Maintaining and Repairing Computer Systems and
Networks (MRCN)
COMPUTER SYSTEMS SERVICING
COMPETENCY-BASED LEARNING MATERIALS
ASSESSMENT CRITERIA
1. Maintenance and/or Diagnosis of faults is planned and prepared in line with job requirements.
2. Tools, equipment and testing devices needed for the maintenance are obtained and checked for correct operation and safety.
3. Materials necessary to complete the work are obtained in accordance with established procedures and checked against job requirements.
4. OHS policies and procedures are followed in line with job requirements.
5. Computer systems and networks for maintenance are checked against job/service order or instructions and specifications.
6. Appropriate personal protective equipment is used in line with standard procedures.
7. Normal function of computer systems and networks are checked in accordance with manufacturer’s instructions.
8. Scheduled/periodic maintenance is performed in accordance with manufacturer’s requirements.
9. Where necessary, needed repairs/replacements are made in accordance with established procedures.
10. Unplanned events or conditions are responded to in accordance with established procedures.
11.Appropriate personal protective equipment is used in line with standard procedures.
12.Faults or problems in the computer systems and networks are diagnosed according to requirements and in line with the standard procedures.
13.Contingency measures are managed and implemented in accordance with established procedures.
14.Unplanned events or conditions are responded to in accordance with established procedures.
15.Appropriate personal protective equipment is used in line with standard procedures.
16.Defective components or parts are replaced or corrected without damage to the surrounding environment or services.
17.Adjustments, if necessary are made in accordance with established procedures.
18.Unplanned events or conditions are responded to in accordnance with established procedures.
19.Final inspections are undertaken to ensure that the testing conducted on the device conforms with the manufacturer’s instruction/manual.
20.Computer systems and networks are checked/tested to ensure safe operation.
21.OHS standards and 5S principles are followed according to enterprise policies.
22.Work site is cleaned and cleared of all debris and left in safe condition in accordance with company procedures.
23.Excess components and materials are disposed of based on WEEE directives and 3Rs waste management program.
24.Report is prepared and completed according to company requirements.
DEFINITION OF TERMS
GENERAL
1.) Certification - It is the process of verifying and validating the competencies of a person through assessment.
2.) Certificate of Competency (COC) – It is a certification issued to individuals who pass the assessment for a single unit or cluster of units of competency.
3.) Common Competencies - The skills and knowledge needed by all people working in a particular industry.
4.) Competency - is the possession and application of knowledge, skills and attitudes to perform work activities to the standard expected in the workplace.
5.) Competency Assessment - It is the process of collecting evidence and making judgments on whether competency has been achieved.
6.) Competency Standard (CS) - It is the industry-determined specification of competencies required for effective work performance.
7.) Context of Assessment - Refers to the place where assessment is to be conducted or carried out.
8.) Core Competencies - Are the specific skills and knowledge needed in a particular area of work - industry sector/occupation/job role.
9.) Critical aspects of competency - Refers to the evidence that is essential for successful performance of the unit of competency.
10.) Elective Competencies - Are the additional skills and knowledge required by the individual or enterprise for work.
11,) Elements - Are the building blocks of a unit of competency. They describe in outcome terms the functions that a person performs in the workplace.
12.) Evidence Guide - Is a component of the unit of competency that defines or identifies the evidences required to determine the competence of the individual. It provides information on critical aspects of competency, underpinning knowledge, underpinning skills, resource implications, assessment method and context of assessment.
13.) Level - Refers to the category of skills and knowledge required to do a job.
14.) Method of Assessment - Refers to the ways of collecting evidence and when, evidence should be collected.
15.) National Certificate (NC) – Is a certification issued to individuals who achieve all the required units of competency for a national qualification defined under the Training Regulations. NCs are aligned to specific levels within the PTQF.
16.) Performance Criteria - Are evaluative statements that specify what is to be assessed and the required level of performance.
17.) Qualification - Is a cluster of units of competencies that meets job roles and is significant in the workplace. It is also a certification awarded to a person on successful completion of a course in recognition of having demonstrated competencies in an industry sector.
18.) Range of Variables - Describes the circumstances or context in which the work is to be performed.
19.) Recognition of Prior Learning (RPL) – Is the acknowledgement of an individual’s skills, knowledge and attitudes gained from life and work experiences outside registered training programs.
20.)Resource Implications - Refers to there's sources needed for the successful performance of the work activity described in the unit of competency. It includes work environment and conditions, materials, tools and equipment.
21.) Basic Competencies - Are the skills and knowledge that everyone needs for work.
22.) Training Regulations (TR) – Refers to the document promulgated and issued by TESDA consisting of competency standards, national qualifications and training guidelines for specific sectors/occupations. The TR serves as basis for establishment of qualification and certification under the PTQF. It also serves as guide for development of competency- based curricula and instructional materials including registration of TVET programs offered by TVET providers.
23.) Underpinning Knowledge - Refers to the competency that involves in applying knowledge to perform work activities. It includes specific knowledge that is essential to the performance of the competency.
24.) Underpinning Skills - Refers to the list of the skills needed to achieve the elements and performance criteria in the unit of competency. It includes generic and industry specific skills.
25.) Unit of Competency – Is a component of the competency standards stating a specific key function or role in a particular job or occupation; it is the smallest component of achievement that can be assessed and certified under the PTQF.
SECTOR OF SPECIFIC
1.Computer System - The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes.
2. Computer Network, or simply a Network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. It is a group of devices connected to each other. Networks may be classified into a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, benefit, and organizational scope.
3. Configuration - The makeup of a system. To "configure" is to choose options in order to create a custom system. "Configurability" is a system's ability to be changed or customized.
4. Connector - Any plug and socket that links two devices together. Although taken for granted and rarely in the limelight, connectors are a huge industry, and the quality of these components is more critical than most people would imagine. When not designed or constructed properly, they often become the weakest element in an electronic system.
5. Display Adapter - A plug-in card in a desktop computer that converts the images created in the computer to the electronic signals required by the monitor. It determines the maximum resolution, refresh rate and number of colors that can be displayed, which the monitor must also be able to support. On many PC motherboards, the display adapter circuits are built into the chipset, and an AGP or PCI card is not required.
6. Expansion Board - A printed circuit board that plugs into an expansion slot and extends the computer's capability to control a peripheral device. All the boards (cards) that plug into a computer's bus are expansion boards, such as display adapters, disk controllers, network adapters and sound cards.
7. Expansion Bus - An input/output bus typically comprised of a series of slots on the motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are the common expansion buses in a PC.
8. Graphical User Interface - A graphics-based user interface that incorporates movable windows, icons and a mouse. The ability to resize application windows and change style and size of fonts are the significant advantages of a GUI vs. a character-based interface. GUIs have become the standard way users interact with a computer, and the major GUIs are the Windows and Mac interfaces along with Motif for Unix and the GNOME and KDE interfaces for Linux.
9. LAN - A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
10. Motherboard - Also called the "system board," it is the main printed circuit board in an electronic device, which contains sockets that accept additional boards. In a desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP slot, memory sockets and controller circuits for the keyboard, mouse, disks and printer. It may also have built-in controllers for modem, sound, display and network, obviating the need to plug in a card.
11. Networks – See Computer Network.
12. Operating System - The master control program that runs the computer. The first program loaded when the computer is turned on, its main part, the "kernel," resides in memory at all times. The operating system sets the standards for all application programs that run in the computer. The applications "talk to" the operating system for all user interfaces and file management operations.
13. Peripheral -Any hardware device connected to a computer, such as a monitor, keyboard, printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse.
14. Server - A computer system in a network that is shared by multiple users. Servers come in all sizes from x86-based PCs to IBM mainframes. A server may have a keyboard, monitor and mouse directly attached, or one keyboard, monitor and mouse may connect to any number of servers via a KVM switch. Servers may be also be accessed only through a network connection as well.
15. Sound Card - Also called a "sound board" or "audio adapter," it is a computer expansion board that records and plays back sound, providing inputs from a microphone or other sound source and outputs to speakers or an external amplifier. The de facto standard for sound card compatibility in PCs is Creative Labs' Sound Blaster.
16. User Interface - All graphics based today, the user interface includes the windows, menus and method of interaction between you and the computer. Prior to the Mac, Windows and Motif (UNIX) interfaces, all interaction was based on commands entered by the user. Operating systems may support optional interfaces and allow a new shell N or skin, to be used instead.
17. Virus - Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other
programs in the system. Infected programs copy the virus to other programs.
18. WAN - A Wide Area Network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business effectively carry out its daily function regardless of location
19. WEEE Directives - The prevention of waste electrical and electronic equipment (WEEE), and in addition, the reuse, recycling and other forms of recovery of such wastes so as to reduce the disposal of waste. It also seeks to improve the environmental performance of all operators involved in the life cycle of electrical and electronic equipment, e.g. producers, distributors and consumers and in particular those operators directly involved in the treatment of waste electrical and electronic equipment.
