CSS 7 & 8 Done
CSS 7 & 8 Done
CSS 7 & 8 Done
COMPUTER SYSTEM
SERVICING - NCII
4th Quarter - CSS 7 & 8
Address :____________________________________________________________________
mei.montebon
FACEBOOK ACCOUNT
[email protected]
GMAIL ACCOUNT
09389148744
CONTACT NUMBER
2
Learning Outcomes:
At the end of this lesson you are expected to do the
following:
LEARNING COMPETENCIES
Obtain tools, equipment, and testing devicesneeded for correct operation and safety.
Obtain materials necessary to complete the work in accordance with established procedures and
check against job requirements.
Check computer systems and networks formaintenance against job/ service order or
instructions and specification.
LET’S EXPLORE!
You will be challenged to dig deeper into your prior knowledge andprevious experiences about computer hardware servicing.
SKILLS TEST
Directions: Listed below are some of the most important skills that you mustmaster in order to render quality service when you enter
the industry ofComputer Hardware Servicing. Read the skills carefully. Write “YES” if youcan do the skill and “NO” if not. Feel free
to answer each skill. Write youranswers in a piece of paper.
I can… YES NO
Common methods of determining what preventive (or other) failuremanagement policies should be applied are: Original Equipment
Manufacturer (OEM) recommendations, requirements of codes and legislationwithin a jurisdiction, what an "expert" thinks ought to
be done, or themaintenance that is already done to similar equipment, and most importantmeasured values and performance
indications.
Maintenance Procedures
In preparing maintenance procedure, you also have to considerdesigning a systematic plan for both for hardware and software. This
savestime, money and frustration and ensures safe conditions to prevent injury topeople and damage to computer equipment
Date:
Monitor is functional
Printer
Cartridges are
replaced.
Storage devices
are
functional.Optical
Drives
are functional
Protecting your files means creating backups,storing your file backups on your hard drive orany removable storage device regularly.
1. Computer issues. Knowthat your computer is goingto fail. You need to treatyour computer as if it were adoomed failure.
Alwaysassume that failure isimminent.A fatal error results indata loss, damage to yourcomputer and/or its ability tofunction, hardware
failure, or other serious issues.Signs of imminent failure might include regular poor performance, frequenterrors and/or popups,
unknown programs being installed, frequent power loss(the computer shuts down automatically frequently), frequent crashes,
orcertain parts not working.
2. Dust issues. Preventing failure meansmaking sure your computer is physicallyclean in its operations. Make sure thatthere is not too
much dust inside,especially on the fans. Dust can reduceperformance and cause overheating.
8
3. RAM issues. Know your computer'sspecifications and its limits. RAM runseven the PC is running idly. It consumesRAM storages
capacity making youdifficult to open a program if RAM storagehad been consumed.
4. Malware issues. Make sure that your anti-virus software is updated to beable to scan unnecessary files that enter your PC. Do not
install programsthat you’re not familiar with or if do not fully trust.
5. Hardware issues. When something is notworking properly, either diagnose the problemyourself and fix it, to prevent further
damage orcontact a professional and have them look at itfor you. Take advantage of warranties on partsif they fail.
6. Warning issues. If the same errormessage shows up every time youlog in, be sure to investigate it.Although unlikely, these errors
couldbe important.
7. Usage issues. Give your computer a break.Believe it or not, your computer likes rest, too.Leaving it on all of the time wears out
hardware,and puts unnecessary wear and tear on thehardware. Giving your computer a break alsosaves you money (electrical bills).
9
8. Warranty issues. Always take advantageof warranties. Get a warranty to protect yourhardware, so it can be replaced in case
offailure.
9. Backup issues. Back-up everything.Run regular backup of your important files toother disks, computers, or an online
backupservice.
10. Error message issues. If your PCfails to function, diagnose the problem.Write down the necessary info such aserror messages or
things don’t workproperly. If you know how to fix it, do it, toavoid further damage but if not then seekfor professional help.
Network Problems. When you suddenly cannot connect to the Internet, any of severalthings could be wrong. Use this checklist to
find and solve common Internetconnection problems.
Action: Ensure your wired or wireless network hardware is switched on andplugged in.
What may seem to be a network problem connecting to the Internet issometimes simply a Web site (or whatever server is on the other
end of theconnection) being temporarily offline.
10
Action: Before assuming your Internet connection is faulty, try visiting severalpopular Web sites rather than just one.
3. IP Address Conflicts
If your computer and another on the network both have the same IPaddress, the conflict between them will prevent either from
working properlyonline.
Action: To resolve an IP conflict, follow these instructions to release andrenew your IP address. If your network uses static IP
addresses, manuallychange your IP to a different number.
Action: If you have recently installed or upgraded software firewalls on yourcomputer, temporarily disable them to determine whether
it may be the causeof Internet connection problems.
Action: Use one of the options written below to measure the strength of yourwireless signal and try these ideas to expand the range of
your Wi-Fi.Ideally, you should place the router at a height in some central location andaway from other cordless devices. Make sure
that the router is not placednear something metallic (like an almirah or window grills) as that will weakenthe wireless signals. Avoid
mirrors as they can reflect the wireless signalsaway from the desired direction.Wireless routers generally ship with omni-directional
antennas but you canreplace them with more powerful uni-directional antennas and that will keepthe signal from getting broadcast in
all directions.
Action: Confirm that the Wi-Fi channel number and encryption keys on yourrouter have not recently changed (check with the network
administrator ifnecessary). When using a hotspot, follow the provider's instructors for signingin carefully.
Action: Check the router's lights and console if possible to ensure it isrunning and responding properly. Troubleshoot and reset the
router ifnecessary. Change the old router if necessary.
Action: Contact your ISP if you suspect your account has been blocked.
9. Computer Glitches
Computers suffer from technical glitches or malfunctions. Althoughrelatively uncommon nowadays, a computer's network adapter
hardwaremight suddenly fail due to overheating or age. Failures in the operatingsystem software that control the adapter, on the other
hand, can occurfrequently especially with computers that are heavily used. Viruses andworms also may disable or block a computer's
network interfaces fromfunctioning properly. If using a laptop or other mobile device, transporting itfrom one location to another can
corrupt the state of its network.
