COC4
COC4
COMPUTER SYSTEMS
Qualification : SERVICING NCII
You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Job Sheets, Operation Sheets, and Activity Sheets . Follow these
activities on your own and answer the Self-Check at the end of each learning activity.
If you have questions, don’t hesitate to ask your facilitator for assistance.
You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o already have completed training in this area.
If you can demonstrate to your teacher that you are competent in a particular skill or
skills, talk to him/her about having them formally recognized so you don’t have to do
he same training again. If you have a qualification or Certificate of Competency from
previous trainings show it to your teacher. If the skills you acquired are still current
and relevant to this module, they may become part of the evidence you can present
for RPL. If you are not sure about the currency of your skills, discuss it with your
teacher.
After completing this module ask your teacher to assess your competency. Result of
your assessment will be recorded in your competency profile. All the learning activities
are designed for you to complete at your own pace.
Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more
than one learning activity.
COMPETENCY-BASED LEARNING MATERIALS
List of Competencies
ELC724334
Computer Systems
4. and Repairing Computer
MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to set-up computer servers for LANs and SOHO systems. It consists
of competencies to set-up user access and configures network services as
well as to perform testing, documentation and pre-deployment procedures.
LEARNING OUTCOMES:
LESSON CONTENT:
RESOURCES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 1.1-1
LEARNING OBJECTIVES:
Reader view
Preventive maintenance can be described as maintenance of
equipment or systems before fault occurs.
It can be divided into two subgroups:
-Planned Maintenance
-Conditioned-BasedMaintenance.
When we maintain a computer, we must first determine what is the time of use
and delay of computer technology. The services on very old computers is more
expensive and therefore difficult to get the spare parts.
As for electricity, there are users that have hydro-pneumatic pumps, air
conditioners, and a number of electrical equipment that consume much energy
at boot time, is there just as the hard disk of the computer is suffering because
it is very sensitive to electric failures and every time the fridge turns on, there
is a low amperage in the electrical system throughout the house and
consequently on the PC. Since this fluctuation power, hard drives trend to
suffer much damage.
We can begin to look for and remove informative viruses with a good antivirus.
Find and delete temporary files on your computer (*. TMP) that occupy space
and trend to crash the computer.
Also look for files with the CHK, if your disk starts to make files of this nature,
it is likely that we are in the presence of a future damaged disk, because these
files are usually lost fragments of other files that are not well saved or maybe it
was lost because the computer turned off unexpectedly, or data recovered from
a bad sector on your hard disk.
If the computer has more than 2 years that the operating system was
installing, do a Back Up of all important files to the user and format the hard
disk, and reinstall all programs. Will see fast improvement.
Corrective maintenance workflow
Overview
Benefits of corrective
maintenance
Computer labs are more than just rooms with lots of computers. Care must be
taken to ensure that the lab is easy to access and fulfills its purpose. Learn
about the four most popular computer laboratory layouts and designs used in
High Schools and universities.
Many high schools and colleges use computer labs to allow student access to
the software necessary to complete coursework. Computer labs are also used to
instruct students on computer use, programming, and related subjects.
However, many institutions give little thought to the design and layout of the
lab. Too often, they simply fill a room with computers and set up the machines
any way they fit inside the room.
Similarly, the design and layout of a computer lab creates rules and defines
how the lab can be used. Thought given to the layout of a computer lab
dictates the usefulness of the lab and increases user satisfaction which
justifies its expense and assists in future investments in upgrades.
Certainly, the layout of the lab depends on the equipment, the furniture, and
space available. The purpose of this document is to discuss some basic
computer lab layouts and their advantages and disadvantages.
Any of these layouts can be modified to satisfy the individual needs of the
institution. It just takes a little planning and imagination to adapt any of these
designs to a specific application.
CLASSROOM COMPUTER LAB DESIGNS
Four-leaf clover designs can also be more expensive if each computer sits on
its own table. Some computer lab furniture is made specifically for this
design offering space for four computers on one table or desk.
The next two designs are less traditional but offer some things the
classroom layout and the four-leaf clover layout do not.
CONCLUSION
There are many options when designing the layout of a computer lab. The
key is to make sure form is following function. Thought and planning at the
beginning of designing the lab ensures that students and instructors are
satisfied with what the lab offers. Choosing a sub-optimal layout can
negatively affect student learning and reduce the engagement between
instructors and students.
SELF-CHECK 1.1-1
1.
2.
1.
2.
3.
4.
TASK SHEET 1.1-1
Steps / Procedure:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 1.1-1
CRITERIA YES NO
Did you……
Wear your ppe
Treat your computer properly
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
Use PPE always and anywhere where necessary. Observe the instructions for
use, maintain them well and check regularly if they still offer sufficient
protection. But when do you use what type of protection?
The eyes are the most complex and fragile parts of our
body. Each day, more than 600 people worldwide
sustain eye injuries during their work. Thanks to a
good pair of safety glasses, these injuries could be
prevented. Do you come into contact with bright light
or infrared radiation? Then welding goggles or a shield offer the ideal
protection!
3. HEARING PROTECTION
WORST-CASE SCENARIO
Prevention is better than cure. A smart thing is to be prepared for the worst.
A classic first-aid kit is no luxury but a first-aid kit for the eyes can also be
an essential first aid. If the employee comes into contact with chemicals,
a safety shower is mandatory, so that he can rinse the substances off his body
at any moment.
PREVENTING ACCIDENTS: PICTOGRAMS
Not only is preparing your workshop for accidents a smart thing to do, it is
even smarter to organise your workshop in such a way that no serious
accidents can take place. A simple way to make your workshop safer is to use
pictograms: indicating flammable materials, the necessary use of hearing
protection, indicating emergency exits …
You can find all pictograms in the ‘Labels & decals’ catalogue under ‘Safety’.
SO TAKE CARE OF
YOURSELF!
Development of new products are expected to give the market growth a boost
and the progress is driven by various factors such as growing concern towards
workers’ safety along with stringent governmental regulations, persistent
growth in demand for protective clothing from various end-user industries, and
extensive investments in research and development.
Growing workplace hazards and increasing worker safety are the major factors
that are expected to drive industry growth for the next decade in various
industrial sectors such as oil and gas, manufacturing, chemical, and food
processing. Plus, increasing industrial fatalities and awareness towards the
health and safety of workers’ is also expected to contribute to the market
growth. In fact, for many industries, it is mandatory to comply with rules
regarding workers’ safety at the workplace. Europe and North America are the
major drivers for industrial protective clothing along with the Asia Pacific and
the Middle East. The stringent regulations to follow the rules and guidelines in
these countries are making it mandatory for industries to take care of their
worker’s safety on account of increasing hazards. Additionally, upper
management in most of the industrial firms is taking proactive measures to
uphold workers’ safety at the respective workplace.
Today many companies are putting emphasis on raw materials that offer
material features such as lightweight, higher heat resistance, comfort, and
wear and tear resistance. This initiative is to achieve multi-functionality of
protective clothing and increase its application scope. However, one of the
challenging factors can be the rising costs of crucial materials such as aramid
fiber, carbon fiber, and silicates.
In 2015, the global protective clothing market was valued at $8 million. This is
expected to reach $10.2 million by 2022, supported by Compound Annual
Growth Rate (CAGR) of 3.6% during the forecast period 2016 to 2022.
Lightweight and breathable clothing: Workers often carry around a lot of gear,
and the last thing they need is a hot and heavy coat. The lighter protective
apparel and equipment is a strong need for most workers across the globe. In
fact, this need has been the driving force behind a significant number of
innovations in the textile, garment and face-shield design. Today,
environmentally controlled PPE is another developing technology that helps in
keeping the body’s core temperature consistent while ensuring that workers
are comfortable. These environmentally controlled PPE have been successful in
protecting the workers from heatstroke to frostbite.