Additional Terms
Active Hubs – Amplify or boost signals.
Anti-Static – A product that prevents the buildup of static electricity.
BIOS – Basic Input/output System, chip that controls the most basic functions of the computer and performs a self-test every time you turn it on.
Flash drive– RAM that can retain data without electrical power. It is widely used for BIOS chips and for digital camera and digital music storage.
Graphic tablet – Objects are drawn using a pen or a puck. The puck is technically a tablet cursor, not a mouse.
Goggles – A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.
7. Hard-disk drive – Is a storage device that stores billions of characters of data on a nonremovable disk.
8. Hardware- Refers to the tangible (things you can touch) components of a computer system. Hardware components are further divided into three groups namely.
9. Host –Any computer whether mainframe, server, or even PC that acts as an information source on a network.
10. Intelligent Hubs – Select which path a specific signal will travel.
11. Joy Stick - A hand-held control stick that allows a player to control the movements of a cursor on a computer screen or a symbol in a video game.
12. LAN Card – Local area network interface card.
13. Laptop computer - A small, portable computer -- small enough that it can sit on your lap.
14. Local Area Network- The smallest of the three network types, consist of PCs connected together within a limited area, such as within the same building, floor or department.
15. Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously.
16. Metropolitan Area Network – Are network that spans no more than.
17. 50 miles. It is design to connect LANs spanning a town or city.
18. Minicomputer: A multi-user computer capable of supporting up to hundreds of users simultaneously.
19. Metropolitan Area Network – Is a network that spans no more than.
20. 50 miles. It is design to connect LANs spanning a town or city.
21. Motherboard – Contains the CPU, BIOS, Memory, mas s storage interfaces, serial and parallel ports, expansion slot and all the controllers required to control standard peripheral devices such as the display screen, keyboard and disk drive.
22. Modem - (Modulator Demodulator) The modem is a device that allows a given computer to share data or otherwise a device which let computers exchange information.
23. Modular Hubs – Are popular in networks because they are easily expanded and always have management option. It is purchased as chassis, or card cage, with multiple card slots, each of which accepts a communication card, or module.
24. Multimedia - Is the combination of different types of communication media (sound, print, video, and so on).
25. Multitasker- Is an instrument use to measure voltage, current and resistance.
26. NIC – Network Interface Card – The PC expansion board that plug into a personal computer or server and works with the network operating system to control the flow of information over the network.
27. Network – Is a communications system connecting two or more computers.
28. Network Bridge – Divides network into smaller, more manageable sections helping reduce network traffic.
29. Network Hub - A hardware device that all PCs on a network are connected to by cabling. The hub manages receiving and transmitting data from networked services.
30. Network Server- Is a powerful computer whose sole purpose is to serve network clients.
31. Network Switch – It helps determine how data moves over large networks.
32. Notebook computer - an extremely lightweight personal computer that weighs weigh less than 6 pounds and are small enough to fit easily in a briefcase.
33. OHS – Occupational Health and Safety.
34. Operating System (So) -Software that controls the allocation and use of programs and data that a computer uses.
35. Passive Hubs – Simply connects various cables.
36. Personal Computer - A small , s ingle -user computer based o n a microprocessor.
37. Port hub /Port – Is a connector on the back of a computer or other device. A port is either a serial port or a parallel port.
38. Peers- Mean any computer sharing the same protocol layer with another computer.
39. Protocol – Refers to the specific standards governing the sending and receiving of data.
40. Repeater– A device that strengthen signals and allow them to stay clear over longer distances.
41. Printer - It is a piece of hardware that produces a paper copy (also known as ‘hardcopy’) of the information generated by the computer.
42. RAM – Random Access Memory, is a primary memory. This memory is used inside the computer to hold programs and data while it is running.
43. RJ 45 – Is the connector plugged into the NIC ports on computers and often connecting the main networking hardware together.
44. Router – A device that forwards data packets between Local or Wide Area Network groups.
45. Scanner- It is an input device that read text or illustration printed on paper, translates the information into a form that a computer can use.
46. Server – Is a part of a network. It is a special computer that users on the network can assess to carry out a particular job.
47. Software – Programs and data that a computer uses.
48. Software Applications- Enables you to perform specific tasks- solve problems, perform work, or entertain yourself.
49. Sound Device Driver Installer / Sound and Audio Devices – A windows XP Control Panel applet, called Sounds, and Multimedia in Windows 2000, for configuring the system’s sound card.
50. Stackable Hubs – Work just like standalone hubs, except that several of them can be “stacked” (connected) together, usually by short lengths of cable.
51. Standalone Hubs – Are single products with a number of ports. It is usually including some method of linking them to other standalone hubs for network expansion.
52. Static – The discharge of electricity between two objects with different electrical potential.
53. Sub-notebook computer - A portable computer that is slightly lighter and smaller than a full-sized notebook computer. Typically, sub- notebook computers have a smaller keyboard and screen, but are
otherwise equivalent to notebook computers.
54. UTP – (Unshielded Twisted Pair) least expensive and most popular network media.
55. USB – Universal Serial Bus, a hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer and telephony devices.
56. Video Camera - Camera using videotape: a camera that records onto videotape.
57. Wide Area Network – Used to distribute information thousands of miles among thousands of users.
58. Wireless Hubs– Are hubs designed for the home.
59. Workstation- Is any network computer that connects to and request resources from a network.
INFORMATION SHEET 4.1-1
Computer systems maintenance procedures
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to Plan and Prepare Maintenance Procedures
Introduction:
Planning and preparing systematic maintenance procedure will save time, money and frustration. It is a good idea and opportunity to learn the proper care and maintenance of your computer.
PC maintenance is an important topic for anyone who owns a PC. Looking after your PC properly ensures you of trouble-free use. Regular PC maintenance also keeps the machine’s performance optimal.
A. Plan Maintenance Procedures for Computer System and Networking.
1. Design a systematic maintenance plan for hardware.
Monitoring, evaluating and updating plan.
Place your computer in a well-ventilated area.
Schedule use of computers for its longer life.
Move computers only when it is turned off and unplugged.
Treat your computer properly.
Maintain your hard disk.
2. Design a systematic maintenance plan for your software.
Backup your files.
Install or secure passwords.
Delete temporary files.
Update antivirus and spy ware.
MAINTENANCE PROGRAM DEFINITION OF TERMS
Maintenance Program- Is a comprehensive list of maintenance and its incidents. This would include all maintenance activities to be undertaken, manpower needed, maintenance methods to be used, all the
materials and supplies needed for the maintenance and cost involved in the maintenance.
Maintenance Schedule- Is a list allocating specific maintenance of an area. Equipment and tools to a specific period. The maintenance schedule is just a part of the maintenance program.
Quality management- Is a method for ensuring that all the activities necessary to design, develop and implement a product or service are effective with respect to the system and its performance.
The following diagram is the Shewhart cycle (PDCA) for quality improvements. Made popular by Dr. Deming.
The Quality Management Cycle(delete)
The philosophy is to keep improving the quality of an organization.
It is defined by the four key steps:
Plan: Design and revised business process components to improve results.
Do: Implement the plan and measure its performance.
Check: Assess the measurements and report the results to decisions makers.
Act: Decides on changes needed to improve the process.
The consolidation phase enables the organization to take stock of what has been taking place and to ensure made to processes that require documentation (both to allow processes to be repeatable and to facilitate recognition of the achievement of some form of quality standard).
1. Plan. Here in this stage an organization must be able to prepare a good maintenance program which will define the standards for Best Management Practices. The maintenance program must clearly answer the
question on WHY, WHO, WHAT, WHEN, WHERE and HOW.
Why Maintain?
1. General Objective:
To maintain the optimum condition of physical facilities at acceptable levels and minimum cost to satisfy the expected demands of TVET programs and activities.
2. Specific Objectives:
To extend the useful life of physical facilities.
To assure the operational readiness of installed equipment and maximum possible return on investments.
To properly discard hazardous wastes.
To ensure the safety of personnel using the facilities, physical properties and the environment.
What can we gain from maintaining our facilities?
Ensured SAFE environment
Improve MORALE of human resources
Reduced operational COST
Increased PRODUCTION
Prolonged LIFE facilities
Prompt DELIVERY of services/ product
WHO?
Who will manage the activities?
Who will monitor and evaluate the operations?
Who will prepare the maintenance schedule?
Who will implement the progamill? conduct inspection?
Who will certify and accept the work?
Who will prepare the report?
What, Where, When?
What routine actions must be done to keep the device on working order?
Where is the maintenance activity to be carried out?
When do you perform the maintenance activities?
How to maintain?
