the
CPU when a peripheral event has stopped or started.
• Direct Memory Access (DMA) Channels: This is a method for transferring data from
the main memory to a device without going through the CPU.
• Input/Output Port: This connects the input and output devices to the computer. There
is a memory address for each port.
• Memory Address: There is a unique identifier used for each memory location. The
memory address is typically a binary number, which is numbered sequentially.
All hardware devices have configuration settings that can affect performance and system
function. Hardware configuration information may include:
• Available memory
• Power management features
• Devices that are connected such as modems, disc drives and serial ports
During power-on-self-test (POST), basic input/output system (BIOS) searches system
configurations to determine what devices are present and how they interface with the CPU.
After POST, when the computer and system configurations are found, the CPU uses the
information to process instructions and data. Configuration information is stored in
several ways using DIP switches, jumpers and complementary metal oxide semiconductors
(CMOS).
Today most peripheral devices use PnP, which will auto-configure the DMA, IRQ and I/O
address. Older systems that do not have PnP require a new device to be set by using
jumpers or DIP switches.
Hardware Configuration For Different Types Of Computers - You can build your own
computer in the way you want and with the accessories you desire. Different brands and
various types of hardware components flood the market. So, choosing the correct
components for the computer is an important task and it will save you the money.
First decide on for what purpose you are buying the computer and fix the budget you have
to spend for it. Then choose the hardware components carefully according to your needs.
This article briefs the hardware configuration needed for different types of computers.

Hardware Configuration For Different Types Of Computers

1. Office computers
The office computers need common or cheap configuration. A dual core processor with
2 GHz speed and 2 GB RAM will do well for this type of computers. A 19’’ monitor of
LCD type may be enough.
The graphics card that comes with the motherboard alone is enough, so no need for
separate graphics card. A 500 GB HDD can be affordable since the prices of hard disk
drives are going down.
Read Too: Parts Of a Motherboard

2. Multimedia/graphics computer

More importance should be given to the graphics card in this type of computer since they
have to work with high quality graphics. Get a graphics card from a branded company
and of high quality. There should be PCI-E slots in addition to PCI slots.
The size of RAM also should be quite big. Something in the range of 4 to 6 GB is okay.
Considering the processor as triple or quad processor is good for this type of computers.
3. Gaming computer

This type of computer should be more rigid and tough since they have to come across all the
bumps and pats of the frustrated user who loses the game. Definitely a HD LCD monitor of
at least 21’’ should be provided for more attraction towards games.
Dual core processors are enough but dual processors could be advantageous for several
games. Motherboard with PCI-E slots, a graphic card which provides at least 30 frames per
second, a good cabinet with airflow, quality speakers, multimedia keyboard and a durable
mouse are other important things for a gaming PC. RAM size of 4 GB will be perfect for
this type of computer.
Read Too: Upgrading Your Computer Memory

These three are the most different types of computers we come across. You might wonder
why there is no information on personal home computer. But the fact is, it is good enough
to buy computers which are sold with pre-assembled configuration for home use, according
to your financial plans.
Software Configuration Management?

Software configuration management


is referred to as source control, change
management, and version control.
Software configuration management systems
are commonly used in software development
groups in which several developers are
concurrently working on a common set of
files. If two developers change the same file,
that file might be overwritten and critical
code changes lost. Software configuration
management systems are designed to avoid
this inherent problem with sharing files in a
multiuser environment.

Any software configuration management system creates a central repository to facilitate