Action: Check the computer and remove any malware that you will find. OnWindows computers, try resetting the network
connection. Reboot thecomputer if necessary.
11
Action - If all else fails, contact your Internet provider to verify whether theyare experiencing an outage. Some providers also give
advice ontroubleshooting problems connecting to their network.
Directions: Write the computer errors/problems,error messages and the network problems you encountered.
1. 1.
2. 2.
3. 3.
4. 4.
Let’s take a
break!
Directions: Make an additional researchon the different diagnoses on faulty computer and network systems. Visitcomputer
shops in your community. You can also interview/observe apractitioner while lending a quality service in computer
hardware servicing.
MAINTAIN COMPUTER
2 SYSTEMS AND NETWORK
LEARNING COMPETENCIES
LET’S EXPLORE!
How to maintain computer systems to work? _________________________________________
______________________________________________________________________________
12
This part will help you to find outsome of the required procedures incomputer system configuration. Some of them are intentionally
not includedso that you will have a chance to explore and learn through your ownexperience and study.
The subsequent statements below describe the varied procedures inusing Action Center in the Control Panel:
Windows and other Microsoft products have their own built-introubleshooting tools that bear little or no resemblance to the Fix
Ittroubleshooters. Windows 7's Action Center Control Panel applet alerts you tosystem problems via an icon in the taskbar's
notification area. You can alsouse the Action Center to view the machine's security and maintenancestatus.
Go to the Action Center's linkto the Control Panel'sTroubleshooting applet to find abouta dozen options for fixing problems
related to program compatibility,hardware and audio, networking,security, Windows Update,performance, and power usage.
(Information for troubleshootingVista and Windows XP is availableon Microsoft's TechNet site.) Here ishow:
Maintenance (Perform System Maintenance, Check for Solutions forunreported problems, Setup Backup)
Troubleshooting
Recovery
Windows Security Center can help enhance your computer's security bychecking the status of several security essentials on your
computer, includingfirewall settings, Windows automatic updating, anti-malware softwaresettings, Internet security settings, and User
Account Control settings. IfWindows detects a problem with any of these security essentials (forexample, if your antivirus program is
out of date), Security Center displays anotification and places a Security Center icon Picture of the red Security
Center shield in the notification area. Click the notification or double-click theSecurity Center icon to open Security Center and get
information about howto fix the problem.
When it comes to problems with Office applications, you are not likely tofind much help in the programs' built-in help systems. (Note
that Office 2007apps include a built-in diagnostic routine. See the Microsoft Support site formore information.)
You could attempt to sort through the links on Microsoft's support site forOffice 2007 and 2010 or the equivalent site for Office 2003,
but if the OfficeFix It solutions do not help, your best bet may be to use the repair feature ofthe Office installer.
To do so, open the Control Panel Programs and Features applet (Addor Remove Programs in Windows XP), select your version of
Office, click theChange button at the top of the list, then select Repair button in the wizardthat opens, and follow the wizard's
instructions. The Microsoft Support siteprovides more information about repairing Office 2010, Office 2007,and Office 2003.
Even if yoursystem appears to be running well, you may benefit fromusing Microsoft's Fix It and other diagnostic tools. Most PC
users rely onautomatic updates of their system, security, and application software. Butprograms sometimes conflict in ways their
vendors cannot predict. Few ofthese software glitches slam the brakes on your system but they are likely toslow it down a little or a
lot.
PPE is equipment worn by a worker to minimize exposure to specific hazards. Examples of PPE include respirators, gloves,
aprons, fall protection, and full body suits, as well as head, eye and foot protection. Using PPE is only one element in a
complete hazard control program that would use a variety of strategies to maintain a safe and healthy environment. PPE does
not reduce the hazard itself nor does it guarantee permanent or total protection.
13
Hazards exist in every workplace so strategies to protect workers are essential. The priority should be to follow the “ hierarchy of
control” including elimination, substitution, or engineering control(s) of hazards at their source or along the path between the source
and the worker. Many methods are available, and those most appropriate to the specific situation should be used.
Controlling a hazard at its source is the first choice because this method will eliminate it from the workplace altogether or isolate it
from the worker. This approach may require substitution of a material with nonhazardous ones, isolation of hazards, ventilation,
addition of safety features to existing equipment, redesign of the work processes, or purchase of new equipment. Administrative
controls such as work practices, education/training, and housekeeping are also ways to control hazards.
When the hazard cannot be removed or controlled adequately, personal protective equipment (PPE) may be used.
PPE is considered as the last level of protection when all other methods are not available or possible. See the OSH Answers
document Hazard Control for information on a hazard control program.
PPE is used to reduce or minimize the exposure or contact to injurious physical, chemical, ergonomic, or biological agents.
Remember, a hazard is not “gone” when PPE is used, but the risk of injury may be reduced. For example, wearing hearing
protection reduces the likelihood of hearing damage when the ear plugs or muffs are appropriate for the kind of noise exposure and
when the PPE is used properly. However, using hearing protection does not eliminate the noise.
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information andCommunication Technology (ICT) student should know how
to behave whenworking in the computer laboratory, as well as implement a safe way ofaccomplishing every task. Safety practices
should be learned early and
always adheres in working with any electrical and electronic device, includingpersonal computers and its peripherals. This is for
your protection as well asto the people working with you, and for the devices that you are using. Thebasis for this process begins
with Occupational Health and Safety Policies.
Procedure
1. Identify the hazard.
14
Let us address each of the processes in detail so that you can betterunderstand how you can apply them in your system to extend its
longevity.
DATA BACKUP
Backing up basicallymeans creating a redundantcopy of a data so that in caseanything happens to theoriginal data, you have a
sparecopy. This is typically a simplething to do.