The question on how do we implement the maintenance program will center on the 5Ms are as follows:
Manpower
Money (Financial Resources)
Methods and System
Machines (Facilities)
Materials and Supplies
2.DO. Here in this stage the organization through the clearly identified Maintenance Program, must be able to practice the Methods and System defined in order to meet the standards (measurable performance levels of maintenance execution) established.
5S
Maintenance Methods
Preventive Maintenance
Corrective Maintenance
Overall, the combination of standards, methods and strategies are elements of an integrated Planted Maintenance System.
SAMPLE EQUIPMENT MAINTENANCE SCHEDULE
In order to perform the maintenance of specific equipment, a Maintenance
Schedule is drawn to guide the personnel in the proper methods system. One best source of the list of the maintenance activities of equipment is its manufacturer’s manual, In the absence of it, the plan can be derived from the known maintenance methods of the equipment.
Below is the sample Equipment Maintenance Schedule for Welding Machine in the Practical Work area of a Training Center for SMAW NCII. You may see that that this maintenance schedule is for a specific equipment only, denoted by unique property code.
3. CHECK. To determine if the maintenance program is implemented according to what is planned, an assessment must be done. The result of the assessment will then be recorded and recorded to the proper
authorities for the immediate action.
Regular inspections are conducted to assure that the maintenance activities are done on the date and time it was planned and that the performance levels adhered to the defined standard.
SAMPLE EQUIPMENT INSPECTION CHECKLIST
Below is a sample Maintenance Inspection Checklist. You may note that this checklist pertains to the same equipment with the Maintenance Schedule (see sample). This checklist will confirm if the maintenance activities have been performed in order to prolong the life of this particular equipment. The Inspection items are stated in a question form as these serve as the criteria or standards of maintenance.
4. ACT. The inspection will allow the organization to determine if the standards of maintenance are met. This will also allow the identification of further improvement in the process and procedures. Hence, the results of the inspection must be properly documented and reported to the proper authorities for immediate action or correction needed.
A. PROPER UTILIZATION OF EQUIPMENT AND TOOLS
The proper use of the training tools and equipment is the first and foremost task in the maintenance. The proper use of tools and equipment is a very important task of the worker in any trade. They must be able to use them in accordance to the manufacturer’s manuals as this would evidently extend the life of the equipment and tools.
USER’S MANUAL: For the Safe and Proper Operation of an Equipment or Tools. When using equipment and simple tools, it is best to read the manufacturer’s and/or user’s manuals. This would indicate the part of the equipment, the functions of each part and the way to maintain it. We must always refer to it for referent cue. The user’s manuals must be kept handy and within the Quality Control Area where the equipment is kept for immediate reference.
INFORMATION SHEET 4.2-1
PERSONAL PROTECTIVE EQUIPMENT
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to be familiar and use the Personal Protective Equipment properly.
Personal Protective Equipment
It refers to protective clothing, helmets, goggles, or other gear designed to protect the wearer's body or clothing from injury by electrical hazards, heat, chemicals, and infection, for job-related occupational safety and health purposes.
PPE can also be used to protect the working environment from pesticide application, pollution or infection from the worker (for example in a microchip factory).
Students e v e n during t heir laboratory period should require to use of personal protective equipment. Some of these are:
Goggles – A large spectacles, with shields around the rims, for protecting the eyes from dust, excessive light, wind, etc.
Rubber Sole – A special type of shoes used to prevent
electrical shock and for waterproofing and insulating purposes.
Apron – A garment worn over the front o f t h e body as a protection for one’s cloth.
Dust Mask - A covering for the face to prevent the inhaling or absorbing dust and other chemicals.
Gloves - The covering material with a separate sheath for each
finger used for hand protection.
Anti-Static and Safety Precautions
The little shock you experienced while you are walking across a carpeted floor or touched a door knob, table, counter or even another person is a result of static electricity. Static electricity is the discharge
of electricity between two objects with different electrical potential. Humans can't feel a static shock until it is several thousand volts strong, but it takes less than 30 volts to fry a sensitive computer component,
such as a stick of RAM or a processor.
That’s why computer technicians and home computer builders have to guard their computers against the deadly ravages of static electricity, as well as take steps to avoid injury to yourself.
Safety and Anti-Static Rules
When possible, try to avoid working in carpeted areas. Carpeting greatly increases static buildup within your body.
Always use an anti-static wrist strap when working on a computer (except when working on monitors).
Always disconnect a computer from the AC power and from any powered peripherals while you are working on it.
Always grasp a metal part of the computer chassis with your bare hand before you touch anything inside. Do this even if you are wearing an anti-static wristband.
Always handle electronic components by a non-conducting (non-metallic) edge. Don't touch the pins or other connectors.
Never plug an ATX power supply into AC power unless it is connected either to a computer's motherboard or to a dummy test load.
Always use a UL-approved surge protector or an Uninterruptible Power Supply that incorporates surge and spike protection.
Never eat, drink, or smoke while working on a computer.
INFORMATION SHEET 4.2-2
Preventive maintenance of computer system and network
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to
Maintain Computer System and network.
TO DEFRAGMENT YOUR HARD DISK
1. Open Disk Defragmenter by clicking the Start button In the search box, type Disk Defragmenter, and then, in the list of results, click Disk Defragmenter.
2. Under Current status, select the disk you want to defragment.
3. To determine if the disk needs to be defragmented or not , click Analyze disk.
If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
Once Windows is finished analyzing the disk, you can check the percentage of fragmentation on the disk in the Last Run column. If the number is above 10%,you should defragment the disk.
4. Click Defragment disk. If you're prompted for an administrator password or confirmation, type
the password or provide confirmation.
Disk Defragmenter might take from several minutes to a few hours to finish, depending on the size and degree of fragmentation of your hard disk. You can still use your computer during the defragmentation
process.
Notes
If the disk is already in exclusive use by another program or is formatted using a file system other than NTFS file system, FAT, or FAT32, it can't be defragmented.
Network locations can't be defragmented.
If a disk that you're expecting to see under Current status is not showing up there, it might be because it contains an error. Try to repair the disk first, then return to Disk Defragmenter to try again.
Delete files using Disk Cleanup
Windows 8.1/Windows RT 8.1
You can use Disk Cleanup to reduce the number of unnecessary files on your drives, which can help your PC run faster. It can delete temporary files and system files, empty the Recycle Bin, and remove a variety of
other items that you might no longer need.
TO DELETE FILES
The following procedure deletes files associated with your user account.
You can also use Disk Cleanup to delete system files on your PC.
1. To open Disk Cleanup from the desktop, swipe in from the right edge of the screen, tap Settings (or if you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up,
and then click Settings), tap or click Control Panel, type Admin in the Search box, tap or click Administrative Tools, and then double-tap or double-click Disk Cleanup.
2. In the Drives list, choose the drive you want to clean, and then tap or click OK.
3. In the Disk Cleanup dialog, select the checkboxes for the file types that you want to delete , tap or click OK, and then tap or click Delete files.
TO DELETE SYSTEM FILES
The following procedure deletes system files on your PC. This option, in addition to cleaning up the files associated with your account, allows you to delete previous Windows installations, Windows Defender files, and Windows upgrade log files that you might no longer need.
1. To open Disk Cleanup from the desktop, swipe in from the right edge of the screen, tap Settings (or if you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings), tap or click Control Panel, type Admin in the Search box, tap or click Administrative Tools, and then double-tap or double-click Disk Cleanup.
2. In the Drives list, tap or click the drive that you want to clean up, and then tap or click OK.
3. In the Disk Cleanup dialog box, tap or click Clean up system files. You might be asked for an admin password or to confirm your choice.
4. In the Drives list, choose the drive you want to clean, and then tap or click OK.
5. In the Disk Cleanup dialog box, select the checkboxes for the file types you want to delete , tap or click OK, and then tap or click Delete files.
6. If you want to free up even more space on your PC, tap or click More Options and choose from the options:
Programs and Features. Uninstall programs you no longer use.
The Size column shows how much space each program uses.
System Restore and Shadow Copies. Delete all but the most recent restore point on the drive. System Restore uses restore points to return your system files to an earlier point in time. If your PC is running normally, you can save space by deleting the earlier restore points. In some editions of Windows, restore points can include previous versions of files, known as shadow copies, and backup images. These files and images will also be deleted.
How to Run Disk Cleanup on a Windows 7 Computer
The Disk Cleanup utility removes unnecessary files to free up space on the disk drive of your choice. To run Disk Cleanup on a Windows 7 computer, follow these steps:
1. Click Start.
2. Click All Programs | Accessories | System Tools | Disk Cleanup.
3. Select Drive C from the drop-down menu.
4. Click OK.
5. Disk cleanup will calculate the free space on your computer, which may take a few minutes.
6. After the calculation is complete, you should see a dialog box that looks similar to the following:
7. Confirm that only the following checkboxes are checked:
Downloaded Program Files
Temporary Internet Files
Recycle Bin
Temporary Files
8. Click OK.
9. You will see a dialog box that prompts you: Are you sure you want
to permanently delete these files?