file sharing. Each file to be shared must be added to the central repository to create the
first version of the file. After a file is part of the central repository, users can access and
update it, creating new versions.
Benefits of software configuration management
If you have not used a software configuration management system or are not that
familiar with the concept, you might wonder whether it is appropriate to use software
configuration management on your project. Test automation is a
software development effort. Every time a test script is created, whether through recording
or coding, a file is generated that contains code. When created, developed, or edited, that
code is a valuable test asset.
A team environment presents the risk of losing functioning code or breaking test scripts by
overwriting files. A software configuration management system offers a way to overcome
this risk. Every time a file changes, a new version is created and the original file is
preserved.
For the team that is new to software configuration management, all of the essential features
for versioning test scripts are available through the Rational Functional Tester interface.
This integration simplifies the use and adoption of software configuration management.
NoteUse a software configuration management like ClearCase or Rational Team Concert if
multiple users must access functional test assets in a test team environment.
Software configuration management products
The ClearCase or Rational Team Concert integration for versioning test assets is
specialized and cannot be duplicated with other tools. For this reason, some ClearCase
operations cannot be performed outside Rational Functional Tester. When you use Rational
Functional Tester, the ClearCase or Rational Team Concert operations appear to be very
simple. But a lot is going on behind the scenes. A Functional Test script is a collection of
files. The complexity of treating several files as a single entity is hidden because all actions
in the product user interface are performed on the script. You do not see the related files
anywhere in the user interface. In addition, some software configuration management
operations, such as merging, are very complex. There is built-in logic to determine the order
in which files are merged, and then different utilities are employed as needed to complete
the merge.
ClearCase:
The built-in Rational Functional Tester integration with ClearCase provides all the basic
software configuration management features and hides the complexity of the Rational
Functional Tester test asset structure.
Also, if a user attempts to perform file operations on Rational Functional Tester files
outside the product user interface, scripts may become out of sync with their related files
and become corrupt or unusable.
Rational Functional Tester works in a ClearCase view enabled for Unified Change
Management (UCM) if the view was created as part of a single-stream UCM project.
Rational Functional Tester does not work in views that are part of multistream UCM
projects.
NoteRational Functional Tester uses its own integrated Team provider. It does not support
using the SCM integration adapter directly with Functional Test projects.
In ClearCase, a checkout operation creates a local copy of the file in which you can make
changes. When you are satisfied with your work, you check in the file to create a new
version. The original file version always exists.
One fact of life in a multiuser environment is that many users can check out the same file at
the same time. When this happens, a special feature of the software configuration
management system called "merge" is available to combine multiple changes to a single
file. The first user to check in the file creates the new version. The second user to check in
the file must merge her changes into that version. If the software configuration
management system can combine the changes, they are merged into a new version of the
file. If the changes conflict or cannot be resolved by the software configuration
management system, the conflicts must be resolved manually.
Rational Team Concert:
You can use Jazz source control to manage source code, documents, and other artifacts
that you want to place under version control and share with a team. Jazz source control is
closely integrated with the other application development lifecycle tools included in
Rational Team Concert.
• You can create a project in your workspace, share the project to place the project under
Jazz source control.
• Check-in your changes to the repository workspace.
• Deliver the changes to the stream from the repository workspace so that the changes are
available to all members of the team.
• You can accept a team invitation, or create a new repository workspace from one of the
streams of the team.
Functional test assets
A typical Rational Functional Tester test script object includes these files:
• Script file ( scriptname.java for Rational Functional Tester, Eclipse Integration, or
scriptname.vb for Rational Functional Tester, Microsoft Visual Studio .NET Integration)
This file is created through recording.
• Script helper file ( scriptname ScriptHelper.java for Rational Functional Tester, Java
Scripting, or scriptname ScriptHelper.vb for Rational Functional Tester, VB.NET
Scripting)
Each script has a script helper file that is generated after recording.
• Shared test object map file ( kadov_tag{{<ignored>}}filename.rftmap
kadov_tag{{</ignored>}}) or private test object map file (scriptname.rftxmap ) Each script
has a map file. The map file can be associated with only one script (*. rftxmap ) or shared
among many scripts (*. rftmap ). To prevent users from accidentally selecting a private
map name as a shared map, the suffixes are different.
• Verification Point file ( verificationpointname .rftvp )
Each script may also contain one or more verification point files. Verification point files
are not shared among scripts.
• Script Definition file (scriptname .rftdef )
Each script contains a script definition file. The script definition file contains the name of
the map file, script name, the names of all of the recognized objects, and other file linkage
information.
• Public Test Datapool (filename.rftdp ) or Private Test Datapool ( scripfname.rftxdp )
You can associate a public or private test datapool with a test script. You can associate a
public test datapool with one or several test scripts.

This topic shows example hardware/software configurations for different LabKey Server
installations. These are intended as guidelines only -- your own configuration should be
adjusted to suit your particular requirements.
Small Laboratory Installation
The following configuration is appropriate for 10-20 users with small file and table sizes.
We assume that the server and database are located on the same machine.

CPUs 2+ CPUs or Virtual CPUs

RAM 4GB (minimum) - 16GB (recommended)

Disk
164GB (64GB for File Storage, 100GB for database storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both Operating


Systems. Select the operating system which is best supported by your
organization)
Software • Java
• Tomcat
• DB software (PostgreSQL or MS SQL Server)
• See Supported Technologies for the specific versions to use.

As usage increases, increase the amount of RAM memory to 8GB at a minimum (and
also increase the memory used by Tomcat and the database accordingly).