Soaring demand for disposable protective clothing: Used for protection from low
to medium level hazards such as fluid handling in a cleanroom or laboratories,
disposable industrial protective clothing is expected to generate revenue
exceeding $1.3 million by 2022. These products are designed to comply with all
the environmental standards and can be easily disposed of. Some of the areas
where disposable protective clothing can be used are disaster response,
hazardous waste management, specialist laboratories, emergency services,
sewage treatment, and drainage construction.
Choosing not to wear PPE can be dangerous in the workplace when it could
keep you protected. Workplace safety is essential and in-depth knowledge of
these various protection devices can help in preventing hazardous injury.
SELF-CHECK 2.1-1
__________________2. Its is a fragile parts of our body. Each day, more than 600
people worldwide sustain eye injuries during their work. Thanks to a good pair
of safety glasses, these injuries could be prevented. Do you come into contact
with bright light or infrared radiation? Then welding goggles or a shield offer
the ideal protection.
B.ENUMERATION: List down the PPE 7 tips will help you on your way and
Explain brief of it.
1.______________________
2._____________________
3._____________________
4.______________________
5.______________________
6._____________________
7.______________________
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1
CRITERIA YES NO
Did you……
Wear your ppe
Put on gloves
UNIT OF COMPETENCY: SET UP COMPUTER SERVERS
ASSESSMENT CRITERIA:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
1. Check the POST. This is generally the first or second thing that appears
on a computer after turning on the power. This appears before the operating
system begins to load. The POST will display any problems found with
hardware that makes the computer unable to boot, POST may also display
problems with hardware that allow the computer to boot, but not operate at its
full capacity during operation
A .CON’T. An easy way to check this is to use the Task Manager, right click
on the taskbar select Task Manager, and click the Processes tab. The CPU
column contains a number that indicates the percentage of CPU the process is
consuming.
B. CON’T. The Memory Usage column indicates how much memory a process
is consuming. • Network HUB • Network cable • Network card
10. Check for the problem in safe mode. To enter safe mode, tap F8
repeatedly during POST (this works on most systems). If the problem persists
in safe mode, it is a fair bet that the operating system itself is to blame.
Common Trouble shooting for Computer Units
2. Voltage Regulator and power supply could cause power failure in the
computer unit.
3. Check the power cords and cable connectors in your computer unit.
• First check the cable connecting to the network card into the network hub.
• Check the back of the computer to see if the network card light is on
3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.
Computer diagnostics tools are pieces of software that give you the
knowledge you need to be able to potentially repair your own computer. Some
of these tools come built in to your operating system while others come from
3rd party software developers. Either way, these tools help save you time and
money.
Computer diagnostic tools can be used scan your computer’s hard drive, check
your ram for errors, check cpu temp and give you information about any other
devices connected to your computer. These tools are made to find problems
that may be disrupting your computer’s normal performance. Once a problem
is found, you can then plan your repair.
The first one on our list is built right in to Windows operating systems.
The performance monitor gives you a quick view of vital information related
your computers hardware. From here, you can check out your CPU, Memory,
Disk info and Ethernet information. You can use Performance Monitor to
examine the effects of your running applications in both real time and by
collecting data to check out for later analysis.
Windows Resource Monitor is number two on our list. This diagnostic tool is
more robust that Windows Performance Monitor. It is better suited for tracking
individual aspects of CPU, Network, memory and disk usage. This tool gives
you an in depth look at what processes are affecting your CPU, how much
memory is being used what is using it, individual process disk activity and
network information like current TCP connections and what processes are
listening on what port.
4.Speccy
Speccy is another great computer diagnostic tool . This application gives
information on just about everything including software, hardware,
peripherals, disk info, graphics & network data. Its easy to use layout make
troubleshooting and maintenance a breeze. Great application to start with
when you are looking for specific info about your computer.
5.HD Tune
HD Tune Pro is a great tool for HDD and SSD diagnostics. This utility allows
you to benchmark your storage device showing you the minimum, maximum
and average transfer rates along with many other useful tools. The other
features of HD Tune include detailed drive info, error scanning, & drive health.
The pro version allows you to check the health status of multiple drives, offers
folder usage info, secure erase, file benchmark, disk monitor, cache test &
extra tests.
1. Cables
The router has several dozen of wires attached. This cables may get pulled off,
unplugged, or could be just damaged.
Push all the cables to make sure that none of them slipped.
Check destruction of the wires, look if any of the end-piece isn't twist off.
Make sure the power wire is plugged into the router properly. If the
device LED's do not shine, there is a problem with power.
Next check if all of cables are properly plugged. Below is a picture which
shows all the ports of the router. Depending on the producer and model,
they may look slightly different, but the idea is the same everywhere -
internet cable must be plugged into the internet port / WAN (Blue port in
the figure)
if you have any computers plugged by the cable, they must be plugged in
the LAN port (yellow port in the figure)
WARNING: Plugging internet cable into a port other than the WAN may cause
serious problems!
If your computer is connected to the router using a network cable, make sure
that the network cable is plugged into the computer port properly. Additionally,
after cable plugging You should have observed two LEDs, one of them ought to
„blink”. You need to know also that some computers do not have any diode
signal.
Some PC's have more than one Ethernet (network) connector . Check also the
second link.
2. Router
Common causes of problems:
router-crash
failure of router
interference in a wireless network
The first case is the simplest. If Yours internet connection slowed drastically, or
it doesnt exist, try turn off the router by disconnecting him from power system
for several seconds and plug again. If reboot doesn't help, go to the second
point- router failure.
You can very simply and independently verify if the router has failed. Just
unplug the Internet cable from the router (look at the description of the cable
connection on the router) and connect it to the network adapter in your
computer. If the computer, was register in our web, you should see page which
you wanted to visit, if not, you will see our welcome page „Welcome to
Sloneczko.net”. These two cases show the router failure. If nothing show up, it
means a breakdown of the network - please contact us immediately.
Another cause of problems with the router is so wide that we will describe it in
a separate chapter.
3. Interferences
Wireless network, so-called wifi is very nice but also very imperfect thing.
Theoretically reach of the wireless network in open space and without any
noise is only 150 meters! Obstacles such as walls, windows and doors cause
high damping and decrease of signal quality. Also interferences of energy
networks and other wireless networks (e.g. of our neighbours) could be possible
source of problems.
So what to do to make sure that the problem with speed is caused by weak wifi
signal?
Plug in to the router via cable – plug in the ethernet cable to your
computer then plug in that cable to one of the LAN ports of the router
(check description of cable pluging to the router). If there's no problem on
the cable, surely you have problem with wifi connection.
Plug in ethernet cabel directly to the computer ommiting the router
(check the description of diagnosing of the router's damage). If you
see our welcome page “Welcome sloneczko.net” fill in the form on there
and send it to us. When we register your computer as active device you
will be able to check your speed without a router. If it's ok – you have a
problem with wifi
The third method requires some knowledge about the system . You
can check the response time of the router using commend “ping”. You
must know its address to do this. Router address is the address of a
gateway on your computer. Checking the IP address of the router we
described in the article about configuring dhcp in router TP-Link
Now, when you know IP address, type commend “ping” into the dos window
(which is described in the article). You can stop commend executing by
pressing ctrl + c.
If you don't have a router in your home you can check external causes
described in chapter I.1. cables. If there aren't any problems with operator's
network, the cause of problems with connecting to the internet may be your
computer.
III. Problems with computer
Hardware parameters
Size of materials distributed via inrernet continues to grow. A few years ago
web pages used to be smaller than 1 megabyte, today some of them are bigger
than gigabyte. If your computer is an old Pentium 1 ghz and you've got half
gigabyte of RAM you have to know that probably all of it will be occupied by the
system and web browser. Firefox with a few tabs opened can use hundreds
megabytes of RAM. In that case page rendering can take forever.
The use of hardware resources OK, so your computer's a powerhouse,
processor takes first place in all benchmarks and all of your RAM would be
enough for four other computers. But it doesn't make any difference if you have
twenty different plugins form weird pages, computer's registry swells and
processor is used by plugin for watching TV. Not to mention that two
antiviruses finish the system of.