10. Click Delete Files.
11. Disk cleanup will delete the files and close automatically.
Add Disk Cleanup in Server 2008
Keeping your hard drive clutter-free is essential to having a well-run server. The tool to accomplish this is Disk Cleanup, but it is conspicuously missing in Server 2008… or is it?
To enable Disk Cleanup, we’ll first open Server Manager by clicking on the Server Manager icon next to the Start button.
In Server Manager, scroll down to the Features section and click on Add Features in the upper right area.
The Disk Cleanup tool is bundled into the Desktop Experience Feature, so we’ll check to install that.
We haven’t previously added the Ink and Handwriting Services, so we get a popup window informing us that they are required in order to install Desktop experience we'll click on Add Required Feature s to proceed.
Next, we’ll click the Install button and be on our way.
Once the features have been installed, the system will need a reboot in order for the changes to take effect.
After the reboot is complete , we can find the Disk Cleanup tool in Accessories | System Tools.
We’re not sure why Microsoft decided to omit Disk Cleanup from Server 2008 by default, but at least it’s pretty easy to add back into the tools.
View your browsing history and delete specific sites
By viewing your browsing history, you can choose to delete specific sites or return to a webpage that you've already visited.
1. In Internet Explorer for the desktop, tap or click the Favorites button
2. Tap or click the History tab, and choose how you want to view your history by selecting a filter from the drop-down menu:
View by Date shows your last three weeks of history in chronological order.
View by Site shows a list of sites you visited in the last three weeks, but not the dates of your visits.
View by Most Visited shows your most visited sites in the last three weeks.
View by Order Visited Today shows only sites you visited today.
To delete specific sites, press and hold (or right-click) a site from any of
these lists, and then tap or click Delete. Or return to a page by tapping
or clicking any site in the list.
Delete your browsing history
Regularly deleting your browsing history helps protect your privacy, especially if you're using a shared or public PC. What gets deleted when you delete your browsing history?
Regularly deleting your browsing history helps protect your privacy, especially if you're using a shared or public PC.
What gets deleted when you delete your browsing history?
Browsing history, the list of sites you've visited.
Cached images and Copies of pages, images, and other media content temporary Internet stored on your PC. The browser uses these copies to files load content faster the next time you visit thosesites.
Cookies
Info that sites store on your PC to remember your
preferences, such as sign-in info or your location.
Download history the list of files you've downloaded from the web
This only deletes the list, not the actual files
that you've downloaded.
Saved form data
Info that you've entered into forms, such as your email or a shipping address.
Saved passwords
Passwords that you've saved for sites.
Tracking Protection, ActiveX Filtering, and Do Not Track data
Websites you've excluded from ActiveX Filtering, and data that the browser uses to detect tracking activity.
Favorites
The list of sites that you've saved as favorites. Don't delete favorites if you only want to remove individual sites—this will delete all of your saved sites.
Back up your files
Windows 11
To help ensure that you don't lose your files, you should back them up regularly. You can set up automatic backups or manually back up your files at any time.
To back up your files
1. Open Backup and Restore by clicking the Start button clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
2. Do one of the following:
If you've never used Windows Backup before, click Set up backup, and then follow the steps in the wizard. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by clicking Back up now. If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.
Notes
We recommend that you don't back up your files to the same hard disk that Windows is installed on.
Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place to prevent unauthorized people from having access to your files—we recommend a fireproof location separate from your computer. You might also consider encrypting the data on your backup.
To create a new, full backup
After you create your first backup, Windows Backup will add new or changed information to your subsequent backups. If you're saving your backups on a hard drive or network location, Windows Backup will create a new, full back up for you automatically when needed. If you're saving your backups on CDs or DVDs and can't find an existing backup disc, or if you want to create a new backup of all of the files on your computer, you can create a full backup. Here's how to create a full backup:
1. Open Backup and Restore by clicking the Start button ,clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
2. In the left pane, click Create new, full back up.
Note
You will only see this option if your backup is being saved on CDs or DVDs.
To set up a backup after upgrading from a previous version of Windows.
After you upgrade Windows, you will need to set up Windows Backup, even if you had a scheduled backup in the previous version of Windows. This is because there are several changes to the backup program. Instead of selecting file types to back up, you can have Windows back up data files saved in libraries, on the desktop, and in default Windows folders, or you can choose specific libraries and folders to be backed up. You can also create a system image of your computer. For more information,
To set up your backup, follow these steps:
1. Open Backup and Restore by clicking the Start button ,clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
2. Click Set up backup, and then follow the steps in the wizard. If you're prompted for an administrator password or confirmation, type of password or provide confirmation.
Network Maintenance
Performing proactive and scheduled maintenance ensures maximum reliability and the overall lowest TCO through minimizing costs and losses that are associated with downtime and replacement. Preventative maintenance is normally included within our standard support packages; however, we also provide maintenance services to those clients who have an in-house IT team and who want their team to be allocated to more specialized tasks.
These preventative maintenance tasks are performed on:
Server and storage infrastructure
Desktop infrastructure
Network equipment
Backup and security systems
Each maintenance task can be performed at a standard frequency or on a specific nominated basis appropriate for your environment. These tasks include:
Patch management
Log file review and corrective action
Security vulnerability testing
Anti-Virus and Anti-Spam management
Active directory account review
Archiving and data file management
Routine backup verification and test restores
Threshold trending and management – CPU, RAM, disk, network bandwidth
Application interoperability and alerts
o Asset management tasks
o Custom maintenance tasks developed to meet unique requirements.
Note that many maintenance tasks are performed in “real-time”. That is, we use our monitoring and IT Management Systems to automatically raise alerts based on pre-defined thresholds or known error conditions which are then actioned by our maintenance team as they happen.
Server Logs
Compare event logs errors and warnings against database of known errors. Investigate any "unknown" errors for severity. Escalate any appropriate errors as Incidents via maintenance team.
Server Patching
Review Critical updates and prepare for periodic application: Confirm a suitable Change Window with the client, check backups, apply critical patches, reboot, and test server functions. Optionally apply non-critical
patches depending on server role.
Server Anti-Virus
Verify server anti-virus protection software is running correctly and virus definitions are being updated. Escalate any Virus definition update failures as Incidents. Compare Virus errors and warnings against database of known errors.
Server Disk Capacity
Check remaining disk capacity, all relevant partitions. Establish and maintain relevant free disk space alert thresholds. Escalate any disk space threshold breaches as Incidents.
Server Optimization
Review the server for overall performance Examine disk I/O, RAM, CPU, check fragmentation, perform relevant clean-up tasks.
Database maintenance
Monitor MS Exchange and MS SQL server database size, Check Message queue length, Check running processes.
Backup Notifications
Monitor backup notifications for previous run Success / Fail. Log into servers to investigate failed notifications.
Backup Spot Checks
Perform a Backup Spot Check to manually verify Read / Write success. Select a random sample of data and perform a test restore to spare media. Verify overall backup size is commensurate with overall Customer data size.
INFORMATION SHEET 4.3-1
Diagnostic
Procedures
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to Perform Diagnostic procedures
Diagnose a Computer Problem
Many people are faced with everyday computer problems that are easy to fix, but are unable to diagnose the actual problem. While there are many problems a computer will be faced with, this article will tell you
where to look for common problems.
Steps
1. Check the POST. POST stands for Power On Self Test. This is generally the first or second thing that appears on a computer after turning on the power. This appears before the operating system
begins to load. The POST will display any problems found with hardware that makes the computer unable to boot, POST may also display problems with hardware that allow the computer to boot, but
not operate at its full capacity during operation.
2. Notice the load time of the OS (operating system). A longer than usual load time may indicate seek errors (or other errors) in the hard drive.
3. Notice any graphics problems once the OS has loaded. Reduced graphics may indicate driver failures or hardware failures with graphic cards.
4. Perform an auditory test. An auditory test is an unorthodox, but still effective way of judging how hard a computer is working. With the computer on and running, play any decent length audio file (usually above 30 secs). If the audio is choppy or slow, it usually means that the processor is working at an elevated level, or there is not enough RAM to run all programs loading. Changing the startup sound is a great way to apply this test. Another issue associated with choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the hard drive reads and writes data from a drive. Switching to DMA allows for faster reads and writes, and can sometimes repair choppy audio.
5. Check any newly installed hardware. Many operating systems, especially Windows, can conflict with new drivers. The driver may be badly written, or it may conflict with another process. Windows will usually notify you about devices that are causing a problem, or have a problem. To check this use the Device Manager, this can be accessed by entering the Control Panel, clicking the System icon, clicking the Hardware tab, and clicking on Device Manager. Use this to check and arrange the properties of hardware.