Large Multi-project Installation


The following configuration is appropriate for a 100s of users working on multiple
projects with large files and data tables.
We recommend placing the web server and the database server on different machines
in order to optimize maintenance, update, and backup cadences.
Machine #1: Web Server

CPUs 4+ CPUs or Virtual CPUs

RAM 8GB (minimum) - 16GB (recommended)

Disk
64GB (for OS and LabKey binaries), 512GB (for file storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both Operating


Systems. Select the operating system which is best supported by your
organization)
Software
• Java
• Tomcat
• See Supported Technologies for the specific versions to use.

Network 1 GB/s

Machine #2: Database Server

CPUs 4+ CPUs or Virtual CPUs

RAM 8GB (minimum) - 16GB (recommended)

Disk
100GB (for database storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both Operating


Systems. Select the operating system which is best supported by your
Software organization)
• DB software (PostgreSQL or MS SQL Server)
• See Supported Technologies for the specific versions to use.

Network 1 GB/s
SELF-CHECK 4.1-4

A. ENUMERATION: Write the hardware configuration for different types of computers


and then explain brief it.
1.

2.

3.

B. ESSAY:

1. What is software configuration management?


TASK SHEET 4.1-4

Corrective Action
• Hardware Configuration
• Software Configuration

Performance Objective: given necessary tools,equipment


and materials,

you should be able to corrective action ff. standard


operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch panel ,2

computer systems unit,table, printer scanner,PPE Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

1. Annalyze the systems requirements.

2. Provides details about the Hardware and Software used in our testing.

3. Client Hardware and Software setup that was used the tests.

4. Configures the Hardware and Software.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 4.1-4

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Annalyze the systems requirements

Provides details about the Hardware and Software used in our testing

Client Hardware and Software setup that was used the tests

Configures the Hardware and Software


> LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks

LESSON CONTENT: Testing Methods and Procedures

ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:
Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-1

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Inspect and Test the Computer Systems and Networks

2. Determine the Inspect and Test the Computer Systems and Networks

What is System Testing ?


System Testing means testing the system as a whole. All the modules/components are
integrated in order to verify if the system works as expected or not.
System Testing is done after Integration Testing. This plays an important role in
delivering a high-quality product.

List of Tutorials:
• What is System Testing
• System vs end to end testing
The process of testing an integrated hardware and software system to verify that the
system meets its specified requirements.
A computer technician needs a good understanding of the health and safety regulations to
understand the good practices demanded by law. In particular, you need to:
• report any accidents;
• take reasonable care of your own health and safety when moving heavy components;
• not cause any electrical hazards;
• make sure that workstations meet safety requirements.
Technicians need to adhere to health and safety regulations as they will help to protect
everyone and to avoid any unnecessary legal action for reckless and unsafe working
practices. Any health and safety problems, the line manager or the health and safety
representative must be informed immediately.
The most basic test is to switch the system on to check it starts without errors. ICT
professionals are also likely to use tools and utilities to check that all is well with the system
after installation.
Diagnostic Tools in testing installed components
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools include the
following:
• Digital multimeter is a device that can take many types of measurements. It tests the
integrity of circuits and the quality of electricity in computer components. A digital
multimeter displays the information on an LCD or LED.
• A loopback adapter, also called a loopback plug, tests the basic functionality of
computer ports. The adapter is specific to the port that you want to test.
• A toner probe is a two-part tool. The toner part is connected to a cable at one end using
specific adapters, such as an RJ-45, coaxial, or metal clips. The toner generates a tone that
travels the length of the cable. The probe part traces the cable. When the probe is in near
proximity to the cable to which the toner is attached, the tone can be heard through a
speaker in the probe.
Software Tools
Like hardware tools, there are a variety of software tools that can be used to help
technicians pinpoint and troubleshoot problems. Many of these tools are free and several
come with the Windows operating system.
Disk Management Tools
Software tools help diagnose computer and network problems and determine which
computer device is not functioning correctly. A technician must be able to use a range of
software tools to diagnose problems, maintain hardware, and protect the data stored on a
computer.
You must be able to identify which software to use in different situations. Disk management
tools help detect and correct disk errors, prepare a disk for data storage, and remove
unwanted files.
The following are some disk management tools:

• FDISK: A command-line tool that creates and deletes partitions on a hard drive. The
FDISK tool is not available in Windows XP, Vista, or 7. It has been replaced with the Disk
Management tool.
• Disk Management Tool: Initializes disks, creates partitions, and formats partitions.
• Format: Prepares a hard drive to store information.
• ScanDisk or CHKDSK: Checks the integrity of files and folders on a hard drive by
scanning the file system. These tools might also check the disk surface for physical errors.
• Defragmentation: Optimizes space on a hard drive to allow faster access to programs
and data.
• Disk Cleanup: Clears space on a hard drive by searching for files that can be safely
deleted.
• System File Checker (SFC): A command-line tool that scans the operating system critical
files and replaces files that are corrupted.
TEST PROCEDURES
A test procedure is a set of steps to guide you through what needs to be done to thoroughly
test the installation. It is designed to help you work more effectively and to make sure you
test everything that needs testing. 1 2 3