Check the list of installed applications. Delete what's redundant. One antivirus
is enough. Take a look at process list, to see if some application uses too much
memory or processor. If your computer is overloaded, rendering pages will take
lots of time.
Viruses There's no need to say much. Check if your antivirus is up-to-date.
Scan your computer. Nothing uses your bandwith as viruses sending all over
the internet.
Peer2Peer software P2P, torrents, eMule and lots of other applications for file
exchange. The only thing we have to do to stop it from disrupting our work is to
configure it in the way that won't allow it to use more than 1/2-3/4 of our
bandwith, sending faster than a few kilobytes per second and opening more
than 200-300 connections. And, of course, shuting it down when all of the files
are downloaded. Even though you finished your download, thousands of people
from around the world can connect to your program and efficiently blocking
your bandwith.
P2P software left unconfigured causes that even if you're not downloading
programs connecting with your computer won't let you work normally. To
download something from the internet you need to send a request. And how
can you send it if your bandwith is clogged?
If you don't know how to check your network traffic you can always log into
your client control panel - you can find graph of your network traffic. If there's
something wrong you'll notice it right away.
We're hoping that this simple tutorial will help you understand how the
network works and will make using the internet more comfortable.
SELF-CHECK 2.1-2
A.
1.______________________
2._____________________
3._____________________
4.______________________
5.______________________
6._____________________
7.______________________
8.______________________
9.______________________
10.____________________
1.
2.
4.
C.
1.
2.
3.
4.
you should be able to diagnosis of computer systems and network function ff.
Steps / Procedure:
Assessment Method:
Demonstration
Did you……
Wear your ppe
Is it hardware or software
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Preventive Maintenance
Preventive maintenance can be described as maintenance of equipment or
systems before fault occurs. It can be divided into two subgroups: Planned
Maintenance and Conditioned-Based Maintenance.
Planned Maintenance (PM) is any variety of scheduled maintenance to an
object or item of equipment. Specifically, PM is a scheduled service visit carried
out by a competent and suitable agent, to ensure that an item of equipment is
operating correctly to avoid any unscheduled breakdown and downtime of an
equipment.
Condition Based Maintenance (CBM) is a maintenance strategy that uses the
actual condition of the asset to decide what maintenance needs to be done.
CBM dictates that maintenance should only be performed when certain
indicators show decreasing performance or upcoming failure. Checking a
machine for these indicators may include non-invasive measurements, visual
inspection, performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.
The purpose of systematic inspection, detection and correction of existing /
future problems is very important to maintain equipment / facilities in
satisfactory condition before it may cause major problem.
Maintenance, including tests, measurements, adjustments, and parts
replacement, performed specifically to prevent faults from occurring.
Maintenance is divided into two (2) general type. Preventive maintenance is
given for maintaining equipment and facilities in satisfactory operating
condition to extend the life of the equipment. Corrective maintenance is task
performed to identify, isolate and rectify a fault so that the failed equipment or
system can be restored to an operational conditions within the tolerances or
limits.
Common methods of determining what preventive (or other) failure
management policies should be applied are: Original Equipment Manufacturer
(OEM) recommendations, requirements of codes and legislation within a
jurisdiction, what an "expert" thinks ought to be done, or the maintenance that
is already done to similar equipment, and most important measured values
and performance indications.
Maintenance Procedures
If you have the opportunity, make a full disk image (a 'snapshot' of your entire
hard drive) immediately after reloading the OS and all your programs. This
gives you a clean starting point to go back to if you need to reload everything
again, and will be much faster than redoing everything manually. Acronis True
Image 11 is good for the job.
Beyond just getting the dust out, here are some other
steps to consider: Dust often collects inside the CPU
and video card heatsinks, consider disassembling and
cleaning them if you're comfortable doing so, or at least
using compressed air to specifically blow them out.
While the case is open, plug in the computer and turn
it on long enough to make sure all the fans are still
spinning. Replace any that are dead or noisy (a
common sign of a worn-out fan). If there is sticky
residue or dirt on the circuit boards, it can be removed
with a cotton swab dipped in rubbing alcohol, which
will evaporate cleanly. (Make sure the computer is
unplugged first!) If you're not comfortable with working
inside your computer or suspect your computer has
chronic overheating issues, Puget Systems or another
professional repair service can help you out.
Keyboards can be turned upside down to dump out crumbs and dirt, or
keys can be pried off and the whole assembly cleaned with compressed air.
There are some good step-by-step guides available on Lifehacker. Take a
picture first so you can put the keys back in the right place! If you're feeling
adventurous (or just have a really disgusting keyboard), some people
advocate running it through the dishwasher.
This is a good time to take a look at where your computer is located. Is there
adequate ventilation? Is the computer out of direct sunlight, and away from
heat sources? What is it plugged in to? There's no excuse for not having a
good surge protector (not just a plastic power strip!), and battery backup
units have become affordable for most users. This will affect the lifespan of
your computer.
Smoking will make a mess of a computer faster than anything else I know
of. While we at Puget Systems have never seen one quite this bad, we can
always identify a smoker's computer as soon as we unbox it. Electronics
absorb the smell very easily, and even an all-metal case will retain the odor
after all the components have been removed. Plus, there's usually a layer of
dust and tar on the circuitry that tends to be a giveaway as well. Please, if I
can't convince you to quit smoking all together, at least take it somewhere
away from the computer!
4. Organize your installation disks
Keep software, peripheral, and driver disks in a single location, preferably close
to the computer. A shoebox works fine. Make sure you have them handy before
attempting computer maintenance or repairs - it's amazing what can become
necessary in the middle of a lengthy troubleshooting session, and it is common
to not know what you're missing until you need it!
Some antivirus programs also protect against adware and spyware, but not all.
If yours doesn't, or if you just want an extra layer of
security, AdAware and SpyBot are two of the best known (and free!) products
available. While they may not be as destructive as viruses, adware and spyware
will compromise privacy and slow your computer drastically. Run scans for
them at the same time as your antivirus.
7. Clean up your OS
Windows is not the most efficient operating system, and sometimes needs
attention itself. It saves a large amount of unnecessary information, mostly in
the form of 'temporary' files (which never get deleted) lists of recently performed
searches, and the like. There's an excellent program called CCleaner, which
will clear out most of the unneeded data automatically. If you're interested in
further optimizing your OS, there's a wealth of information available online,
including an article on improving XP performance available here on Puget's
website.
8. Update everything
Check for updates for your hardware and software. This includes
running Windows Updates, checking for updated drivers, and
checking for software patches. The easiest way to find these is to go
to the manufacturer's website, to their support section, and then
look for a 'downloads' section or search for your product's name. If
you've been having problems with a piece of hardware or software,
be sure to check for patches or updates - if other people have been
having similar problems, it's likely the manufacturer has released a fix for it.
9. Defragment
Once your hard drive has been cleaned up, it's a good time to defragment. This
organizes your files, leading to faster disk access times and improved system
performance. The Windows defragmenting tool (Start > All Programs >
Accessories > System Tools > Disk Defragmenter) works well, or there's a list of
open source and commercial defragmenting software available on Wikipedia if
you'd rather use something else.
SELF-CHECK 2.1-3
1._____________________
2._____________________
3._____________________
4.______________________
5.______________________
6.______________________
7.______________________
8.______________________
9.______________________
10._____________________
B.Gives the sample of monitor plan?
TASK SHEET 2.1-3
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3
CRITERIA YES NO
Did you……
Wear your ppe
Clean up your OS
LEARNING OUTCOME NO.2
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-4
LEARNING OBJECTIVES:
"Over time, you'll get Windows updates, or a new version of macOS, and these
things can weigh heavily on the PC," says Joe Silverman, owner of New York
Computer Help. Even some of your apps will update themselves over time, and
the web pages you visit may just require more resources than they used to.