First, you must askyourself why should you backup the data or system?If you feel that you should backup your valuable data, then you
shoulddecide and select what are the data to be backup. Depending on your needs,you may choose to backup your windows registry,
or your Outlook Express
mail data, or even your windows security keys.Windows operating system's friendly interface allows you to drag anddrop computer
files from one storage device to another. And this can be assimple as copying a document file from your desktop into a thumb
drive.But when these files gradually occupies a lot of disk space, you mayneed to seek help from archiver utilities such as Winzip
which enables you tocompact your files into a single compressed file. You can then break up thislarge file into several pieces to be
stored in several mediums such as a spanof CD or DVD-Recordable.Winzip also allows you to protect your file with encryption and
asoftware password to prevent any unauthorized access. There are a numberof backup methods you could use.
3. The Windows XP backup tool allows backing up all user files in just onetask. If you select the option of the My Documents backup,
it will copy theentire contents of the Documents and Settings folder including MSOutlook/Outlook Express messages and settings as
well as your profilesettings.
The Windows XPbackup tool allows backingup all user files in just onetask. If you select the optionof the My Documentsbackup, it
will copy the entirecontents of the Documentsand Settings folder includingMS Outlook/Outlook Expressmessages and settings aswell
as your profile settings.
The Windows XPbackup tool allows backingup all user files in just onetask. If you select the optionof the My Documentsbackup, it
will copy the entirecontents of the Documentsand Settings folder includingMS Outlook/Outlook Expressmessages and settings aswell
as your profile settings.
4. However, in most situations full backup is not necessary. In all likelihoodthe My Documents folder of your computer will be
large in size and contain alot of irrelevant information. If this is the case, Windows XP backup toolsuggests that you
manually specify files that you want to include or excludefrom the backup set.
5. Lastly, do not forget to back-up your Internet Explorer favorites from withinIE. You can export them from the Menu.
DISK MAINTENANCE
Did anyone tell you that your hard disk is a pretty tricky machine?When you first installed your operating system, you may be
pleased to knowhow smooth and efficient your software applications are running. Butgradually, it slows down and this bothers
you. What truly causes the declinein performance? You may argue that your disk is just a couple of months old.This has much to
do with the way you operate on your system.
Try to imagine a big tool bucket filled with gadgets. Initially, the bucketonly contains a few spanners, a hammer and some screws.
So every timeyou search for a particular item, it is relatively easy to find. But soon as youkeep filling the bucket with all sorts of
items and especially when the amountof items grows, you will discover that you may need more time just to searchfor a particular
screw head. In such cases, uninstall any unnecessarysoftware and defragment your disk. Typically, your system performance
willdecline when the amount of data in your hard disk starts to grow.
16
Essay Writing:
Directions: Write an essay about the importance of Data Backup. Relateyour statements to the most treasured
skills you acquired in the lesson. Givealso your own title for the essay (minimum of 400 words).
LEARNING COMPETENCIES
LET’S EXPLORE!
How to diagnose faults or problems in the computer systems and networks?
______________________________________________________________________________
Problem 1: System has no power at all. Power light does not illuminate,fan inside the power supply does not turn on, and
indicator light onkeyboard does not turn on.
Problem 2: System is inoperative. Keyboard lights are on, powerindicator lights are lit, and hard drive is spinning.
Problem 3: System does not boot from hard disk drive, but can bebooted from floppy disk drive.
defective.
Problem 4: System only boots from Floppy Disk. Hard Disk can be readand applications can be used, but booting
Problem 5: Error message reading "SECTOR NOT FOUND" or othererror messages indicators that certain data is not
allowed to beretrieved.
Problem 6: Disk formatted on IBM PS/2 will not operate with this system.
Problem 7: After installing an expansion card (network card, tape drivecard, etc.), the system no longer works properly.
Problem 10: System does not boot from hard disk drive, but can bebooted from floppy disk drive.
Reboot computer. Re
install memory, make sure
that all memory modules
Memory problem, display are installed in correct
Loose installation of the
card jumpers one not set sockets. Check jumper and
RAM on the memory slot
correctly. switch settings on display
card. See display card
section for information of
settings.
Reconnect keyboard.
Loose keyboard cable Check keys again if there
Keyboard is disconnected.
connection is no improvement,
replace keyboard.
If possible, connect
monitor to another system.
Faulty monitor
If no display, replace
monitor.
Problem 18: Cannot boot system after installing second hard drive.
1.
2.
3.
4.
5.
Since the introduction of diagnostic software, it has evolved in manyways. The original type could only find the most major of
problems. Thereshould be strong indicators or physical damage in order for the software torecognize and report the problem. When
computers became more common inpeople's homes, particularly with the rise of Disc Operating Systems,commonly known as DOS,
diagnostic software became more common. Smallbuilt-in programs, such as Checkdisk (CHKDISK), allowed users to performbasic
diagnostic routines on their systems. These early programs would oftenoutput technical information and esoteric error codes instead of
readableinformation. In recent years, the output reports have changed considerably.The basic outputs are now readable by most users,
and they often containtips or warnings telling users what they should or should not do, all in plainlanguage.
Technological advances have even made Web page-based diagnosticsoftware available for home users. With minimal Web searching,
nearly anyhome user can find a wide range of websites offering to speed up theircomputer or diagnose problems. Many of these sites
are scams, soconsumers should perform proper research before using them. GeneralInternet searches can provide a number of
resources to check a company'scredibility.
1. Never spray or squirt any liquid onto any computer component. If aspray is needed, spray the liquid onto a cloth and then use that
cloth torub down the component.
2. You can use a vacuum to clean up dirt, dust, or hair around thecomputer on the outside case. However, do not use a vacuum for
theinside of your computer as it generates a lot of static electricity that candamage the internal components of your computer. If you
need to usea vacuum to clean the inside of your computer, use a portable batterypowered vacuum designed to do this job or try using
compressed air.
4. Be cautious when using any cleaning solvents; some individuals mayhave allergic reactions to chemicals in cleaning solvents and
somesolvents can even damage the case. Try to always use water or ahighly diluted solvent.
5. When cleaning, be careful not to accidentally adjust any knobs orcontrols. In addition, when cleaning the back of the computer, if
anything is plugged in, make sure turn off the PC and unplug thepower cable.