6. Check any newly installed software. Software may require more resources than the system can provide. Chances are that if a problem begins after software starts, the software is causing it. If the problem
appears directly upon startup, it may be caused by software that starts automatically on boot.
7. Check RAM and CPU consumption. A common problem is a choppy or sluggish system. If a system is choppy it is good practice to see if a program is consuming more resources than the computer can
provide. An easy way to check this is to use the Task Manager, right click on the taskbar select Task Manager, and click the Processes tab. The CPU column contains a number that indicates the percentage of
CPU the process is consuming. The Memory Usage column indicates how much memory a process is consuming.
8. Listen to the computer, if the hard drive is scratching or making loud noises, shut off the computer and have a professional diagnose the hard drive. Listen to the CPU fan, this comes on a high speed when the CPU is working hard, and can tell you when the computer is working beyond its capacity.
9. Run a virus and malware scan. Performance problems can be caused by malware on the computer. Running a virus scan can unearth any problems. Use a commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus) and a commonly updated malware scanner (such as Spybot Search & Destroy).
10. Check for the problem in safe mode. As a last ditch effort, check the problem in safe mode. To enter safe mode, tap F8 repeatedly during POST (this works on most systems). If the problem persists in safe mode, it is a fair bet that the operating system itself is to blame.
PC Diagnosing
Probably the most frustrating problem computer users run into are startup problems, where your computer won’t boot.
Equally annoying are error messages you constantly run into during your computer’s startup process. In this module you will be given a few tips on how you can avoid some of the most common problems that happen right after your computer turns on.
Troubleshooting Plan for Personal Computers
How to Troubleshoot the Computer?
Here you will learn the basic troubleshooting methods of your computer.
Trial and error: When you find a faulty component in your computer, check it with the other computers so that you can make sure whether the fault is in the component or not.
Check cables: In case of any device failure, check all the cables of your computer such as data cables, power cable, internal circuitry cables and make sure that all these are plugged in and working fine.
Hardware settings: Check the hardware settings in the CMOS and in the device manager of the system and make all the device drivers are up to date and all the cards are plugged in properly.
Notice changes: When you notice a software or hardware error in your computer, determine what was changed before the problem occurred.
Event viewer: In the event viewer, you will find the error or warning messages associated with any faulty hardware or software.
Make notes: Troubleshooting is a big learning option and we can learn a lot when we face any kind of troubleshooting in our computer. Make notes including the error messages and their solutions, so that you have a record on how a certain problem occurred and how did you solve it.
Sample Diagnostic Plan
List down all possible components to be checked based on the symptoms.
Common Trouble for Computer Units
1. Double check the power connections.
2. Voltage Regulator and power supply could cause power failure in the computer unit.
3. Check the power cords and cable connectors in your computer unit.
4. Unseated card. Loose cards could cause it to malfunction.
5. Do you have ink or toners in your printer? Check the ink toners/cartridges in your printers.
6. Check the boot sequence configuration in the advance BIOS (Basic Input/output Unit) setup.
Diagnosing Network Connection
These are the things to look for if a PC will not connect to the internet or network.
First check the cable connecting to the network card into the network hub.
Check the back of the computer to see if the network card light is on
Check the network cable
Check the network HUB
INFORMATION SHEET 4.3-2
Identifying and isolating faults/ problems
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to Identify and isolate faults/ problems.
Techniques for diagnosing computer system
1. Computer Diagnosis
2. Rules In Diagnosing Computer System
3. Factors Causing Computer Failures and Defects
4. Problem Isolation
5. Component Isolation
Computer Diagnosis
Sometimes when the problem with a system is not totally apparent and the problem may be intermittent, using a basic common diagnostic procedure may help determine what is wrong. This procedure has a
number of steps that, if followed each time, can be of help.
Rules in Diagnosing Computer System
1. Know the facts Educate oneself on all aspects and operation of computer parts.
Continuous learning on computer technology.
2. Use your common sense.
3. Focus on Field Replaceable Units Identify the different types of FRU that can be used for replacement
or subassembly.
4. Proper assembly and disassembly.
Factors Causing Computer Failures and Defects
1. Peopleware
2. Firmware
3. Software
4. Hardware
5. Static (ESD)
6. Electricity
Peopleware
Untrained personnel would probably damage programs in PC.
Firmware
Programs or software burnt in chips may be corrupted.
Software
Corrupted operating systems would cause the system to fail.
Hardware
Defective hardware components would lead to computer malfunction.
Hardware conflicts and viruses can hinder your computers performance.
ESD (Electro Static Discharge)
Electro static discharge can easily damage sensitive components in your computer.
Electricity
Incoming supply from AC outlet must be regulated, power surges can damage computer units.
Problem Isolation
Problem isolation is a detective work in which you need to determine what is out of the ordinary by making detailed observation of what is not working normally and record any information as you proceed.
The information you will be able to gather will help diagnose your computer. You need to observe wisely. Look for any abnormalities in the unit, any change in smell or foreign smell, listen to all the sounds, and
error codes.
Component Isolation
This section will aid in determining components in your system which are failing. First, most systems have 3 major components; monitor, system unit, and printers. Some have multiple external devices. To
troubleshoot, you need to isolate major components which are failing to operate.
Figure 1. Computer system connection
INFORMATION SHEET 4.4-1
Defects in Computer Systems & Networks
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify
defects in computer systems & networks
Testing Procedures
Deciding When to Test the System. Identify computer symptoms and defects.
Preparing to Test the System . It’s recommended that you should not plug your computer and monitor directly to a wall outlet. Rather, you should purchase a UPS (uninterruptible power supply). The UPS serves as a surge protector to prevent your system from being damaged if a power spike is delivered to it and when power will fail unexpectedly. The UPS gives you time to save your work and properly shut down your system. If a system is turned off and back on rapidly, it’s probably not good for the system. A very short power drop could mimic this effect and could be hard on both the computer and the monitor.
Test Your Computer Memory RAM
Most Computer Memory comes with a life time warranty from the manufacturer but this can be very inconvenient. You can return memory easily to the seller in the 1st 2 weeks but most problems show
themselves much later and it always seems to happen when you need your computer the most. Learn how to detect problems in the 1st 8 hours after you install memory and save yourself from headaches and inconvenience down the road.
Memory is an easy upgrade but how do you know its running at the advertised speed? Do you know for sure its running error free? Memory can arrive from the seller and have a defects that won't be seen for weeks or a months. But then it happens. Blue screens, freezing, memory errors, spontaneous reboots. All signs of defective memory. Read on to learn how to protect yourself from buying bad memory.
Instructions
Things You'll Need:
New memory
CD burner
Blank CD-R or CDRW
1. We will assume you know how to buy the right memory. If not, visit my article on buying the right memory.
2. Shut down your PC, unplug your computer, and Open the cover. TIP: If you have toggle switch on the back of your power supply, you can add more safety by turning the switch off and leaving the computer plugged into the wall outlet. Yes, leave it plugged with the hard power switch off. This provides an excellent ground to your computer with no actual power applied.
3. We have 2 sticks of new memory rated for our computer. Lets assume our computer has 4 slots. 2 slots are filled, 2 are empty. With the case open, open the levers on the side of the installed memory sticks and remove them. Put them in a safe place.
4. Insert the new memory sticks in the same place the old sticks were and lock the levers. The reason we are doing these extra steps is so we can test the new memory. Leaving in the old memory can affect the new memory's speed reading or even errors in the old memory will not be clearly the fault of the old memory.
5. Turn on the power and boot up. Watch for the prompt to access SETUP or BIOS. Most popular keys for this are DEL, F2, or F10.
6. Inside the BIOS or Setup screen, look for the section called memory. Check to see the memory is running at the speed you purchased and displays the full amount you purchased. Exist setup and allow computer
to boot up fully.
7. Download Memtest86+ 2.11. Its free and supports DDR2 and DDR3 memory. Unzip the file and create a CD using the ISO file using your favorite cd burner program. This is a bootable CD.
8. Reboot the PC and insert the CD you just made before the post screen is done. Assuming your PC is set to boot from the CD first,(most are), the CD will start up the MEMTEST program and start running. This will run over and over. It will also count how many times its run and the number of errors it encounters. The number of errors should be zero.
9. Let it run for up to 8 hours. Once you are satisfied, exit the program using the legend on screen. Remove the CD, and turn off the computer.
10. You now know you have reliable memory that will likely last for years to come.
How to Tell if a Motherboard Is Defective
The motherboard is the backbone of your computer as it is the piece that all of the other components are connected to. If your computer will not boot up properly or power on at all the problem may potentially lie with the motherboard. Because so many other components are connected to the motherboard you will need to troubleshoot each other part first.