(Remember what the web looked like in the 90s?). When the machine slows to
a crawl, you'll have to bite the bullet and spend your money on something
better.
Before you shell out for a new set of RAM though, you should figure out what’s
actually causing the slowdown. This will tell you whether you really need a
replacement, or you’ll find it worthwhile to eke out more time with an
incremental repair or upgrade.
First, make sure it isn't a software issue. "It's always good to run a virus or
malware test, and make sure there are no infections in the background," says
Silverman. You can also check programs' resource usage: On a PC, open the
Windows Task Manager (hit Ctrl+Shift+Esc) and click More Details; on a Mac,
open Spotlight (press Command+Space) and search for Activity
Monitor instead. If you see one program gobbling up all the CPU or RAM,
uninstalling it and replacing it with an alternative may speed things up.
If you can't narrow the issue down to just one program—or the problem lies
with an essential one, like your web browser—then you may need to upgrade
your hardware. During the next slowdown, open up that same Task Manager,
head to the Performance tab, and look at your CPU and memory usage. If
either of those graphs shows particularly high, sustained usage, you know
which part probably requires an upgrade.
It's also possible that one of your components is failing entirely. "Do a hard
drive test with a program like HD Tune, which has a free trial," says Silverman.
"It will let you know how slow or abnormal some of the read-write activities are,
and if your hard drive is failing." I also like CrystalDiskInfo, which isn't as
thorough as HD Tune, but will give you a basic, clear idea of your hard drive's
health for free.
While you're running through potential trouble areas, check your RAM as well.
"Failing RAM could cause slowness, but it can also stop your computer from
turning on, or it may shut down randomly," says Silverman. "So run a RAM
test like Memtest, which will check each stick and see if it's good or not. If you
have a bad stick, you want to make sure you replace it."
Read Also: How to Fix Corrupted Windows System with System File Checker
1. PC Overheating
A heating PC slows down the whole system and leads to frequent crashes.
Additionally, PC components may also get permanently damaged due to
constant exposure to heat.
There are two main reasons your PC heats up, i.e. either the cooling system
isn’t working properly or the PC is heating to the point your cooling system
can’t handle it anymore. In either case, I have written a comprehensive article
on different solutions to handle an overheating PC. Do check it out.
If your USB port stops working, it’s not necessary that it’s broken. Below are
some solutions that can fix this issue:
Method 3:
Disable USB selective suspend
USB Selective Suspend is a Windows power saving feature that suspends
unused or idle USB ports to conserve power. Sometimes it could stop a USB
port from working. Here is how to disable it:
Note: This option should be kept enabled if you want to save battery power. If
it doesn’t fix the USB port issue, then enable it again.
If your Wi-Fi is working fine but your PC keeps disconnecting from it, then
your PC’s network card may not be receiving full power. Windows has a built-
in power saver option that gives less power to the network card. You need
to disable this feature:
If the PC doesn’t start after the beeps, then it’s usually difficult to solve the
problem yourself. However, I’m going to list down two of the most common
problems due to which beeps occur, and thankfully, you can solve them
yourself as well.
1. Take out the RAM completely and clean any dirt inside the slot using
a cotton bud.
2. Now insert back the RAM and put enough pressure on both ends to
ensure it is fully inside.
3. Afterward, close the clips and make sure they’re properly locked. Even
a slightly loose RAM will be unable to work.
Before you handle any parts in your computer, make sure you ground
yourself by touching a piece of grounded metal to discharge static electricity.
Electrostatic discharge can damage your computer.
Excessive heat can cause RAM and other parts to wear out over time.
Individual components can overheat, or heat from one component can cause
damage to adjacent parts.
Your memory module may have some fault that passed through quality
control and worsened over time. This is the most likely cause behind a
damaged RAM.
It is also possible that the memory module is fine, but one or more memory
slots on your motherboard are defective, hindering the RAM's performance. The
defect may even be so bad that it damages the memory stick.
The truth is, the power supply is the last thing we should skimp on when
choosing components for our system. If a computer's brain is its processor, its
heart is the power supply. And having one that is worn out, underpowered,
unstable, or just generally cheap can be a major cause of hardware failure.
Every computer's power requirements are different, but a good minimum for a
modern PC is 450 watts. Some systems, especially those with multiple high-
end video cards or lots of add-on cards and peripherals may require a PSU
rated at 800 watts or more. Replacing a failing or inadequate power supply can
make a previously unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A
common cause of "unexplained" lockups and system crashes is a drop in
voltage supplied to the system when under load, caused by a poorly
manufactured PSU. The easiest way to find a quality PSU is to stick to the
consistently top brands such as Antec, EnerMax, and PC Power & Cooling.
#2: Fans
As computers have gotten more powerful over the last decades, they have also
gotten hotter. Gone are the days of a passively cooled Pentium 100; now we
have fans on our massive CPU heatsinks, on our monster video cards, and on
intake and outtake vents to our computer cases. All of these fans are playing
important roles by keeping our computers safely cooled, and we should try to
ensure that they continue doing so.
Fans are one of the few parts that when replaced will not usually be replaced
with something better. But they deserve mention because:
As one of the few moving parts in our system, they are one of the most
likely to actually break.
When they break, it's likely to pass unnoticed or not cause much
concern.
Also, fans are cheap and easy to replace. It generally takes about 10 dollars, 15
minutes, and a screwdriver to install a new one, so there's really no good
excuse for not doing so.
It can be tricky to know when it's time to replace a surge protector, because the
component inside that diverts excess power from surges to the ground simply
wears out with repeated use. However, there is often no interruption of power
or other indication that it's done. You may still have juice but not be protected.
The cheapest protectors may wear out after fewer than 10 small surges, while
the better ones can last through hundreds. The safest thing to do is to get
higher quality protectors but still replace them occasionally.
First, video cards are one of the components that are being improved upon
seemingly every day. Just like with CPUs, a video card that's two years old
simply isn't as fast as a current one and won't have the newest features (such
as support for DirectX 10).
Also, the video card is the number one hardware stopgap as we migrate to
Vista. Manufacturers just aren't providing new Vista-compatible drivers for lots
of their old video cards. This means that many of us will have to replace our
video cards whether they are broken or not, if we plan to switch to Vista.
First, many old card readers are USB 1.1. The newer ones use USB 2.0
instead, which is 40 times faster. This is more than enough reason to replace
an old reader, even if it's not broken.
In addition, new formats are constantly coming out for flash cards, and when
they do, you need a new reader to use them. For example, Secure Digital High
Capacity (SDHC) and xD from Fujifilm are not supported by older readers.
The "giant" 100-GB hard drive of a few years ago is no longer so large. Today,
you can get 750 GB for less than 200 bucks. In addition to being much, much
larger, newer hard drives will generally be Serial ATA II (SATA II), which has a
maximum data transfer rate of about 300 MB/s as opposed to SATA I's 150
MB/s and the older Parallel ATA (PATA) rate of 133 MB/s. SATA II is fairly new,
so many motherboards don't support it. But even if yours doesn't, the SATA II
drives generally have a jumper that can put them in SATA I mode.
TIP: Right now, most SATA II hard drives ship with this limiting jumper in
place by default, so if your board does support SATA II, be sure to change the
jumper before you install the drive.
#8: Monitor
With the exception of servers, a computer isn't much good without a monitor.
Monitors rarely make it all the way to the stage of completely not working,
because we replace them when they start to fade. If you replace a monitor
that's more than a few years old, the new will likely not much resemble the old.
Any reluctance you may have had to switch from the giant 50-pound cathode
ray tube (CRT) monitor to a slim and featherweight liquid crystal display (LCD)
should be gone by now. The gap in performance in terms of color rendering and
refresh rates between CRTs and LCDs is very small. Unless you're a graphics
designer who needs a multi-thousand dollar large screen CRT, the benefits of
size, weight, power consumption, and less eye fatigue that LCDs enjoy will far
outweigh any small performance advantages of a CRT. With the exception of
the extremely high and extremely low end markets, it's quite hard to find a new
CRT monitor anyway.