1. Gathering test information. The first step is to run the tests required by the
procedure and find out what happens. You should record all the results of your
tests in a log so that you know which pass and which fail, thereby requiring
further action.
2. Validating the test information. The next step is to check the data you gathered
from the tests to make sure it is correct. This is usually done by running the
tests again.
3. Responding to test information. This step is important because you need to be
able to recognize when a test shows problems or is successful. For example, if
ping is used to test a network connection then ‘Request timed out’ shows the
test was not successful.
4. Checking specification. The final step is an important end to testing. You need to check
the specification for the installation to make sure that it has been met. For example, if a
user requested an upgrade to make their display run at 1920 x 1200, then the ICT
professional should check that the graphics card and screen can do this.
EXTERNAL VISUAL INSPECTION
The external visual inspection consists of a quick inspection of the exterior of
the computer, the monitor, the keyboard, any peripherals, and cables. While
performing the visual inspection, make any necessary corrections. To perform
the external visual inspection, perform the following steps:
1. Turn off the computer, the monitor, and all peripherals.
2. Verify that all power cables are properly connected to the computer, the monitor and
peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly attached to the proper
connectors on the back of the computer.
• For a PS/2-compatible mouse, the keyboard and mouse interface cable connectors are
identical except for their labels.
• For a serial mouse, the mouse interface cable must be firmly attached to one of the serial
port connectors, and its captive screws must be secure enough to ensure a firm
connection.
4. Verify that network cables (if present) are properly attached.
5. Verify that any devices attached to the serial and parallel port connectors are properly
connected.
• Each of the serial and parallel port interface cables must be firmly attached to an
appropriate connector on the back of the computer as well as to the interface connector
on the device. The captive screws that secure these connectors at each end of the
interface cable must be secure enough to ensure a firm connection.
6. Verify that the video interface cable is firmly attached to the video connector on the
back panel or to a video expansion card, and also to the connector on the back of the
monitor. For proper connection of the video monitor, check the documentation for the
monitor.
7. Inspect all external monitor controls for any obvious damage or improper settings.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more keys are
sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and indicators, and all user-
accessible data storage devices for any signs of physical damage.
OBSERVING THE BOOT ROUTINE
After you have performed an external visual inspection, you should boot the system and,
while the boot routine is running, observe the system for any indications of problems.
NOTE: Most of the steps in this procedure require observation of system functions and
indications, some of which can occur simultaneously. It may be necessary to reboot the
system several times to complete all of these steps.
1. If the system is off, turn on all peripherals and the computer.
2. Check the power supply fan. Does the fan run normally?
• Yes. Proceed to step 3.
• No. Troubleshoot the system power supply.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on the upper-
right corner of the keyboard. After all three indicators flash momentarily, and following a
long pause (approximately 30 seconds), the Num Lock indicator should light up and remain
on (unless the Num Lock option is set to Off in the System Setup program). Do these
indicators flash on and off within approximately 10 seconds after the boot routine starts?
• Yes. Proceed to step 4.
• No. Troubleshoot the system power supply. If the troubleshooting procedure indicates
that the system power supply is operational, troubleshoot the memory.
4. During the boot routine, observe the system for any of the following indications:
• Beep codes — A beep code is a series of beeps that indicates an error condition.
• System error messages — these messages can indicate problems or provide status
information.
• Diskette-drive and hard-disk drive access indicators — These indicators light up in
response to data being transferred to or from the drives. If either of these indicators fails to
light up during the boot routine, troubleshoot the diskette drive or hard-disk drive
subsystem, as appropriate.
5. Observe the monitor screen for the Diagnostics menu.
NOTICE: Before you proceed with the internal visual inspection, ensure that all open files
are saved and exited all open application programs if possible.
INTERNAL VISUAL INSPECTION
A simple visual inspection of a computer’s interior hardware can often lead to
the source of a problem, such as a loose expansion card, cable connector, or
mounting screw. To perform the internal visual inspection, perform the
following steps:
1. Turn off the system, including any attached peripherals, and disconnect all the 779 AC
power cables from electrical outlets. CAUTION: Before beginning to work inside the
computer, disconnect the power supply from the power source and the power supply
cables from the power supply.
2. Remove the computer’s right side cover.
CAUTION: The heat sink assembly can get extremely hot during system operations. Be
sure that it has had sufficient time to cool before touching it.
CAUTION: When handling the heat sink assembly, take care to avoid sharp edges on the
heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink assembly or
assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on the top of each
chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are firmly attached
to their appropriate connectors.
7. Reinstall the computer cover. 8

8. Reconnect the computer and any attached peripherals to their power sources,
and turn them on.
Types Of System Testing
ST is called a superset of all types of testing as all the major types of testing are covered in
it. Although a focus on types of testing may vary on the basis of

System Testing-@www.SoftwareTestingHelp.com

product, organization processes, timeline, and requirements.