6. When cleaning fans, especially the smaller fans within a portablecomputer or laptop it is suggested that you either hold the fan or
placesomething in-between the fan blades to prevent it from spinning.Spraying compressed air into a fan or cleaning a fan with a
vacuummay cause damage or back voltage to be generated.
Cleaning Tools
Although many companies have created products to help improve theprocess of cleaning your computer and peripherals, you can also
usehousehold items to clean your computers and peripherals. Below is a listing ofitems you may need to use while cleaning your
computer or computer
peripherals.
Keep in mind that some components in your computer may only becleaned using a product designed for cleaning that component.
Cloth - A cloth is the best tool used when rubbing down a component;although paper towels can be used with most hardware,
werecommend using a cloth whenever possible.
Caution: It isthe outside of the case, a drive, mouse, etc. You should not use a clothto clean anycircuitry such as the RAM or
motherboard since they cangenerate Electro Static Discharge (ESD) that can damage electronics.
Water or rubbing alcohol - When moistening a cloth, it is best to usewater or rubbing alcohol. Other solvents may be bad for the
plasticsused with your computer.
Portable Vacuum - Sucking the dust, dirt, hair, cigarette particles, andother particles out of a computer can be one of the best
methods ofcleaning a computer. Over time, these items can restrict the airflow in acomputer and cause circuitry to corrode. Do not
use a standardvacuum as it can generate a lot of static electricity that can damageyour computer.
Cotton swabs - Cotton swabs moistened with rubbing alcohol or waterare good for wiping hard to reach areas in your keyboard,
mouse, andother peripherals.
24
Case cleaning
Why do we need to clean the computer case regularly? It keepsthe appearance of the computer looking new. During cleaning, if
ventilationlocations are found, these can be cleaned helping the case keep a steadyairflow to the computer, keeping components cool
and in good workingcondition.
Procedures:
1) The plastic case that houses the PC components can be cleaned witha lint-free cloth that has been slightly dampened with water.
Forstubborn stains, add a little household detergent to the cloth. It isrecommended that you never use a solvent cleaner on plastics.
2) Make sure all vents and air holes are hair and lint free by rubbing acloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is safeto use a standard vacuum when cleaning the outside vents of
acomputer. However, if you need to clean the inside of the computer,use a portable battery powered vacuum to prevent static
electricity.
Adirty CD-ROM drive or other disc drives cancause errors when reading discs. Theseread errors could cause software installationand
other issues while running the program.
Procedure: To clean the CD-ROM drive, itis recommend to purchase a CD-ROMcleaner from your local retailer. Using aCD-ROM
cleaner should sufficiently cleanthe CD-ROM laser from dust, dirt, andhair.In addition to cleaning the drive witha special
discdesigned to clean drives,you can also use a cloth dampened withwater to clean the tray that ejects from thedrive. Make sure
however, that after thetray has been cleaned, it has to becompletely dried before putting the trayback into the drive.
Procedure: Cleaning CDs and DVDs should be done with a cleaningkit but can also be done with a normal clean cotton cloth or shirt.
When doingthis with a clean cotton cloth or shirt, wipe against the tracks, starting from themiddle of the CD or DVD and wiping
towards the outer side as shown in thebelow picture. Never wipe with the tracks; doing so may put more scratches
on the disc.It is recommended to use water when cleaning a CD. However, if thesubstance on a CD cannot be removed using water,
pure alcohol can also beused.
While hard drives cannot becleaned physically, they can be cleaned with various utilities on the computerto help it run fast and more
efficiently. Disk Management is one of the utilitiesthat will prevent the hard drive from slowing down.
Procedure: Disk Management can be accessed in the Control Panel,look for Administrative Tools, then double-click on the Computer
Managementicon. In the System and Security window, click on the Administrative Tools. Inthe Administrative Tools window, double-
click on the Computer Managementicon.When Computer Management opens, click on Disk Management onthe left side of the
window, located under Storage. After a brief loading period,Disk Management should now appear on the right side of the
ComputerManagement window.
Keyboard cleaning
Why do we need to clean the keyboard?
The computer keyboard is oftenthe most germ infected item in your computer. Often, it will contain morebacteria than your toilet seat.
Cleaning it can help remove any dangerousbacteria. Dirt, dust and hair can also build up causing the keyboard tomalfunction.
Procedure: Before cleaning the keyboard, turn off the computer orunplug the USB keyboard. Not unplugging the keyboard can result
in causingother computer problems as you may press keys that cause the computer toperform an unwanted task.Many people clean the
keyboard by turning it upside down andshaking. A more effective method is to use compressed air. Compressed airis pressurized air
contained in a can with a very long nozzle. Aim the airbetween the keys and blow away all of the dust and debris that has gathered
there. A vacuum cleaner can also be used, but make sure the keyboard doesnot have loose "pop off" keys that could possibly bedrawn
up by the vacuum.After the dust, dirt, and hair had been removed spray a disinfectantonto a cloth or use disinfectant cloths and rub
each of the keys on thekeyboard. As mentioned in our general cleaning tips, never spray any liquidonto the keyboard.
25
Dirt, dust, and finger prints cancause the computer screen to project blurry images/texts.
Procedure: Unlike a computer monitor, the LCD or flat-panel display isnot made of glass, it therefore requires special cleaning
procedures.When cleaning the LCD screen, it is important to remember not tospray any liquids onto the LCD directly. Press gently
while cleaning, and donot use a paper towel as it may cause the LCD to gather scratches.To clean the LCD screen, use a non-rugged
microfiber cloth, softcotton cloth, or swiffer duster. If a dry cloth does not completely clean thescreen, you can apply rubbing alcohol
to the cloth and wipe the screen withthe damp cloth. Rubbing alcohol is used to clean the LCD before it leaves thefactory.
Monitor cleaning
Why do we need to clean the monitor?
Dirt, dust, and fingerprints cancause the computer screen to project blurry images/texts.
Procedure: The glass monitor screen can be cleaned with ordinaryhousehold glass cleaner. Be sure to remove power from the monitor
andspray the cleaner onto a lint-free cloth so the fluid does not leak into theelectrical components inside the monitor. Vacuum off any
dust that hassettled on top of the monitor, and make sure no books or papers have beenplaced on the air vents. Obstructed monitor
vents can cause the monitor tooverheat or even catch fire.