If you were already using an LCD that's a few years old, when you replace it
you'll enjoy those leaps in performance that the LCDs have made in the last
few years.
#9: Keyboard
Since so many of us spend hours every day banging away at them, it's
important to have a keyboard that's comfortable and efficient. And since we
use them so much and often so brutally, it is no wonder that they break often.
Keys come off, get stuck, or just get really dirty. When these things happen,
you should usually go ahead and replace the keyboard rather than live with the
hassle.
Today's keyboards have new, handy features. Some have built in user-defined
macro keys for often-repeated commands; some can fold up for easy
transportability; some have built-in ports so they can double as USB hubs.
There is a keyboard with some unique feature to suit nearly anyone's needs.
First and foremost, replacing the motherboard usually gives us the chance to
upgrade to the latest processor technology. Today, you can get the benefits of a
dual or even quad CPU setup with only one processor, thanks to multi-core
technology, in which more than one processing core is placed on a single wafer.
In a multitasking or multithreaded environment, this effectively increases your
computer's performance by a factor of two or four.
SELF-CHECK 2.1-4
A.ESSAY: Gives the repair faulty system and explain brief it.
B.ENUMERATION: Gives the 10 Pieces of Hardware you should replace
rather than repair and networks explain brief it.
1._____________________
2._____________________
3._____________________
4.______________________
5.______________________
6.______________________
7.______________________
8.______________________
9.______________________
10._____________________
TASK SHEET 2.1-4
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
A. ESD TOOLS:
Most tools used in the computer assembly process are small hand tools. They
are available individually or as part of a computer repair toolkit. Toolkits range
widely in size, quality, and price. Some common hand tools and their uses
Hex driver: Used to tighten or loosen nuts in the same way that a screwdriver
tightens or loosens screws (sometimes called a nut driver).
Needle-nose pliers: Used to hold small parts.
Wire stripper: A wire stripper is used to remove the insulation from wire so
that it can be twisted to other wires or crimped to connectors to make a cable.
Crimper: Used to attach connectors to wires.
C.CLEANING TOOLS
D.DIAGNOSTIC TOOLS
Digital multimeter: is a device that can take many types of measurements. It
tests the integrity of circuits and the quality of electricity in computer
components. A digital multimeter displays the information on an LCD or LED.
LAN CARD
It is a network interface card. This is a computer
circuit board or card that is installed in a
computer so that it can be connected to a network.
SERVER
It is a part of a network.
HUB / PORT
It is a connector on the back of
or a parallel port.
MODEM
The modem is a device that allows
SCANNER
It is an input device that read text
USB
Universal Serial Bus,
RAM
Random Access Memory, is a primary memory.
BIOS
Basic Input / Output System,
FLASH DRIVE
RAM that can retain data without electrical power.
SOLDERING IRON
It is used to join two or
LANTESTER
For RJ11,12,45 & BNC w/ Remote Unit
This ergonomic tester is designed to
test most network cable wiring.
You can either conduct an auto or manual test.
UTP
Unshielded Twisted Pair,
is a popular
type of cable used in computer
networking that consists
of two shielded wires twisted around each.
Multitester
RJ45
MOTHERBOARD
Directions.
1.
__________________________________________________
2. _____________________________________________________
3.
__________________________________________________________
4.
________________________________________________________
5.
__________________________________________________
________________1. It’s a RAM that can retain data without electrical power.
_______________3. device class that describes devices capable of streaming video like
you should be able to Use and Operation of Tools, Instrument and Testing
Devices ff. Standard operating procedures within 1 half hour
Steps / Procedure:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-5
CRITERIA YES NO
Did you……
Wear your ppe
And procedures
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-6
And procedures
LEARNING OBJECTIVES:
Computer Precautions
Reminders before you start disassembling your computer tower to keep both
your unit and yourself safe. And always remember on these “doesn’t fit doesn’t
belong”.
Assessing the risk means working out how likely it is that a hazard will harm
someone and how serious the harm could be.
For example:
ask your supervisor for instructions and training before using equipment
ask for help moving or lifting heavy objects
tell your supervisor if you think a work practice could be dangerous
The best way to fix a hazard is to get rid of it altogether. This is not always
possible, but your employer should try to make hazards less dangerous by
looking at the following options (in order from most effective to least effective):
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
you should be able to Occupational Health and Safety Policies and Procedures ff.
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-6
CRITERIA YES NO
Did you……
Wear your ppe
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-7
LEARNING OBJECTIVES:
Computers keep your business running, but your computer is like a car- it
needs regular computer maintenance to perform at its best. From the inside
and out, your computer is a machine that is capable of amazing things, but it
can’t do it alone. It needs your help, or the help of an IT solutions provider, to
stay running at full capacity.
Use this checklist to stay up-to-date with the tasks you should do daily,
weekly, monthly, quarterly, and yearly to keep your computer functioning at its
best.
DAILY
Virus/Adware/Spyware Scans
Delete internet temp files
Delete Windows temp files
WEEKLY
Windows Update
Check for Other Software Updates
Java
Flash
Antivirus/Adware Software
Adobe
Data backups
Empty the desktop Recycle Bin
Delete cookies
MONTHLY
YEARLY
Step 1: Anti-virus
Step 2: Anti-spyware/anti-malware
most anti-virus programs do a basic
spyware check too, but do both to
make sure. There are many options for
spyware removal software, Malware
Bytes Pro, Super Antispyware and
Spybot: Search and Destroy are
recommended. Many also offer to
protect your browser(s) against future
incursions which I’d recommend as it
can save you a lot of time and trouble.
Like anti-virus programs how they
work will vary but it’s usually easy to
see what you need to do, often you just click a button and let it go.
Step 3: Empty your recycle bin (best done with CCleaner)
SELF-CHECK 2.1-7
A. ENUMERATION: List down the Computer Maintenance Checklist
1.
2.
3.
4.
5.
6.
7.
8.
9.
you should be able to Occupational Health and Safety Policies and Procedures ff.
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-7
CRITERIA YES NO
Did you……
Wear your ppe
Anti-virus
Anti-spyware/anti-malware
Defragment
Check file backup plan and create system recovery disks if applicable
Clean and dust internal computer parts and fan (check fans and
computer temp.)
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
PREVENTIVE MAINTENANCE
TyMatt can provide you with preventive maintenance assistance either on-site
or via remote diagnostic support. Please contact us for a monthly maintenance
price quotation.
Data Backup
Whether it’s on-site or off-site (or a combination of both), TyMatt will help you
find a solution that meets your needs for data protection and backup and
ensures the fastest recovery of your data in the event of a system crash.
Off-site backup protects against hardware failures and localized damage such
as fire, flooding, vandalism, and theft. Since data is stored off-site on
redundant and secure servers. In the event of a failure, data can be restored
quickly to get your business back up and running.
Benefits of On-site
The benefit of having your data backed up on-site is allows you to restore lost
data very quickly. The on-site backup is a local, physical device directly
connected to your network. With off-site backup, data is restored over the
internet from the off-site servers; a reliable, but slower process.
Understanding The Importance Of Preventive Maintenance In
Computer Systems
Operating System Updates contain new software that helps keep your
computer current.
Important and high-priority updates are critical to the security and reliability of
your computer. They offer the latest protection against malicious online
activities.
You need to update all of your programs, including Windows, Internet Explorer,
Microsoft Office, and others. Visit Microsoft Update to scan your computer and
see a list of updates, which you can then decide whether to download and
install.
NOTE: Microsoft offers security updates on the second Tuesday of the month.
It's important to install new security updates as soon as they become available.
In Windows Vista, you control the automatic updating settings through the
Windows Update Control Panel. For more information, see Turn automatic
updating on or off.