The overall it can be defined as below:

Functionality Testing: To make sure that functionality of the product is working as per the
requirements defined, within the capabilities of the system. Recoverability Testing: To
make sure how well the system recovers from various input errors and other failure
situations.
Interoperability Testing: To make sure whether the system can operate well with third-
party products or not.
Performance Testing: To make sure the system’s performance under the various condition,
in terms of performance characteristics.
Scalability Testing: To make sure the system’s scaling abilities in various terms like user
scaling, geographic scaling, and resource scaling.
Reliability Testing: To make sure the system can be operated for a longer duration without
developing failures.
Regression Testing: To make sure the system’s stability as it passes through an integration
of different subsystems and maintenance tasks.
Documentation Testing: To make sure that the system’s user guide and other help topics
documents are correct and usable.
Security Testing: To make sure that the system does not allow unauthorized access to data
and resources.
Usability Testing: To make sure that the system is easy to use, learn and operate.
SELF-CHECK 5.1-1

A. ENUMERATION: Write the test procedures

1.

2.

3.

4.
B. List down the OBSERVING THE
INSPECTION BOOT ROUTINE and INTERNAL VISUAL

1.
2.
3.
4.
5.
6.
7.

8.
TASK SHEET 5.1-1

Inspect and Test the Computer Systems and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to testing methods and procedures ff. standard operating p ro
cedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack Patch

panel ,2 computer systems unit,table, printer scanner,PPE


Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

• The very first step is to create a Test Plan.


• Create System Test Cases and test scripts.
• Prepare the test data required for this testing.
• Execute the system test cases and script.
• Report the bugs. Re-testing the bugs once fixed.
• Regression testing to verify the impact of the change in the code.
• Repetition of the testing cycle until the system is ready to be deployed.
• Sign off from the testing team.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-1

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

The very first step is to create a Test Plan

Create System Test Cases and test scripts

Prepare the test data required for this testing

Execute the system test cases and script

Report the bugs. Re-testing the bugs once fixed

Regression testing to verify the impact of the change in the code

Repetition of the testing cycle until the system is ready to be deployed

Sign off from the testing team


> LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks

LESSON CONTENT: 5s and 3Rs Environmental Policies

ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:
Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-2

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the 5s and 3Rs Environmental Policies

2. Determine the 5s and 3Rs Environmental Policies

What is 5s and 3rs environmental policies?

5S or good housekeeping involves the principle of


waste elimination through workplace
organization. 5S was derived from the Japanese
words seiri, seiton, seiso, seiketsu, and shitsuke. In
English, they can be roughly translated as sort,
set in order, clean, standardize, and sustain. The
cornerstone of 5S is that untidy, cluttered work
areas are not productive. As well as the physical
implications of junk getting in everybody’s way
and dirt compromising quality, we all are happier
in a clean, tidy environment and hence more
inclined to work hard with due care and
attention. 5S and good housekeeping are core
elements of lean thinking and a visual workplace
and are a fundamental platform for world-class
manufacturing.
5S provides the foundation for all quality improvement programs. It is a process to create
more productive people and more productive companies through motivation, education,
and practice. It involves the creation of a strong corporate culture with a productivity
mindset.

What is 5S

One of the most powerful Lean Manufacturing Tools and a cornerstone of any successful
implementation is that of 5S, but what is 5S and its 5 Steps of Seiri, Seiton, Seiso, Seiketsu
and Shitsuke?
5S is a simple tool for organizing your workplace in a clean, efficient and safe manner to
enhance your productivity, visual management and to ensure the introduction of
standardized working.
Most of the other definitions of 5S and descriptions that I see here on the internet
concentrate heavily on the aesthetics and the efficiency gains that you achieve through
implementing 5S and neglect the real aim of 5S; the need to introduce standard operational
practices to ensure efficient, repeatable, safe ways of working.
In addition to standardised working which provides you with a stable foundation to build
all of your other improvements through implementing Lean Tools, you also provide a
highly visual workplace. One of the most important factors of 5S is that it makes problems
immediately obvious.
5S is a team run process and should be conducted by the people who work within the area
in which the principles of 5S are being applied, it is not a tool that can be applied by an
outsider onto an area without the knowledge and cooperation of the people within it.