Instructions
Things You'll Need:
Screwdriver
Replacement processor
Replacement RAM modules
Replacement video card
1. Turn the computer off and then remove the power cable from the electrical wall outlet. Plug a power cable from a different electrical device into the outlet and power it on so that you can rule out the outlet as your problem. Connect the computer's power cable back into the outlet.
2. Power the computer back on and place your hand behind the case near the power supply. Wait a few moments to see if any air is pushed out of the power supply by the cooling fan. Replace the power supply
instead of the motherboard if the fan is not working.
3. Shut down the computer again and pull out all of the cables from the back side of the case. Remove any other devices you have connected to the front ports on the computer such as a USB printer or jump drive.
4. Set down the computer so that the left side panel is facing towards you. Unlock the side panel from the computer case by removing the case screws if there are any. Twist of the thumbscrew or pull up on the
metal holding latch if the computer does not use case screws.
5. Remove the screws holding any expansion cards to the case and then pull them off the motherboard. Pull out all of the cables running from the motherboard to the power supply and drive bays. Pull out the
screws holding the motherboard to the case. Pull the motherboard straight up out of the case and set it down carefully on a flat non- metal surface.
6. Check to make sure that there is no physical damage to the motherboard such as bent pins or burnt transistors. Purchase a new motherboard and place it back in the case if there is any visible damage.
7. Remove the screws holding the power supply to the case and slide it out of the drive bay. Set it down near the motherboard and connect the SATA cable from the motherboard to the power supply. Connect
the power cable from the power supply to a wall outlet. Plug cable from the computer's monitor into the corresponding port on the motherboard.
8. Remove the RAM modules and replace them with another set. Press down the power button on the motherboard with a screwdriver or another flat object. Wait to see if the computer loads up without error,
which will indicate that the problem is with the RAM modules instead of with the motherboard.
9. Power the motherboard back off and replace the processor with a different one. Turn the motherboard back on and see if the system boots up normally, which will indicate a defective processor.
10.Turn the motherboard off and replace the video card with a different one. Power the motherboard on and see if the system boots up, which will indicate a defective video card.
11.Replace the motherboard if the system still will not boot up after all of the other components have been checked.
How to Know If a Sound Card Is Bad.
You turn on your computer one morning, hoping to listen to the morning news, but there's one tiny little problem. You're not getting any sound out of the speakers. A few simple steps will determine what is wrong.
Instructions
Things You'll Need:
Extra set of speakers
Another computer
Internet access
1. Try restarting the computer to see if it does it again. It may be a freak incident.
2. If that doesn't work then check to make sure that everything is plugged in and is turned on. This includes checking the wires from the speakers to the computer and making sure the speakers have power. Also check to see if the volume isn't muted or turned down extremely low.
3. Check to see if the driver is working.
Click the start menu, right click on the computer icon, and select properties. On the left hand side under task select device manager
and select sound, video and games controller. Double click on your sound device to bring up the properties page. From here it will tell
you if your sound card is working properly or not. If it isn't try reinstalling the sound card driver. If the sound card is not showing up at all, then it might be defective.
4. The next step is to rule out the speakers. Either take them and hook they up to another computer to see if they work or you can take different speakers and hook it up to the computer to see if they work.
If they do work chances are the card is defective.
5. Before ruling out the sound card is toast, try rolling Windows back to an earlier date by using System Restore which is located under accessories > System Tools. Restore the computer to a few days before
the problem started to happen.
INFORMATION SHEET 4.4-2
Replacing or correcting defective components or parts
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to Replace or correct defective components or parts.
Computer Parts Replacement
Replacing computer parts and peripherals you need to consider the following factors:
1. Compatibility of the component or part
2. Consider the component specification
3. Components form factor
Compatibility of the Component
When replacing computer parts you should check if it is compatible with your unit. Double check on your computer manual if the component you are replacing is compatible or not with the unit because this may lead to system crash.
Component Specification
This focuses on the specification of the component. Check if the voltage rating, current rating, memory size and frequency matches your computer unit.
Form factor
The components’ manufacturer should be considered. Check if the unit you are trying to repair or upgrade is generic or branded units. Branded units have their own set of components compatible only to their units, while genetic types can be used only to generic type of units.
Memory - is technically any form of electronic storage; it is used most often to identify fast, temporary forms of storage. It is commonly called RAM (Random Access Memory).
Video Cards - is also referred to as a graphics accelerator, is an item of personal computer hardware whose function is to generate and output images to a display.
Network Interface Card – is also known as LAN card. A PC interface to network cabling. It is a piece of computer hardware designed to allow computers to communicate over a computer network.
Hard disk drive – Is a fixed computer storage medium.
Motherboard – Is also known as the mainboard. It contains circuits that perform various functions.
Processor – Is also known as CPU or the Central Processing unit.
General Safety Tips and Reminders
Observe good housekeeping in the area of the machines during and after maintenance.
Place removed covers and other parts in a safe place, away from all
o personnel, while you are servicing the machine.
Dress for the Job
Keep your tool case away from walk areas so that other people will not trip over it.
Do not wear loose clothing that can be trapped in the moving parts of a machine. Ensure that your sleeves are fastened or rolled up above your elbows. If your hair is long, use hair net or hair cap.
Insert the ends of your necktie or scarf inside clothing or fasten it with a nonconductive clip, approximately 3 inches from the end.
Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners for your clothing.
Remember: Metal objects are good conductors
After service, reinstall all safety shields, guards, labels, and ground wires. Replace any safety device that is worn out or defective.
Finally, reinstall all covers correctly before returning the unit to the customers.
Electrical safety
Electric current from power, telephone, and communication cables can be hazardous. To avoid personal injury or equipment damage, disconnect the attached power cords, telecommunications systems, networks and modems before you open the server/workstation covers, unless instructed otherwise in the installation and configuration procedure.
Precautions
Disconnect all power before:
Performing a mechanical inspection
Working near power supplies
Removing or installing main units
Before starting work on the machine, unplug the power cord.
Never assume that power has been disconnected from a circuit.
o First, check that it has been powered-off.
Always look carefully for possible hazards in your work
Moist floors
Non-grounded power extension cables
Power surges.
If an electrical accident occurs:
Use caution
Switch off power
Send another person to get medical aid
Safety Inspection Guide
1. These steps will help you to identify potentially unsafe conditions on these products:
Check exterior covers for damage (loose, broken, or sharp edges)
Power-off computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
Check for any obvious alteration. Use good judgment as to the safety of any alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets) have not been removed or tampered with.
Upgrading Your Computer Components
To upgrade means to change some parts with faster and better performing ones. These parts may even cost less and more powerful.
Commonly Upgraded Computer Parts:
Monitors - replaced old CRT monitors to new LCD monitors.
Optical drives - old cd-rom drives are commonly replaced with DVD-ROM and DVD writers.
Hard Drives - Small capacity hard drives are replaced with faster and high capacity hard drives.
Keyboards and mouse - Keyboards and mouse are commonly replaced with optical mouse and wireless keyboards.
RAM (Random Access Memory)- Upgrading the computer’s memory or RAM speeds up the performance of the computer.
Video cards - Upgrade computer’s graphics card to improve the computers performance in terms of graphics and games.
Processors - Replacing the possessors increases the data processing speed.
Modem - Installing a modem enables your computer to connect to the internet.
How to Speed up the Computer
1. Defragmenter utility: Automatically analyzes the empty disk space on the hard disk and defrag all scattered files.
2. Shutdown Unnecessary programs: Close all unwanted programs at the Windows startup and this will automatically increase the windows loading time and speed of the computer will also be increased.
4. Disk Cleanup: You can delete unwanted programs and files from your computer and this will be helpful in increasing the speed.
5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you will get the space of C drive for reusability.
Upgrade Desktop Memory
Installing memory can be done in a matter of minutes, but there’s no need to feel rushed. Work at your own pace and consult this guide or the video as often as you need to!
Step 1 - Gathering Supplies
Clear off your installation space and make sure you’re working in a static-safe environment. Remove any plastic bags or papers from your workspace. Then, you’ll need the following items:
Your desktop computer
Desktop memory
Screwdriver
Owner’s manual
Step 2 - Shut Down Your Desktop Computer
Because your files, documents, and data are on your storage drive, not your Random Access Memory (RAM), they remain unaffected during this.
Step 3 - Unplug the Power Cable
Step 4 - Hold the Power Button for Five Seconds
This discharges any residual electricity still in the system
Step 5 - Open the Case
For instructions about opening your specific system, consult its owner’s manual. You can also take pictures as you work through the process to see where cables or screws are attached to make it easier to put back together.
Step 6 - Ground Yourself!
Touch an unpainted metal surface – This is an extra safeguard that protects your computer memory and components from static damage during the installation process.
Step 7 - Remove Existing Memory Modules
Press down on the clips on the sides of each module, the clip mechanism will push the memory module up. You can then pull the module completely out.