Is your test system still running on an old operating system? In order to take
full advantage of the gamut of improvements in audio and visual technology, it
is necessary to modernize your equipment beyond the stock capabilities of the
standard VHS player. Similarly, your test system – and any hardware or
software system – also needs upgrades to continue to function reliably and
avoid ever more costly downtime.
Three Reasons Why Upgrading Your Test Operating System is a Priority
Whether designed using off-the-shelf or proprietary technology, your test and
measurement system will be more secure and easier to maintain with an
updated operating system (OS). Three reasons upgrading is important: cyber
security, product obsolescence, and enhanced capability.
2. Product Obsolescence
The longer a test system is allowed to languish on old platforms, the more
obsolescence threatens the test system’s ability to remain online and well-
supported.
Aged systems are subject to support difficulties in many areas and may cause
the following:
• Increasing likelihood of failures
• Higher frequency downtimes
• Longer duration downtimes
• Difficulty finding replacement parts
• Difficulty finding supported drivers
• Elongated time on support calls (as staff are trained in latest technology)
Some common signs that your software is incompatible with a new operating
system include:
• Software fails to launch
• Software used to generate reports and no longer does
• Software displays permission errors
• Software can no longer save configuration data
• Software can no longer print
• Software no longer collects data or data is wrong
If your software exhibits any of these traits it is likely not compatible with
modern OS rules and requirements.
3. Preserving Capability
Migrating test software to a newer operating system extends the overall lifespan
of the test system. Migration also allows the test system to take advantage of
faster, more reliable modern hardware and drivers and increases the overall
supportability of the system.
An experienced integrator can migrate your test system to a modern,
reliable platform
Migrating to a new OS is not as simple as installing the new OS. New OS
versions come with new rules and requirements, often rendering old software
unable to properly run. G Systems can update your test software to make it
compatible with the new environment.
Data and system owners should specify the frequency of their backups and
what should be backed up. Normally, data administrators should back up
everything -- or specific parts -- in the IT environment with a frequency
acceptable to business unit leaders and cost-effective operations.
Organizations should also consider the cost of backups and the effect of
backups on system -- and company -- performance. For example, it might
make sense to replicate the entire system or critical portions of the system and
specific individual files and databases to an alternate storage medium and
perform incremental backups to that environment.
Points in time when data and system backups can occur should be defined
based on business requirements. For example, some systems and data files
might need to be backed immediately when they have been modified. This
reflects their criticality to the business. Full backups are often performed after
business hours weekdays and over weekends. More frequent backups are
governed by the business and their execution might depend on specific systems
and network resources.
Some files are updated often during a typical day, such as customer data files,
requiring admins to back up these files more frequently. They might consider
backing them up at the end of each day -- factoring in all incremental revisions
-- so that an up-to-date backup is saved.
Other situations might require the immediate backup of changes so files are
always current. Other files might not need to be backed up regularly and, as
such, could be candidates for alternative storage, such as tape.
RPO requirements might also influence the frequency of backups. For example,
if the RPO for certain critical files is 10 seconds or less, the backups will likely
be more frequent, and the technology used for those backups -- e.g., data
mirroring, data replication, high-speed low-latency networks -- will also need to
be considered.
System backups might need a different schedule than data files and databases.
Backups should occur any time one or more parameters in a system change in
the course of daily operations. This suggests a more ad hoc approach to system
backups; each organization will need to establish those requirements.
Day zero backups are performed when a new system is fully installed
and accepted by the system owner. It establishes the initial baseline for
future updates.
Full backups store all the systems and files within the system, or they
store selected systems and files as defined by the system/data owner.
Companies should perform these on a regular basis, such as once a week,
and they should also consider backups when a major change to the IT
infrastructure occurs.
Incremental backups create a copy of all the files that have changed
since a previous backup.
Differential backups create a copy of all the files that have changed since
the last full backup.
Examples of frequently used systems and files for backup scheduling include:
Databases
VMs
Password and group files
Accounting files
Configuration files
Network files
Developing and implementing a backup schedule
The biggest disadvantage with system image backups—other than taking a bit
longer—is that you can’t restore the backup to a different PC. You’re creating
an image of your full Windows installation and, since Windows is set up
specifically for your hardware, it just won’t work as-is in another PC. It would
be like trying to plug your hard drive into another PC and expecting everything
to load well. With that in mind, though, image backups can still be really
handy.
Step One: Open System Image Backup
The process of finding the System Image Backup tool is different in Windows 7
than in Windows 8 and 10, so we’ll show you to find the tool in all versions,
and then explain how to create and use the system image.
In Windows 10, hit Start, type “backup,” and then select the entry.
In the “Backup and Restore (Windows 7)” window, click the “Create a system
image” link.
Open System Image Backup in Windows 8
In Windows 8, hit Start, type “file history,” and then select the “File History”
entry.
In the “File History” window, click the “System Image Backup” link
Open System Image Backup in Windows 7
Hit Start, click the arrow to the right of the “Getting Started” item, and then
click “Back up your files.”
In the “Backup and Restore” window, click the “Create a system image” link.
Creating A Windows System Image
Here we’ll show you how to create Windows 7 backup system image, the steps
for Vista and Win 8 compatible versions are broadly the same. You can only do
this from within Windows itself. There are a few ways of running the Windows
Backup and Restore Tool which will also allow you to create a repair disc or
backup files and folders, choose 1 from any of the following:
Click the Start orb and type backup into Search. You should see Backup
and Restore appear in Programs, press Enter.
Click the Start orb -> All Programs -> Maintenance -> Backup and
Restore.
Go to Control Panel and select Backup and Restore from an icon view, or
System and Security -> Back up your computer in Category view.
Now in the Backup and Restore tool, click Create a system image in the left
pane.
This will open up the Create a system image window. Alternatively, you can get
directly to this window from the desktop by using Win Key+R and typing the
following into the Run dialog box:
sdclt.exe /BLBBACKUPWIZARD
Now select where you’re going to backup the system image to, which can either
be to hard drive, multiple DVD discs or a network location if your Windows
version supports it. Removable USB devices such as flash drives will show
under hard disks. If you try to select another partition on the same physical
hard disk you’re backing up from, there will be a warning about it because that
hard drive failing will result in both operating system and the backup being
lost. If you place ANY value in your backups at all, it’s strongly recommended
to use a different physical device to save them to.
The next screen will offer to backup any other volumes you might want to
include in the process, the main system partition and the small 100MB boot
partition if present will be automatically selected and cannot be touched.
Windows Server Backup is a free tool in Server 2008, 2008 R2, 2012, 2016 etc,
which allows you to create a full server backup, system state backup, bare
metal backup, or backup selected volumes, specific files and folders.
However, this tool is not installed by default and you need to manually install it
using Server Manager. Just Open Server Manager, then go to Features > Add
Features > Windows Server Backup Features and click Install to start the
installation process.
Then, to create a system image backup in server 2008 with Windows Server
Backup, use the following steps. Please note that you must be a member of the
Backup Operators or Administrators group, or you must have been delegated
the appropriate authority. And this software only backs up volume formatted
with NTFS file system.
Create system image backup for Windows Server 2008 with AOMEI
Backupper Server
AOMEI Backupper Server is a trust and reliable backup software that is widely
used to create system image in Windows server 2008, 2012, 2016, 2019 etc.
This operation is very easy, just a few clicks. It supports full backup,
incremental backup and differential backup. It backs up system partition with
NTFS, FAT32, FAT, EXT2, EXT3 file system.
In addition, there are some useful feature you may use during the backup
process. They makes the task simple and efficient.
System Restore was first introduced in Windows ME and it has been included
in all the following Windows operating systems.
By default, Windows will automatically create system restore point when new
software is installed, when new Windows updates installed, and when a driver
is installed. Besides, Windows 7 will create a system restore point
automatically if no other restore points exist in 7 days.
Of course, you can also manually create system restore point in Windows 7.