Origins of 5S
5S as a methodology has come out of the techniques within Total Productive Maintenance
(TPM) and from the Toyota Production System (TPS). However many of the individual
components such as creating ergonomic and efficient work places can be seen to owe their
roots to people such as Taylor for his work on “scientific management” and Frank
Gilbreth’s “time and motion studies.”
Frank Gilbreth showed that by improving the ergonomics of a bricklayers working
methods he could reduce the number of individual movements required and increase the
hourly output from 120 to 350 bricks laid each hour.
The Concept of 5S
5S is a methodical way to organize your workplace and your working practices as well as
being an overall philosophy and way of working. It is split into 5 phases, each named after
a different Japanese term beginning with the letter “S”; (Seiri, Seiton, Seiso, Seiketsu,
Shitsuke) hence the name 5 S.
These five distinct phases are (with English descriptions);

Steps of 5S

5S Seiri; Sort, Clearing, Classify


5S Seiton; 5S Straighten, Simplify, Set in order, Configure Sweep,
Seiso; shine, Scrub, Clean and Check Standardize, stabilize,
5S Seiketsu; 5S Conformity Sustain, self discipline, custom and
Shitsuke; practice
And for completeness, some companies add a 6th (6S) of Safety, although in my opinion this
should be an integral part of the steps of 5S and not a separate stage in itself.
5C and CANDO
There has been reluctance for some companies in the past to take up “Japanese”
initiatives for business improvement, so some consultancies and other bodies have come
up with non-Japanese equivalents; two of which are listed below as alternatives for 5S.
5S is also known in some quarters as 5C, with the “S” words replaced by

• Clearing,
• Configure,
• Clean and Check,
• Conformity and finally
• Custom and practice.
CANDO is;

• Cleanup,
• Arrange,
• Neatness,
• Discipline, and
• Ongoing Improvement.

5S Definition

Below are definitions and explanations of each step of the 5S process;

5S Seiri or Sort
5S Seiri removing Clutter

5S Seiri or Sort is the first step in 5S, it refers to the sorting of the clutter from the other
items within the work area that are actually needed. This stage requires the team to
remove all items that clearly do not belong in the working area and only leave those that
are required for the processes in question.

5S Seiton or Straighten / Set in order


5S Seiton organized workspace

5S Seiton or Straighten is the process of taking the required items that are remaining
after the removal of clutter and arranging them in an efficient manner through the use of
ergonomic principles and ensuring that every item “has a place and that everything is in
its place.”

SELF-CHECK 5.1-2
A. ENUMERATION: Write the 5s and 3rs environmental policies

B. What is 5S?- Write the meaning


TASK SHEET 5.1-2 5s and 3Rs Environmental

Policies

Performance Objective: given necessary tools,equipment and materials,

you should be able to 5s and 3Rs Environmental Policies ff. standard operating p ro
cedures within 2 hour

Supplies/Materials and Equipment:

PPE ,Cleaning Materials of Housekeeping Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment


4. Follow the steps / procedures below of 5s and 3Rs Environmental Policies
a. 5S is a foundation for more disciplined actions.
b. Cleaner and safer work areas
c. Less wasted time through more workplace organization
d. Less space
e. Improved self-discipline
f. Improved culture

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-2

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

5S is a foundation for more disciplined actions.

Cleaner and safer work areas

Less wasted time through more workplace organization

Less space

Improved self-discipline

Improved culture
> LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks

LESSON CONTENT: STATUS AND FINAL TEST REPORT

ASSESSMENT CRITERIA:
1. Final inspections are undertaken to ensure that the testing conducted
on the device conforms with the manufacturer’s instruction/manual
2. Computer systems and networks are checked/tested to ensure
safe operation.
3. OHS standards and 5S principles are followed according to
enterprise policies
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
5. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:
Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-3

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the status and final test report

2. Determine the status and final test report

About Computer Status reports and logs


Article Id: 177833

Status: Published

Updated On: 14-01-2009 1115

Legacy Id: TECH95541

Products:

Endpoint Protection

Issue/Introduction:

Resolution:

About the information in the Computer Status reports and logs

The Computer Status log contains information about the real-time operational
status of the computers in the network. Information available includes the
computer name and IP address, last check-in time, definitions date, infected
status, Auto-Protect status, server, group, domain, and user name. Filters for
Computer Status reports have both
standard configuration options and compliance-specific options.