Caution: We suggest using a cloth dampened with water whencleaning monitor or a screen that is not made of glass or has any anti-
glareprotection on the screen. Using ordinary household glass cleaner on specialscreens, especially cleaners with ammonia can remove
anti-glare protectionor other special surfaces.
Motherboard cleaning
Why do we need to clean the motherboard? Dusts can build up andcorrode circuitry causing various problems such as computer
lockups.
Caution: When working with interior computer parts (e.g.motherboard), take the necessary ESD precautions and avoid unplugging
anycables or other connections.
Procedure: Compressed air is recommended when cleaning themotherboard from dust, dirt, or hair. When using compressed air, hold
it in the
up-right position; otherwise, it is possible that chemicals may come out of thecontainer that could damage or corrode themotherboard
or other componentwithin the computer. Also, make sure to always blow the dust or dirt awayfrom the motherboard, or out of the
case.Another good alternative to compressed air is to use a portable batterypowered vacuum that can effectively remove the dust, dirt,
and hair from themotherboard completely and prevent it from getting trapped within the case.However, do not use a standard electric
vacuum as it can cause a lot of staticelectricity that can damage the computer. When using the vacuum, it is vitalthat you stay a couple
of inches away from the motherboard and all othercomponents to help prevent contact as well as to help prevent anything frombeing
sucked into the vacuum.Ensure that you do not remove any small components with the vacuum such as jumpers.
Procedure: To clean the opticalmouse, you must first wipe the bottom coverof the mouse. Turn the mouse upside down to
look at the lens.If there is a smudge on the lens, gentlyclean the area with a plain cotton-tippedswab. If there is debris in the lens,
gently blowthe debris away from the area. Check thesurface on which you are using the mouse.
Note: Cleaning your mouse pad with a damp cloth can also helpimprove a computer's mouse movement.
26
Why? To help keep a mouse clean and germ free it can be helpful to cleanthe mouse.
Procedure: Use a cloth moistened with rubbing alcohol or warm water andrub the surface of the mouse and each of its buttons.
Why is it important to clean anoptical mouse? A dirty optical-mechanicalmouse (mouse with a ball) can be difficult to
move. It can also cause strange mousemovement.
Procedure: To clean the rollers ofan optical-mechanical mouse, you must firstremove the bottom cover of the mouse. Todo this,
examine the bottom of the mouse tosee what direction the mouse cover shouldbe rotated. As you can see in the illustrationbelow, the
mouse cover must be movedcounter clockwise. Place two fingers on themouse cover and push the direction of thearrows. Once the
cover has rotated about aninch, rotate the mouse into its normalposition, covering the bottom of the mousewith one hand and the
bottom should fall offincluding the mouse ball. If this does notoccur, attempt to shake the mouse gently.Once the bottom cover and the
ball areremoved, you should be able to see threerollers located within the mouse. Use a cottonswab, finger, or fingernail to remove
anysubstance. Usually, there will be a small lineof hair and dirt in the middle of the roller, remove as much as thissubstanceas
possible.Once you have removed as much dirt and hair as possible, place theball back within the mouse and place the cover back on.If
the mouse still appears to be having the same issue, repeat theabove process. If after several attempts the mouse is still having the
sameissues, it is likely that your mouse has other hardware issues and werecommend that it be replaced.
Note: Cleaning your mouse pad with a damp cloth can also helpimprove a computer's mouse movement.
Procedure: Use a cloth moistened with rubbing alcohol or warm waterand rub the surface of the mouse and each of its buttons.
Printer cleaning: With some printers it may be necessary toclean the inside of the printer to help keep theprinter running smoothly.
Why do we need to do this? Cleaning the outside of a printer can help keepthe printer's appearance looking good; and in the case of a
printer that is usedby many different people, it will keep the printer clean and free from germs.
Procedure: First, make sure to turn off the printer before cleaning it.Dampen a cloth with water or rubbing alcohol and wipe the case
and each ofthe buttons or knobs on the printer. As mentioned earlier, never spray anyliquid directly onto the printer.
Scanner cleaning
Why do we need to dothis? Flatbed scannerscommonly become dirty with dust,fingerprints, and hair. When ascanner is dirty, the
images mayhave distortions.
Procedure: Clean a flatbedscanner's surface by spraying awindow cleaner onto a papertowel or cotton cloth and wipe theglass until
clean. As mentioned earlier, never spray a liquid directly onto thecomponent.To clean the outside of the scanner, the same towel or
cotton cloth canbe used.
Procedures: The floppy drive can be cleaned in two different ways.The first method of cleaning a floppy drive; (and
ourrecommended method) isto purchase a kit at your local retail store designed to clean the read/writeheads on your floppy drive.
The second method of cleaning the floppy drive is only recommendedfor experienced computer users. Open the floppy drive casing
and physicallyswab the read/write heads with a lint-free foam swab soaked in pure alcohol,or trichloroethane. When performing these
steps, be extremely careful whencleaning the heads to ensure that you do not lock them out of alignmentcausing the floppy
drive not to work. To help prevent the heads frombecoming out of alignment, use a dabbing motion lightly putting the swab on
the head and removing it, do not perform a side-to-side motion with the swab.
There are a number of reasons for the errors found inside a hard driveand these include:
frequent system crashes;
critical system applications that have been improperly closed; and
the existence of harmful programs such as viruses, trojans, etc.
Scan Disk requires exclusiveaccess to a drive when it executes.Hence, if one or more of the files are
open on the drive that you want to scan,Scan Disk may display a prompt askingif you want to schedule the drive checkthe next time
you restart your computer.Once Scan Disk finishes its task,
it provides a report that contains theerrors it has found and the amount of disk space it has scanned. It is thereforeimportant for users to
use the Scan Disk application because it ensures that theirdata is safe from being corrupted. Aside from this, there is a guarantee that
theircomputer will perform at optimum levels.