You can follow the steps below to ensure System Restore is enabled and
custom the settings.
1. Click Start > type “create a restore point” in the search box > click Create a
restore point to open the System Properties window.
2. Enable system restore: In Windows 7, C: drive protection is on by default.
If you also want to create restore point on other drives, you can turn the
protection on for the specific disk by clicking Configure.
You can specify what you like to protect and disk space used for system restore
points.
5. Once the process is completed, you will see the restore point was created
successfully message.
The restore points will be saved on the volume that you are protecting, so if the
volume is corrupted, the restore points will not work. If the disk free space on
the volume is too low for System Restore to operate, it will automatically
disable itself.
You can use Disk Cleanup to delete the previous restore points but the latest
one to free up some disk space.
How to create restore point in Windows 7 automatically?
If you are not content with the gap between restore points creation interval,
you can use Windows Task Scheduler to automatically create system restore
point on a scheduled time or event. For example, to create system restore point
in Windows 7 at startup:
When your system gets corrupted or something else goes wrong, you can use
system restore point to restore the system to the previous good state. Two ways
are available. You can simply go to System Restore utility to make it. Or when
you cannot boot into Windows 7, you can go to Safe Mode to use restore
system.
1. Click Start > type “create a restore point” in the search box > click Create a
restore point to open the System Properties window. Click System
Restore option.
2. A window will appear and click Next to go to the next step.
3. It will list the recent restore points and the most recent restore point is
selected. You can click Show more restore points to see more. Choose the
restore point you need and click Next.
Note: If you are not sure whether the restore will cause some of your programs
to loss data, you can click Scan for affected programs to have a check.
4. Click Finish to start the restore.
Systerm restore in Safe mode:
1. At your computer startup (before showing the Windows logo), Press the F8
key repeatedly.
4. Then you can choose one of the available restore points to system restore
Windows 7 in Safe Mode.
If you cannot boot into Safe Mode, you can also use a system repair disc to
access System Restore to restore your computer.
Guarding Againts VIrus
Cybercriminals aren’t creating new viruses, instead they are focusing their
efforts on more sophisticated and lucrative threats. When people talk about
“getting a virus” on their computer, they usually mean some form of malware—
often a computer worm.
The terms “virus” and “malware” are often used interchangeably, but they’re
not the same thing. While a computer virus is a type of malware, not all
malware are computer viruses.
“Cybercriminals aren’t creating new viruses, instead they are focusing their
efforts on more sophisticated and lucrative threats. When people talk about
“getting a virus” on their computer, they usually mean some form of malware—
often a computer worm.”
The easiest way to differentiate computer viruses from other forms of malware
is to think about viruses in biological terms. Take the flu virus, for example.
The flu requires some kind of interaction between two people—like a hand
shake, a kiss, or touching something an infected person touched. Once the flu
virus gets inside a person’s system it attaches to healthy human cells, using
those cells to create more viral cells.
A computer virus works in much the same way:
1. A computer virus requires a host program.
2. A computer virus requires user action to transmit from one system to
another.
3. A computer virus attaches bits of its own malicious code to other files or
replaces files outright with copies of itself.
It’s that second virus trait that tends to confuse people. Viruses can’t spread
without some sort of action from a user, like opening up an infected Word
document. Worms, on the other hand, are able to spread across systems and
networks on their own, making them much more prevalent and dangerous.
Computer viruses don’t capture headlines like that—at least not anymore.
To recap, the bad guys aren’t focused on creating new viruses and most of the
really bad stuff is actually malware. Should we still take computer viruses
seriously? Definitely, yes.
With that said, let’s take a look at computer viruses under the microscope.
Today’s malware authors owe a lot to the cybercriminals of yesteryear. All the
tactics and techniques employed by cybercriminals creating modern malware
were first seen in early viruses. Things like Trojans, ransomware, and
polymorphic code. These all came from early computer viruses. To understand
the threat landscape of today, we need to peer back through time and look at
the viruses of yesteryear.
Other notable firsts—Elk Cloner was the first virus to spread via detachable
storage media (it wrote itself to any floppy disk inserted into the computer). For
many years to come, that’s how viruses travelled across systems—via infected
floppy disk passed from user to user.
Speaking with F-Secure, Basit called Brain a “very friendly virus.” Amjad added
that today’s viruses, the descendants of Brain, are “a purely criminal act.”
The problem with signature-based detection is that it can’t stop what’s known
as a zero-day virus; that is, a virus that cybersecurity researchers have never
seen before and for which there is no criminal profile. Until the zero-day virus
is added to the database, traditional AV can’t detect it.
Going back to our virus analogy one final time—removing a virus from your
body requires a healthy immune system. Same for your computer. A good anti-
malware program is like having a healthy immune system. As your immune
system moves through your body looking for and killing off invading viral cells,
anti-malware scans for files and malicious code that don’t belong on your
system and gets rid of them.
The free version of Malwarebytes is a good place to start if you know or suspect
your computer has a virus. Available for Windows and Mac, the free version of
Malwarebytes will scan for malware infections and clean them up after the fact.
Get a free premium trial of Malwarebytes for Windows or Malwarebytes for
Mac to stop infections before they start.
SELF-CHECK 2.1-8
A. ENUMERATION: List down the Create your data backup strategy: A
comprehensive guide
1.
2.
3.
4.
5.
6.
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
You have options for where you want to save the backup image:
external hard drive or DVDs. I suggest the former, even if your
computer has a DVD-RW drive, so connect your external drive to your
PC, select On a hard disk and click Next.
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 2.1-9
LEARNING OBJECTIVES:
Dust, food, liquid, and other particles can get stuck underneath the keys on
your keyboard, which can prevent it from working properly. The basic cleaning
tips below can help keep your keyboard clean.
If you spill liquid on the keyboard, quickly shut down the computer and
disconnect the keyboard. Then turn the keyboard upside down and allow the
liquid to drain.
If the liquid is sticky, you will need to hold the keyboard on its side under
running water to rinse away the sticky liquid. Then turn the keyboard upside
down to drain for two days before reconnecting it. Please note that keyboard
may not be fixable at this point, but the method above is probably the best
option.
If you just want to give the mouse a quick cleaning, place it on a clean sheet
of paper and move the mouse back and forth. Some of the dust and particles
should rub off onto the paper.
Dirt, fingerprints, and dust can make your computer screen difficult to read;
however, it's easy to clean your screen when needed. There are monitor-
cleaning kits you can buy, but they may damage your monitor if they're
designed for a different type of monitor. For example, a monitor cleaner that is
designed for glass screens may not work with some non-glass LCD screens.
The safest method is simply to use a soft clean cloth moistened with water.
Do not use glass cleaner to clean a monitor. Many screens have anti-glare
coatings that can be damaged by glass cleaner.
From time to time, you should clean your computer case and the sides and
back of the monitor to avoid a buildup of dust and dirt. Here are a few tips you
can use when cleaning these surfaces.
2. Use a can of compressed air to blow out debris from the air
intake slots.
3. Ammonia diluted with water—or glass cleaner comprised
mostly of ammonia and water—is a safe cleaning solution
for computer surfaces. The milder the solution, the better.
4. Clean the monitor housing and case (but not the monitor
screen) by spraying a safe cleaning solution onto a paper towel or
anti-static cloth and wiping in a downward motion.
Keep it cool
You can purchase an external hard drive and copy the contents of your
computer to it. The initial backup could take several hours, so you will need
to select a period of time when you do not need access to your computer.
Running the backup overnight usually works best. Follow-up backups should
be conducted on a regular basis, but they should not take as long.
One drawback is that an external hard drive can be lost, damaged, or stolen—
just as your computer might be. This is why it's important to keep your drive in
a secure location when not in use.
Delete files: If you have any unwanted files, you can delete them
manually. To do this, drag them to the Recycle Bin or Trash,
then empty it to permanently delete the files.