The table below describes some typical uses for the kind of information
that you can get from Computer Status reports and logs.
Report or log Typical uses

Virus Definitions Use this report to make sure that all the groups, domains, or servers in
Distribution your network use up-to-date virus definitions files versions.

Computers Not Use this report to find the computers that have not checked in with a
Checked into server and therefore might be lost or missing.
Server

Symantec Use this report to check the versions of product software, virus
Endpoint definitions, IPS signatures, and proactive protection content in use in
Protection Product your network. With this information you can pinpoint the computers
Versions that need an update.

Intrusion Use this report to make sure that all the groups your network use up-to-
Prevention date intrusion prevention signatures. You can also see which domains or
Signature servers are out-of-date.
Distribution

Client Inventory Use this report to see the number and percentage of computers that fall
into certain hardware and software categories. Available information
includes the computers' operating system, total memory, free memory,
total disk space, free disk space, and processor type. For example, from
the Client Inventory report, you might see that 22% of your computers
have less than 1 GB of free disk space.

Compliance Status Use this report to see which groups or subnets have the largest
Distribution percentage of computers out of compliance. You may want to investigate
if certain groups seem to have a lot more compliance problems than
others.

Client Online Use this report to see which groups or subnets have the largest
Status percentage of clients online. You may want to investigate why some
groups or subnets currently experience more problems than others.

Clients With Use this report to see which groups or subnets have the largest
Latest Policy percentage of computers that don't have the latest policy on them.

Client Count by Use this report to see the total number of clients and users, by group.
Group
Security Status Use this report to quickly see the total number of computers that have
Summary the following problems:

• Auto-Protect is disabled
• The antivirus engine is turned off
• Tamper Protection is turned off
• The computer needs to be restarted
• The computer failed a host integrity check
• Network Threat Protection is turned off
These computers may continue to be at risk unless you intervene.

Protection Content Use this report to check the versions of Proactive Protection content in
Versions use in your network, to pinpoint any computers that need an update.

Client Migration Use this report to see the migration status of clients by domain, group,
and server. You can quickly identify clients where migration has failed
or has not yet started.

Clients Online/ Use this report to pinpoint the clients that don't connect to the network
Offline Over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)

Clients With Use this report to pinpoint the clients that don't get policy updates
Latest Policy over frequently enough. This report is available only as a scheduled report.
Time (Snapshots)

Client Software Use this report to pinpoint the clients that don't have the latest software
Rollout version deployed. This report is available only as a scheduled report.
(Snapshots)

Non-compliant Use this report to pinpoint the clients that frequently fail host integrity
Clients Over Time checks. This report is available only as a scheduled report.
(Snapshots)

Virus Definitions Use this report to check to see the definitions versions that clients have.
Rollout This report is available only as a scheduled report.
(Snapshots)

Computer Status Check the Computer Status log if you need more details about any of
log the areas that the reports cover.

References: 2009081409151448 - About the different types of Symantec


Endpoint Protection Manager Reports
> LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks LESSON

CONTENT: WASTE MANAGEMENT


ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the testing conducted


on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:
Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-4

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the waste management

2. Determine the waste management

Waste disposal, the collection, processing, and recycling or deposition of the waste
materials of human society. Waste is classified by source and composition. Broadly
speaking, waste materials are either liquid or solid in form, and their components may be
either hazardous or inert in their effects on health and the environment. The term waste is
typically applied to solid waste, sewage (wastewater), hazardous waste, and electronic
waste.
In industrialized countries, municipal liquid waste is funneled through sewage systems,
where it undergoes wastewater treatment, or sewage treatment. This process removes
most or all of the impurities from wastewater, or sewage, before they can reach
groundwater aquifers or surface waters such as rivers, lakes, estuaries, and oceans. (For
more information on sewage systems and treatment, see wastewater treatment.

wastewater-treatment plant
Wastewater-treament plants remove chemical or biological waste from water.

Refuse, or municipal solid waste (MSW), is nonhazardous solid waste from a community
that requires collection and transport to a processing or disposal site. Refuse includes
garbage and rubbish. Garbage is mostly decomposable food waste, and rubbish is mostly
dry material such as glass, paper, cloth, or wood. Garbage is highly putrescible or
decomposable, whereas rubbish is not. Trash is rubbish that includes bulky items such as
old refrigerators, couches, large tree stumps, or construction and demolition waste (e.g.,
wood, drywall, bricks, concrete, and rebar [a steel rod with ridges for use in reinforced
concrete]), all of which often require special collection and handling. Refuse is often
deposited in sanitary landfills—that is, pits or other sites sealed with impermeable
synthetic bottom liners where waste is isolated from the rest of the environment. (For more
information on the treatment of solid wastes, see solid-waste management.)
How to Recycle Your E-Waste Safely

The good news is that you have plenty of options for properly recycling or donating your
used electronics. It’s important to understand this: Even if you take your e-waste down to
your local recycling center, there’s a high probability that it won’t get recycled properly.
As ABC News discovered, e-waste recyclers are often more concerned with making a
buck than they are with making sure these hazardous materials are disposed of properly.
So what can you do?