The earliest Scan Disk version appeared in MS DOS 6.2. In Windows 95and 98, Scan Disk was given a graphical user interface
(GUI). In this graphicalenvironment, the user can find:
progress bars
buttons
information regarding the status of the scan and the errors (if any)
Highlight the disk to be scannedfor bad sector on the list of HardDisk Drives.
1. What are the things that the scan disk could do in a computer?
Computer Terminologies
Answer the following questions. You may research onthe internet for your answers.
1. What is the meaning of “cache”? or internet cookies? _______________________________
2. How is this concept related to temporary files? What are its effects in the
computer operation? Can these files be also removed or deleted to speed
up computer operation? ________________________________________________________
Disk Cleanup
Disk Cleanup is a computer maintenance utility that is included in theMicrosoft Windows operating system and is designed to free up
space on thehard drive. Disk Cleanup helps free up space on your hard drive. DiskCleanup searches your drive, and then shows you
temporary files, Internetcache files, and unnecessary program files that you can safely delete. Thecleanup process involves searching
and analyzing the hard drive for files thatare no longer needed. Then it proceeds to remove them andthus freeing updisk space on the
hard drive.
Here is the list of all the files that can be deleted from Windows XP:
Disk Cleanup is a feature of Windows that enables a user to deletesystem/junk files safely. For example, by using the disk cleanup
feature, youcan free up a considerable amount of space on your PC, like getting rid of TIF(Temporary Internet Files) and other
'useless', and not required, files.
To reduce the number of unnecessary files on your hard disk to free updisk space and help your computer run faster, use Disk
Cleanup. It removestemporary files, empties the Recycle Bin, and removes a variety of systemfiles and other items that you no longer
need.
1. Open Disk Cleanup by clicking the Start button . In the search box,type Disk Cleanup, and then, in the list of results, click Disk
Cleanup.
2. In the Drives list, click the hard disk drive that you want to clean up,and then click OK.
3. In the Disk Cleanup dialog box, on the Disk Cleanup tab, select thecheck boxes for the file types that you want to delete, and then
click OK.
Let’s do it!
What to Know?
30
The following are the procedures on how to maintain computer systemand networks:
The assessment is through regular inspections which assure that themaintenance activities are done on the date and time they were was
plannedand that the performance levels adhered to the defined standard.
Below is a sample Maintenance Inspection Checklist. This checklistwill confirm if the maintenance activities have been performed in
order toprolong the life of this particular equipment. The inspection items are stated inquestion form as these serve as the criteria or
standards of maintenance.
1. Duct Systems
Networks are sometimes installed in duct systems. There is aconcern that the network cables might become damaged
duringconstruction, so the ducts must be built away from plannedfuture road construction and utilities, according to theInternational
Telecommunication Union. The manholes placedin the roads must be kept away from intersections so that thenetwork installation and
repair workers are not at risk of beinghit by a vehicle.
Optical Lasers
Networks that use optical lasers uses invisible radiation that isemitted by these lasers. Before installing the laser, the laseroperation
manual and safety guide must be read, according toNet Ap. No one should stare inside the optical ports from wherethe lasers emit
their light or else blindness could result. Whenworking with the laser, safety goggles must always be worn.
Falling
Many networks are run along utility poles, which are woodenpoles that have network cables raised high above the ground.When
installing these cables, falling can be disastrous given theheight of the utility poles. Therefore, network installers shouldwear safety
harnesses to ensure that they do not fall.
De-Energize
Some networks have cables that are electrically charged. Thesecables must be de-energized and tests should be used toensure that the
cables do not have any remaining electricity inthem. The tools that are used for repairing the cables areinsulated so that electricity
does not travel through them and
into the hands of the line repairer.
Cable Inspection
Networks must only be installed by licensed professionals.Building inspectors must check the network cables to ensurethat they are
installed properly and that they will not create a firehazard. These building inspections are especially importantwhen the property
containing the network cables is sold.
31
General Safety
Safe working conditions help prevent injury to people and damage tocomputer equipment. A safe work space is clean, organized, and
properlylighted. Everyone must understand and follow safety procedures.
Follow the basic safety guidelines to prevent cuts, burns, electricalshock, and damage to eyesight. As a best practice, make sure that a
fireextinguisher and first-aid kit are available in case of fire or injury. Poorlyplaced or unsecured cables can cause tripping hazards in a
networkinstallation. Cables should be installed in conduit or cable trays to preventhazards.
These are some of the basic safety precautions to observe whenworking on a computer:
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries,and fatalities in the home and the workplace. Power supplies and
CRTmonitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power suppliesand CRT monitors.
Some printer parts become hot during use, and other parts mightcontain high voltage. Check the printer manual for the location of
high-voltagecomponents. Some components retain a high voltage even after the printer isturned off. Make sure that the printer has had
time to cool before making the
repair.Electrical devices have certain power requirements. For example, ACadapters are manufactured for specific laptops.
Exchanging power cords witha different type of laptop or device may cause damage to both the AC adapterand the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment.To avoid an electrical shock and to prevent damage to the
computer, turn offand unplug the computer before beginning a repair.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fireextinguisher can prevent a small fire from getting out of control.
Whenworking with computer components, be aware of the possibility of anaccidental fire and know how to react. Be alert to notice
odors being emittedfrom computers andelectronic devices. When electronic componentsoverheat or short out, they emit a burning
odor. If there is a fire, follow thesesafety procedures:
Types of Fires
Not all fires are the same. Different fuels create different fires and require
different types of fire extinguishing agents.
32
Class A
Class A fires are fires in ordinary combustibles such as wood,
paper, cloth, trash, and plastics.
Class B
Class B fires are fires in flammable liquids such as gasoline,
petroleum oil and paint. Class B fires also include flammable
gases such as propane and butane. Class B fires do not include fires
involving cooking oils and grease.
Class C
Class C fires are fires involving energized electical equipment such
as motors, transformers, and appliances. Remove the power and
the Class C fire becomes one of the other classes of fire.
Class D
Class D fires are fires in combustible metals such as potassium,
sodium, aluminum, and magnesium.
Class K
Class K fires are fires in cooking oils and greases such as animals
fats andvegetable fats
Some types of fire extinguishing agents can be used on more than oneclass of fire. Others have warnings where it would be dangerous
for theoperator to use a particular fire extinguishing agent.