Step 8 - Install Memory
Holding the modules along the edges, align the notches on the module with the ridge in the slot, then apply even pressure and firmly press the module in. It usually takes about 30 pounds of pressure to fully install the module.
Note
Some desktops require you to install modules in matched pairs (memory banks). If this is the case, the slots will likely be labelled for how the memory should be installed. If you only have two memory slots, don’t worry about this – proceed with the simple install.
Step 9 - Close the Computer Case
Step 10 - Plug the Power Cable in
Note: If your system does not boot up, check the following items:
If you receive an error message or hear a series of beeps, your system might not be recognizing the new memory modules. Remove and reinstall the modules. Push down hard on the modules until the clips fold back up.
If your system won't boot, check all the connections inside your computer. It is easy to bump a cable and pull it out of its connector, which will disable devices such as your hard drive or CD-ROM.
When restarting your system, you might get a message prompting you to update the configuration settings. Refer to your owner's manual for information. If you are still unsure, please call Crucial Technical Support for assistance.
If you get a memory mismatch message, follow the prompts to enter the Setup menu, and then select Save and Exit. (This is not an error—some systems must do this to update the system settings).
If the groove on the memory module and the ridge in the computer do not match up, do not force the module into the slot. You might have the wrong type of memory.
Your system recognizes only half of the new module's memory. To make sure the computer is registering the memory you’ve added, follow these steps:
1. Click on the Start menu or Windows button
2. Right-click on Computer or My Computer
3. Select Properties
4. You will see the Installed Memory (RAM) listed. It should match the amount you installed.
Video card Upgrade
1. Installing a graphics card
Installing a graphics card is a straightforward process that requires three things: a new graphics card, your computer, and a Phillips-head screw driver. Be sure to turn off your PC and unplug it from the wall before you begin.
You install a graphics card into a PCI-E x16 slot on your computer's
motherboard (the long, black slots in this picture.)
Unless you need to remove an existing GPU, you first need to locate the PCI-E x16 slot closest to the heat sink of your processor. This will either be the first or second expansion slot on your motherboard.
Make sure that there are no loose wires blocking your access to this slot. If you’re replacing an existing graphics card, unplug any cables connected to it, remove the screw from its retention bracket on the rear interior of your PC case, and then remove the card. Most motherboards also have a small plastic latch on the end of the PCI-E slot that locks the graphics card in place. Make sure you toggle this latch to unlock your old graphics card so you can remove it.
Don't forget to lock the latch at the end of the PCI-E slot after firmly inserting your graphics card!
You can now install your new graphics card into the open and unobstructed PCI- E x16 slot. Firmly insert the card into the slot, then push down the plastic lock on the end of the PCI-E slot to hold it in place. Next, use a screw to secure the graphic card's metal retention bracket to your PC's case. You can reuse the same
screw(s) that held the cover bracket or your former graphics card in place.
Your graphics card won't run unless you've connected it to your PSU.
Most gaming-level graphics cards require additional power connectors. If yours does, make sure you connect those PCI-E power cables. Your graphics card will not function correctly without properly supplied power. In fact, if you don’t connect those PCI-E power cables your PC may be unable to boot.
2. Wrapping up
With your graphics card secured and powered up, finish the job by sliding your case's side panel back into position and plugging your display cable into your new graphics card. Turn on your computer.
Now it’s time to take care of the software side of upgrading your graphics card.
If your new graphics card is the same brand as your old card, this process is simple. Just go to the manufacturer’s website and download the latest driver package for you operating system. Keep in mind that graphics drivers are quite large, generally about 300MB in size, and it make take some time for them to download depending on the speed of your Internet connection. Install the driver, restart your computer, and now you're ready to enjoy the buttery-smooth framerates your new graphics card will no doubt deliver. If you’re switching manufacturers (from Intel to AMD, from AMD to Nvidia, or vice-versa), uninstall your old graphics driver and restart your computer before installing the driver for your new graphics card. If you don’t uninstall the old driver it may conflict with the new driver.
How to upgrade a hard drive
In a computer, the hard drive is the primary storage device that provides storage space for files. If a computer is low on storage space and you want to increase the size of the hard drive, there are many options available.
It may seem the best option is to upgrade the existing hard drive in the computer. Unfortunately, upgrading a hard drive is not possible without also purchasing a hard drive duplicator.
A hard drive cannot have additional space added to it, making it impossible to upgrade an existing hard drive. Replacing the existing hard drive or installing an additional hard drive are the only options for adding more storage space in a computer.
Replace existing hard drive
1. To add more storage space, you can choose to replace the existing hard drive in the computer. Replacing the hard drive requires you to do the following.
2. Purchase a new hard drive that has more storage space than the existing one. We recommend checking the total storage space of the existing hard drive first before purchasing a new hard drive. Also, check if the existing hard drive uses IDE or SATA to determine the type of hard drive needed.
3. Backup your files, to later copy to the new hard drive.
4. Remove the existing hard drive by taking out the screws and disconnecting the cable.
Install the new hard drive.
Using the computer restore discs, re-install the operating system and original software that came with the computer. If you do not have a set of restore discs, you need to contact the computer manufacturer.
Copy the personal files you backed up in step 2 above onto the new hard drive.
Install additional hard drive
The most common option chosen by computer users to add more storage space is to install an additional hard drive. Doing so does not require the existing hard drive to be removed, which saves you time. To install an additional hard drive, do the following.
Determine if the existing hard drive uses IDE or SATA connections. Your computer must support the type of hard drive you want to install. Most computers built since 2012 support SATA. Computers older than 2012 may only support IDE.
Purchase the new hard drive.
Install the new hard drive.
After the new hard drive has been installed, enter My Computer or File Explorer, to ensure it is being read properly. In this case, it's the Extra Space (F:) drive.
INFORMATION SHEET 4.4-3
Hardware & software configuration
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to configure computer hardware & software
Computer configuration
In communications or computer systems, a configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware,
software, firmware, and documentation. The configuration affects system function and performance.
Hardware Configuration
Hardware configuration references the details and system resource settings allotted for a specific device. Many computer specialists improve hardware performance by adjusting configurations, which may also include settings for the motherboard and the BIOS, as well as the bus speeds.
With newer technology, most computers have plug-and-play (PnP) allowing the OS to detect and configure external and internal peripherals, as well as most adaptors. PnP has the ability to locate and configure hardware components without needing to reset jumpers and dual in-line package (DIP) switches.
Each device has a hardware configuration setting, which may include the following:
Interrupt Request (IRQ) Lines: These are hardware interrupt lines, which signal the CPU whena peripheral event has stopped or started.
Direct Memory Access (DMA) Channels: This is a method for transferring data from the main memory to a device without going through the CPU.
Input/Output Port: This connects the input and output devices to the computer. There is amemory address for each port.
Memory Address: There is a unique identifier used for each memory location. The memoryaddress is typically a binary number, which is numbered sequentially.
All hardware devices have configuration settings that can affect performance and system function. Hardware configuration information may include:
Available memory
Power management features
Devices that are connected such as modems, disc drives and serial ports
During power-on-self-test (POST), basic input/output system (BIOS) searches system configurations to determine what devices are present and how they interface with the CPU. After POST, when the computer and system configurations are found, the CPU uses the information to process instructions and data. Configuration information is stored in several ways using DIP switches, jumpers and complementary metal oxide semiconductors (CMOS).
Today most peripheral devices use PnP, which will auto-configure the DMA, IRQ and I/O address. Older systems that do not have PnP require a new device to be set by using jumpers or DIP switches. Using Msconfig to troubleshoot software issues in Windows 7 Msconfig helps Windows control the software that automatically loads while Windows is starting. For troubleshooting purposes, use the following steps to prevent all software programs from automatically opening when Windows starts.
CAUTION:
Use the following steps to prevent all startup items from opening, including antivirus software and other software that provides important functions. Follow these steps for troubleshooting purposes only. If preventing all startup items from loading resolves the problem, you can use the Startup tab ( see following section) to prevent an individual software item from loading.
1. Click Start, and then type msconfig into the Search box. Click msconfig.
If you are prompted for an Administrator password or confirmation, type the password or provide confirmation.
Figure : Opening the System Configuration tool. The System Configuration tool displays.
2. lick the General tab.
3. Select Selective startup, and then remove the checkmark next to Load startup items. Click the Services tab.
4. Select Hide all Microsoft services, and then click the Disable all button.
5. Click OK.
6. Restart the computer for the changes to take effect.
7. If you find the problem no longer occurs after you prevent all software from loading, you can use the startup tab to try and find the exact software title that is causing the problem. Select all but one title
from the startup tab and restart. Continue doing this, deselecting software and restarting each time until the problem no longer occurs. Uninstall or prevent software from loading that cause problems.