1. Use a Certified E-Waste Recycler


Find an e-waste recycler certified through the Basel Action Network (BAN).
BAN is a non-profit organization devoted to certifying e-Stewards, recyclers
who are committed to safely and responsibly recycling electronics. Members
take and demonstrate the Pledge of Responsible Recycling, so working with a certified e-
Steward means you don’t have to worry that your gadget will become another nation’s
pollution or a criminal’s newest project. BAN’s recycler locator will help you find the
certified safety and comfort of e-Stewards in your area.

2. Visit Civic Institutions


Check with your local government, schools, and universities for additional responsible
recycling options. With e-waste becoming such a large problem, government offices and
schools are assigning days when citizens can bring unwanted electronics to a designated
drop-off location.

Many communities post a calendar that will include recycling days, so check your local
paper or visit their website. When you recycle your items locally, you can make the
occasion a day trip and a community event. Encourage your neighbors to join you and
spread the word about educated e-waste disposal.

3. Explore Retail Options


Best Buy, for example, isn’t certified through BAN’s e-Steward program, but they do have
an effective recycling program in all of their stores. They claim to only use recyclers who
adhere to the highest standards of e-waste processing. Specifically, their website discloses
that e-waste that you bring to their stores will not end up in a foreign country or in any
landfill:

Best Buy makes sure that the recyclers we work with adhere to the highest guidelines and
standards so that the products customers bring into our stores for recycling don’t end up in
landfills or in foreign countries, and that all hazardous materials are disposed of properly.
We partner directly with a short list of qualified, respected recycling companies who
ensure all products collected for recycling through Best Buy are handled responsibly.
These recycling companies meet our standards, and we encourage them to examine and
consider additional third-party standards for responsible practices (such as the EPA R2
and e-Stewards).
You can drop off all kinds of e-waste for recycling at Best Buy including:

• Cell phones . TVs


• Power cords
• GPS devices
• Speakers
• DVD players
• Paper shredders
• Memory cards
• Desktops
• Laptops
• Netbooks
Additionally, Gettington teams up with an e-Stewards partner, CExchange, to provide you
with an opportunity to recycle your e-waste via pre-paid postage containers. You can
recycle old items and get the benefit of cash reward for some products. You can even
transfer the rewards to charitable organizations.

4. Donate Your Electronics


Reusing is always better than recycling. If your electronics still have life left, you can reduce
e-waste pollution and share technology with people who wouldn’t otherwise have access to
it.

Organizations like Cell Phones for Soldiers and Verizon’s HopeLine program will make
sure your old cell phone makes its way to a worthy cause. Other organizations, like the
Salvation Army and Goodwill, can sell your used electronics and use the profits to educate
and empower others who need help. Goodwill has been particularly active with its
Reconnect program, which has a strict no-export policy.

Gazelle, a marketplace that can also provide some cash incentives, will help you organize a
Gadget Drive if you’re trying to raise money for your school or non-profit. To get a feel for
the kind of money people are willing to spend,
check out Ecosquid. When you run a Gadget Drive, people in your community will drop off
their devices. You’ll ship everything off to Gazelle, and then you’ll get a check for
everything that was donated. Gazelle, in turn, will either sell the electronics or make sure
they’re recycled responsibly.
SELF-CHECK 5.1-4

A. ENUMERATION: Write the Recycle Your E-Waste Safely and explain brief it.
TASK SHEET 5.1-4

WASTE MANAGEMENT

Performance Objective: given necessary tools,equipment and materials,

you should be able to waste management ff. standard operating procedures within 2
hour

Supplies/Materials and Equipment:

PPE, cleaning materials

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3. Gather the necessary materrials and equipment

4. Follow the steps / procedures below

5 stages of waste management. Stage 1: Preventing waste generation


1. Prevention.
2. Preparation for reuse.
3. Recycling.
4. Other utilization (e. g. energy recovery).
5. Landfilling.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-4

YES NO
CRITERIA

Did you.......
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Prevention

Preparation for reuse

Recycling

Other utilization (e. g. energy recovery)

Landfilling

You might also like