Different types of fire extinguishers are designed to fight differentclasses of fire. The three most common types of fire extinguishers
are: Water(APW), Carbon Dioxide (CO2), Dry Chemical (ABC,BC,DC).Water and Foam fire extinguishers snuff the fire by taking
away theheat element of the fire triangle. Foam agents also separate the oxygenelement from the other elements.
Water extinguishers are for Class A fires only - they should not beused on Class B or C fires. The discharge stream could spread the
flammableliquid in a Class B fire or could create a shock hazard on a Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the oxygenelement of the fire triangle and also be removing the heat with
a very colddischarge.Carbon dioxide can be used on Class B & C fires. They are usuallyineffective on Class A fires.Dry Chemical fire
extinguishers extinguish the fire primarily byinterrupting the chemical reaction of the fire triangle. Today's most widelyused type of
fire extinguisher is the multipurpose dry chemical that is effectiveon Class A, B, and C fires. This agent also works by creating a
barrierbetween the oxygen element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the memoryaid P-A-S-S to remember the basic rules of fire extinguisher
operation:
4
33
LEARNING COMPETENCIES
LET’S EXPLORE!
How to rectify or correct defects in computer systems and networks?
___________________________________________________________
For example, in software development, product objectives aresometimes tested by product user representatives. When the design
iscomplete, coding follows and the finished code is then tested at the unit ormodule level by each programmer; at the component level
by the group ofprogrammers involved; and at the system level when all components arecombined together. At early or late stages, a
product or service may also betested for usability.
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information andCommunication Technology (ICT) student should know how to
behave whenworking in the computer laboratory, and how to implement a safe way ofaccomplishing every task. Safety practices
should be learned early and
always adhered to in working with any electrical and electronic device,including personal computers and its peripherals. This is for
your protectionas well as to the people working with you, and for the devices that you areusing. The basis for this process begins with
Occupational Health and Safety
Policies.
Occupational Safety and Health (OSH) is a planned system of working toprevent illness and injury where you work by recognizing
and identifyinghazards and risks. Health and safety procedure is the responsibility of allpersons in the computer and technology
industries. You must identify thehazards where you are working and decide how dangerous they are.Eliminate the hazard or modify
the risk that it presents.
Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
34
3. Partition the hazard off or clearly identify the area to protect otherpeople from harm.
4. If the hazard can easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher incharge, principal etc.) to obtain assistance.
6. Following clearing of the hazard fill out the correct documentation toassist in identifying improved practice to reduce further
incidence ofhazards.
Network Diagnostic Tool is an efficient and reliable tool to help youdetermine and identify the possible network issues that prevent
you fromusing your computer to the fullest. With Network Diagnostic Tool, you canquickly identify the problems you may be having,
which sometimes occur withhome computers that are connected to the web via cable or DSL modems.
The Network Diagnostic Tool is a utility that analyzes your system andperforms a wide range of tests to determine the cause of your
connectivityissues by investigating all your network-related services and programs,looking into your IP configuration and default
gateway, but it will also test outthe DNS and Firewall.
Moreover, Network Diagnostic Tool can also run an Internetconnection validation test, in the interest of discovering the
underlyingproblems and gathering all the information you may need with a minimal levelof effort for you.
The program will assist you during the troubleshooting operation,enabling you to save significant amounts of time by sparing you
from findingthe causes of your network problems by yourself.
There are free available network diagnostic tools that can be downloadonline, such as Wireshark and TCPdump. It will help you
monitor yournetwork performance and highlight discrepancies that might point tounderlying malicious activity.
Testing Demonstration
To check the vulnerability or stability of your network connection, go to theinternet and
download a free network diagnostic tool.
LET’S TAKE A Go to any search engine and type – network diagnostic tool.
BREAK! After downloading the application, run the setup file of the program and install it into your
computer.
If the program was already installed, run the application. Take note ofthe diagnosis. Do some
action if there are problems or errorsencountered
System Restore
System Information maintains a history of device drivers that areinstalled on your computer. If you are unsure of a computer's recent
history,you can use System Information to better understand what has happened inthe past. If a device does not work correctly, and its
history indicates a recentupgrade to a new driver, replace that driver with the original driver, and test tosee if doing so resolves the
issue.System Information also provides access to tools you can use fortroubleshooting your computer.
If you install an update from the Windows Update Web site, and it failsto meet your expectations, restore the original files by running
the UpdateWizard Uninstall from the Tools menu in the System Information tool. If yourcomputer worked fine yesterday, but is not
working properly today, tryrestoring yesterday's configuration files by running the System Restore utilityfrom the Tools menu in the
System Information tool.
LET’S DO IT!
Click Start, point to Programs, point to Accessories, point to SystemTools, and then click System Information.
Click Start, click Run, type msinfo32.exe in the Open box, and thenclick OK.To start System Restore
Click Start, point to Programs, point to Accessories, point to SystemTools, and then click System Restore; or
Click Start, click Run, type System Restore in the Open box, and thenpress Enter key. Then, it will prompt you to the dialogue box
shownbelow:
Click Next button, then it will prompt you to restore your computer tothe state it was working properly. Tick on Show More
Restore Pointsthen check the box below to display other possible options you canchoose.
Network Monitoring
Network monitoring refers to the practice of overseeing the operationof a computer network using specialized management software
tools.Network monitoring systems are used to ensure availability and overallperformance of computers (hosts) and network services.
1. Request Timed Out. This message indicates that no reply messageswere received within the default time of 1 second. This can be
due tomany different causes; the most common causes arenetworkcongestion, failure of the ARP request, packet filtering, routing
error, ora silent discard. Most often, it means that a route back to the sendinghost has failed. This might be because the destination
host does notknow the route back to the sending host, or one of the intermediaryrouters does not know the route back, or even that the
destinationhost's default gateway does not know the route back. Check the routingtable of the destination host to see whether it has a
route to thesending host before checking tables at the routers.
2. Unknown HostThis error message indicates that the requested host name cannot beresolved to its IP address; check that the name is
entered correctly andthat the DNS servers can resolve it.