8. When you have finished using the System Configuration tool, open it again and select Normal startup. Click OK.
Figure : General tab Normal startup
opening with Windows. The following selections are on the General tab:
Normal startup
-instructs Windows to open all software applications that are normally scheduled to start with Windows.
Diagnostic startup - starts Windows with
basic services and drivers only. With this mode, you can determine if a basic Window file is
the problem.
Selective startup - allows you to choose which programs and services you want to open, and which you want to keep from opening at startup tab.
Boot tab
The Boot tab shows configuration options listed inside the system information file. Some options in the Boot tab follow. Safe boot: Minimal - Disables networking. Boots to the Windows user interface (Explorer) in safe mode, running critical system services only. Safe boot: Alternate shell - Disables networking. Boots to the command prompt in safe mode, running critical system services
only.
Safe boot: Active Directory repair - Similar to minimal safe boot, except the Active Directory is enabled.
Safe boot: Network - Similar to a minimal safe boot, except the network is enabled.
No GUI boot - The Windows splash screen is disabled when
booting
Boot log - Stores all information from the boot process in a file.
Base video - Boots to Windows user interface in minimal VGA mode.
OS boot information - Shows each driver name as each driver is loaded during the boot process.
Make all boot settings permanent - Changes made in System Configuration are not tracked. If you want to make changes later, you will have to do so manually. Selecting Normal startup in the General tabwill not work if this feature is selected.
Timeout field - Using Msconfig can cause the operating system selection screen to display for thirty seconds; as a result, thirty seconds is added to the overall startup time. To prevent the
operating selection screen from appearing for thirty seconds on startup, change the timeout line in the Timeout field to zero.
Services tab
The Services tab lists the programs that start when
Windows 7 starts, or are run periodically by Windows. Enable or disable programs from starting by checking or disabling the checkbox next to the program name.
Startup tab
The Startup tab lists software applications that open automatically after Windows opens. It also shows their current status (Running or Stopped). Disable individual software applications by removing the checkmark next to the name and path. Do not disable the following startup items except for diagnostic purposes only:
NOTE:
This list is not comprehensive. For a more thorough list of software tasks, refer to Preventing Programs from Opening When Windows Starts.
HD Audio Control Panel
HP KBD EXE
hp digital imaging - hp all-in-one series
HPRun
hpsysdrv
HP Total Care Advisor
Microsoft Windows Operating System
NVIDIA products
Symantec Technologies products
The following is a list of some of the types of software applications that open from the Startup tab:
Anti-virus software - Disable Anti-virus software only when troubleshooting. Make sure to enable the Anti-virus software when finished troubleshooting.
Keyboard managers - Disable to prevent the extended multimedia keys and volume control knob from working.
Systems tray icons - Disable to prevent a software application tray icon from displaying on the systems tray (next to the time).
Tools tab
The Tools tab lists diagnostic tools and other advanced tools you can run to improve computer performance. To run a tool, select the tool from the list and click the Launch button.
Figure : Tools tab
HOW TO ENABLE AND DISABLE THE ACTIVE DESKTOP
To enable the Active Desktop, right-click an empty area on the desktop, point to Active Desktop, and then click View As Web Page (a check mark appears). To disable the Active Desktop, click View As Web Page to clear the check mark.
HOW TO ADD AN ACTIVE DESKTOP ITEM TO THE DESKTOP
An Active Desktop item is simply a Web page. It can contain active content that can change, such as a stock ticker or a weather map. To add an Active Desktop item, follow these steps:
1. Click Start, point to Settings, click Control Panel, and then double- K click Display.
2. Click the Web tab, and then click New.
3. If you want to use an Active Desktop item from the Desktop Component Gallery on Microsoft's Web site, click Yes. If you want to use a Web site as an Active Desktop item, click No, and then either type the Web address for the Web site you want to use, or click Browse to search your hard disk.
HOW TO MAKE A WEB PAGE THE DESKTOP WALLPAPER
To make a Web page the desktop wallpaper, follow these steps:
1. Click Start, point to Settings, click Control Panel, and then double- click Display.
2. On the Background tab, click Browse.
3. In the Browse dialog box, click HTML Document.
4. Search for the .htm or .html file on your hard disk that you want to use, and then click Open.
5. Click OK.
NOTE:
You can also right-click any graphic in a Web page, and then click Set As Wallpaper to make that graphic the desktop wallpaper.
HOW TO DELETE AN ACTIVE DESKTOP ITEM FROM THE DESKTOP
To delete an Active Desktop item, follow these steps:
1. Click Start, point to Settings, click Control Panel, and then double- click Display.
2. Click the Web tab.
3. Click appropriate Web site, and then click Delete.
4. Click Yes to confirm deletion.
5. Click OK.
NOTE: For Internet Explorer 4, this deletes all subscription content. For Internet Explorer 5, this deletes all content from the "Items to Synchronize" box. Customize your Windows 7 desktop.
Personalize your desktop
The first you will want to do is personalize your desktop. In other
words, infuse your own personality into the desktop you're working with.
To change the desktop background and possibly the theme, right-click on the desktop and choose Personalize.
Compared to Windows XP, the new menu is a little more cluttered,
hence more confusing, but after a moment or two, you'll get the idea what's going on.
Themes
You can switch between different themes, Basic being the sickly blue theme we're currently using, Windows Classic being the reliable, good ole theme that you should be using, plus a handful of other, less common ones. You also get numerous Aero themes if you wish to use them.
Regardless of the theme you choose, you can setup different Windows colors and backgrounds.
Window color and appearance
Let's say you want to use the Classic theme, just click and wait for the colors to change. Then, if you want to add a little spice, you can change the Windows Color.
Setup desktop background
Windows 7 does have a nice gimmick of offering you a handful of pretty images for the desktop background, including the ability to shuffle between them at given intervals. It also lets you browse the collection based on different search criteria, like all pictures, top
rated, solid colors, etc.
After a few minutes, you'll have a decent desktop to work with.
Taskbar & Start menu settings Configuring the Taskbar and Start
menu is also quite important to many Windows users.
Fortunately, little has changed here, so you won't have to sweat your fingers looking for the right way to get things done. You won't be able to enjoy the classic view in the Start menu, it's gone. There's only this, I'm afraid:
And the standard properties:
One thing worth noting is the Aero Peek feature. For those who decide to use the Aero, this allows you to see miniaturized contents of each open window, similar to the Preview feature in Opera browser. I don't find this very useful, but you may.
INFORMATION SHEET 4.5-1
Testing methods/procedures, Documentation and making reports
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to identify testing methods/procedure and make documentations and reports.
Checking the Maintained Computer Systems:
The effectiveness of checking maintained computers depends on the quality of inspection. A quality inspection of computer systems must include the following:
Powering On the Computer
Testing all the computers’ devices
Check if all the devices are working properly
Monitor
Keyboard
Mouse
Checking the computers’ performance
Check if the computer is performing at its best.
Inspecting the cables attached on the computer.
Check if the Cables are fixed properly
Power Cables
LAN Cables
PS2 Cables
USB Cables
Monitor Cables
Reasons for Running Computer to Computer Communications:
The effectiveness of running computers to computer communications is to make sure that the computers in a network is connected properly for effective and easier sharing files and information. A quality inspection of computer communications must include the following:
Pinging - The ping command is the basic tool for testing TCP/IP connectivity. It sends a special packet (called ICMP Echo) to a particular
IP address and looks for a reply.
Determining TCP/IP Settings - TCP/IP settings that are used in network settings are:
IP Address – Unique address assigned to a network adapter. A computer with multiple network adapters has an IP address for each.
One, and each one must be in a different subnet.
Subnet Mask – Used in conjunction with the IP address to determine which subnet an adapter belongs to.
Default Gateway - IP address of a computer or router, on one of this computer’s local area networks, that knows how to communicate with subnets not present on this computer.
DHCP Server – If an adapter is configured to obtain an IP address automatically, this is the address of the server that provides it.
6.DNS Servers – IP address of one or more.
7. Domain Name Server computers.
Burn In - To run a system or device for a period of time to ensure that all components are working properly;
- The intention is to detect those particular components that would fail as a result of the initial, high-failure rate portion of the bathtub curve of component reliability. If the burn-in period is
made sufficiently long (and, perhaps, artificially stressful), the system can then be trusted to be mostly free of further early failures once the burn-in process is complete.
Bathtub Curve - An equipment failure-rate curve with an initial sharply declining failure rate, followed by a prolonged constant-average failure rate, after which the failure rate again increases sharply.
REPORT - Is a piece of information describing, or an account of certain events given or presented to someone. Importance of Making a Report - It enables you to practice your skills of presentation, argument, evaluation, and calculation, and provides a permanent record of your work.
Importance of Making a Report - It enables you to practice your skills of presentation, argument, evaluation, and calculation, and provides a permanent record of your work.