36
3. Destination Host UnreachableThis message indicates one of two problems: either the local systemhas no route to the desired
destination, or a remote router reports thatit has no route to the destination. The two problems can bedistinguished by the form of the
message. If the message is simply"Destination Host Unreachable," then there is no route from the localsystem, and the packets to be
sent were never put on the wire. Use theRoute utility to check the local routing table.
If the message is "Reply From < IP address >: Destination HostUnreachable," then the routing problem occurred at a remote router,
whose address is indicated by the "< IP address >" field. Use theappropriate utility or facility to check the IP routing table of the router
assigned the IP address of < IP address >.
If you pinged using an IP address, retry it with a host name toensure that the IP address you tried is correct.
Computer Communications
Although computers communicate on many different levels and there isa great deal of variation between the different types of
computer systemsinvolved, the basic communication process isrelatively uniform andstandardized. Essentially, computers
communicate with one another overnetworks that are connected via wire or wireless communication methods.
There are many different types of networks, and there are many differenttypes of network-connection methods as well.
As mentioned before, there are many types of networks. Fromsmallest to biggest, the most common network types are personal
areanetwork, local area network, campus area network, metropolitan area
network, wide area network, global area network and internetwork. The basicdifference between these network types is their size (how
many remotecomputer systems are connected to them) and their method of connection.
For the different computers to be able to distinguish between eachother, every computer has a unique ID called MAC-address (Media
AccessControl Address). This address is not only unique on your network but uniquefor all devices that can be hooked up to a
network. The MAC-address is tiedto the hardware and has nothing to do with IP-addresses. Since all computerson the network receive
everything that is sent out from all other computers,the MAC-address is primarily used by computers to filter out incomingnetwork
traffic that is addressed to the individual computer.
When a computer communicates with another computer on thenetwork, it sends out both the other computer’s MAC-address and the
MACaddress of its own. In that way the receiving computer will not only recognizethat this packet is for it but also who sent this data
packet so a returnresponse can be sent to the sender.
In an Ethernet network as described here, all computers hear allnetwork traffic since they are connected to the same bus. This
networkstructure is called multi-drop.
37
One problem with this network structure is that when you have, let sayten (10) computers on a network and they communicate
frequently and due tothat they send out data packets randomly, collisions occur when two or morecomputers sends data at the same
time. When that happens, data getscorrupted and has to be resent. On a network that is heavy loaded, even theresent packets collide
with other packets and have to be resent. In reality thissoon becomes a bandwidth problem. If several computers communicate
witheach other at high speed they may not be able to utilize more than 25% of thetotal network bandwidth since the rest of the
bandwidth is used for resendingpreviously corrupted packets.
Extend your
Knowledge
Do this activity.
When you have your modem and router or your combination device,follow the corresponding steps below.
3. Plug one end of a phone cord or cable into the wide area network(WAN) port of the device, and then plug the other end into the
walljack. The WAN port should be labeled "WAN." (DSL users: Do not usea DSL filter on the phone line.)
4. Plug one end of an Ethernet cable into the local area network (LAN)port on the device, and then plug the other end into the
networking portof the computer that you want to connect to the Internet. The LAN portshould be labeled "LAN." (If you are
connecting wirelessly, skip this
step.)
5. Open the Connect to the Internet wizard by clicking the Start button,clicking Control Panel, click Network and Internet, click
Networkand Sharing Center, click Set up a connection or network, and thenclick Connect to the Internet.
Installing network cables, whether copper or fiber-optic, can bedangerous. Often, cables must be pulled through ceilings and walls
where thereare unexpected obstacles or toxic materials. You shouldwear clothing thatprotects you from these materials. For example,
wear long pants, a longsleeved shirt, sturdy shoes that cover your feet, and gloves. Most importantly,wear safety glasses. If possible,
ask building management, or someoneresponsible for the building, if there are any dangerous materials or obstaclesthat you need to be
aware of before entering the ceiling area.
Caution
When handling cable, always wear eye protection. Never touch the endsof any type of cable to bare skin.When you cut copper cable,
the small copper strands can puncture yourskin or cut you. The small pieces that come off after cables are cut often fly intothe air.
Remember to always wear safety glasses when cutting any type of cable.
The cutting and crimping tools used to repair set of terminate coppercables can be dangerous if not used properly. Read the
instructions that comeswith the tool. Practice using the tool on scrap cable, and ask an experiencedinstaller for help if you need it.
38
Remember that copper cable conducts electricity. A faulty equipment,static electricity, or lightning can energize even a disconnected
cable. If indoubt, test the cable you are working on with a simple voltage detector beforetouching it.
What is the report about? What are you trying to say? You shouldarrange things so that the key facts and conclusions are very
accessible.Not everyone will read the whole report, so ensure that your message isconcise even if a person only skims the document.
Who are you writing for? It is simply impossible to write a technicaldocument that will be equally easy for everybody to read: the
level ofexplanation you need for an expert audience is totally different from theexplanation needed for readers who are unfamiliar
with the subject. It isabsolutely essential that you identify the potential readers — theprofessional group, not the individuals — before
you start your work.
How long can the report be? It is difficult to predict in advance exactlyhow long a report will be. Technically speaking, writing
reports forhardware and other facilities should be specific and itemized.
help the computer repair person to understand your computer with awritten, detailed hardware report (therefore he can find the
missingdrivers faster, for example).
Let’s take a Directions: Enumerate the hardware items that can be seen inside thecomputer laboratory,
break! installed applications and network devices, computer tools and others.
Extend Your
Knowledge
39
Do this activity.
Visit a computer shop in your area, create a report of all the available computer devices inside the computer
shop. Your report will be based on the items inspected inside the computer shop. Create your own format. You
are to berated according to the score card below.
40 %
God bless!!!
REFERENCES
http://www.depedbataan.com/resources/9/k_to_12_pc_hardware_servicing_learning_module.pdf
https://www.google.com/search?q=Plan+and+prepare+for+maintenance+and+repair&oq
https://www.google.com/search?q=%EF%81%ACuse+appropriate+ppe+in+line+with+standard+procedures