Run the Disk Defragmenter: Windows includes a Disk
Defragmenter program in the Control Panel. If your computer is
running slowly, running Disk Defragmenter can help to speed it
up.
Here are a few tips to help you avoid injury in your workspace.
Adjust your chair: Make sure your chair is adjusted to allow you
to sit in a natural, comfortable position. Many office chairs are
specially designed to support the lower back and promote good
posture.
Keep the keyboard at a comfortable height: Try to place the
keyboard in a position that allows you to keep your wrists straight
and relaxed to avoid wrist strain. Many desks have a keyboard
tray that can keep the keyboard at a better height. You can also
buy an ergonomic keyboard that is designed to minimize wrist
strain.
1.
2.
3.
4.
5.
6.
3. What is the basic cleaning tips below can help keep your keyboard clean?
4. What is the basic cleaning tips below will help keep your mouse clean
you should be able to Cleaning Computer Systems and Networks and Network
ff. Standard operating procedures within 3 hour
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Clean Your keyboard
Keep PC ventilated
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
Diagnostic Procedures
LEARNING OBJECTIVES:
It's a given: PCs go south and do so often. Whether it's hardware, software, or
user error, there will always be something in the way of that PC running
smoothly. Problem is, there are so many things that can go wrong, it's often
difficult to know where to start to simply discover the problem.
3: Is it hardware or software?
If a client describes an issue such as a slow PC, one of the first things I do is
check out the hardware. Is there enough RAM? Is there enough free space on
the C drive? And if the problem is network related, are the lights on the
network card blinking, on, or dark? If these don't highlight an issue, don't
immediately assume the issue is software related --there could be hard drive
issues. But before you dig deeper into hardware issues, this would be a good
jumping point for software. If nothing becomes apparent after you've
investigated software issues, come back to hardware and do a drive test or
defrag.
Of course, if no one can get online, the first thing to be done is power cycling
the router/modem/switch hardware. If that fails, there is always DNS to
troubleshoot. But that gets beyond standard triage (as it will often lead you
away from the client machine and to a DNS server issue).
Your computer completes a Power On Self Test, or POST, every time you turn
on your computer. POST performs basic diagnostics on your computer’s
memory and hard drives, checks for the presence of a keyboard and mouse,
and tests the clock and other system settings. POST resides in a small,
permanent memory area called BIOS, which stands for Basic Input Output
System; this contains compact, simple programs the computer uses when you
first turn it on. If a problem exists with the computer’s hardware, POST
signals this through coded audio beeps. Though hardware makers have
produced different versions of POST over the years, they all ensure that the
computer works correctly before it starts the operating system.
Check Disk
Task Manager
Drivers
Your PC uses a variety of devices for data storage, communications, input and
display. Each of these has a program called a driver that carries data between
the hardware and Windows. Frequently, drivers have a diagnostic capability
that checks the device’s operation and troubleshoots problems. Windows
organizes these drivers in its Device Manager, which you can see by clicking
the Windows "Start" button, right-clicking “Computer,” selecting “Properties”
and clicking the “Device Manager.”
Computer Diagnosis
Sometimes when the
problem with a system is
not totally apparent and
the problem may be
intermittent, using a
basic common diagnostic
procedure may help
determine what is wrong.
This procedure has a
number of steps that, if followed each time, can be of help.
5.Problem Isolation
Problem isolation is a detective work in which you need to determine
what is out of the ordinary by making detailed observation of what is
not working normally and record any information as you proceed. The
information you will be able to gather will help diagnose your
computer. You need to observe wisely. Look for any abnormalities in the
unit, any change in smell or foreign smell, listen to all the sounds, and
error codes.
6.Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor,
system unit, and printers. Some have multiple external devices. To
troubleshoot, you need to isolate major components which are failing to
operate.
ware
Untrained personnel would probably damage programs in PC.
Firmware
Programs or software burnt in chips may be corrupted.
Software
Corrupted operating systems would cause the system to fail.
Hardware
Defective hardware components would lead to
computer malfunction. Hardware conflicts and
viruses can hinder your computers performance.
Electricity
Incoming supply from AC outlet must be regulated; power surges can
damage computer units
Things to Consider
Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If
the basic troubleshooting steps don't work, you may need the
information.
Remember the steps you've taken, or write them down: Once you
start troubleshooting, you will want to remember what you have done,
so you don't repeat yourself. If you can't remember it, then write it
down. If you end up asking someone for help, it will be much easier if
they know exactly which steps you've taken.
Problems Starting or
Shutting Down the
Computer Power Button
Will Not Start Computer
If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case
and the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often,
this will require you to plug a lamp or other electrical device into the
outlet to make sure it is receiving power.
If the computer is plugged into a surge protector , verify that it is
turned on. You may have to it's possible that you could make the
situation worse, so it's best to consult a professional if you think a
drastic solution is needed
SELF-CHECK 3.1-1
A. ENUMERATION: Write a systematic approach to troubleshooting PC
issues will save you time and frustration and get your clients back to work
more quickly.
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
B. List down the rules in diagnosing computer systems
1. 4.
2. 5.
3. 6.
Diagnostic Procedures
Performance Objective: given necessary tools,equipment and materials,
Steps / Procedure:
Steps to Diagnosis
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Physical examination
Reaching a final diagnosis
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Fault-Isolation Definitions
Filters
Determining the cause of a problem. Also known as "fault diagnosis," the term
may refer to hardware or software, but always deals with methods that can
isolate the component, device or software module causing the error. Fault
isolation may be part of hardware design at the circuit level all the way up to
the complete system. It is accomplished by building in test circuits and/or by
dividing operations into multiple regions or components that can be monitored
separately. After fault isolation is accomplished, parts can be replaced
manually or automatically (see fault tolerant).Fault Isolation vs. Fault
DetectionAlthough the terms "fault isolation" and "fault detection" are
sometimes used synonymously, fault detection means determining that a
problem has occurred, whereas fault isolation pinpoints the exact cause and
location.Built Into Normal OperationSoftware can also be created and run with
fault isolation in mind. Many techniques can be used. For example, program
modules can be run in different address spaces to achieve separation. In
addition, generating intermediate output that can be examined as well as
recording operational steps in a log are ways to assist the troubleshooter to
manually determine which routine caused the application to stop working or
stop working properly.In a network, intelligent agents can be placed in various
nodes that continuously collect traffic statistics that are analyzed in real time
to detect and pinpoint the fault. See fault detection.
Problem Isolation
Troubleshooting requires that you find the root cause of the problem and then
fix it. The process to find the root cause begins with problem isolation. Problem
isolation moves you from the general ideas about a problem, to a specific idea
of what the problem is, as follows:
Before problem isolation: I have no idea, except for some general symptoms.
After problem isolation: I have an idea of what is not working, a comparison
to how it should be working, and I know on which devices it should be working
differently.
Isolate Computer Problems
• Divide and conquer: This rue is the most powerful. Isolate the problem. In the
overall system, remove one software or hardware component after another,
until the problem is isolated to a small part of the whole system.
• Don’t overlook the obvious: ask simple questions. Is the computer plugged
in? Is it turned on? Is the monitor plugged in? Most problems are so simple
that we overlook them because we expect the problem to be difficult.
• Check the simple things first: it is more effective to first check the
components that are easiest to replace.
• Make no assumptions
• Write things down: keep noting down the symptoms. They will help you think
more clearly.
• Reboot and start over: This is an important rule. Fresh starts are good for us
and uncover events or steps that might have been overlooked.
• Keep your cool: In an emergency, protect the data and software by carefully
considering your options before acting, by not assuming data is lost even when
hard drive and floppy drive errors occur, and by taking practical precautions to
protect software and OS files.
Faults
-Loose wires
- Broken wires
- Blown fuses
- Missing jumpers
- Loose connectors
- Solder bridges
- Broken IC leads
When solving a computer problem, apply above rules and, prepare course of
action. The course of action involves the, following:
Hardware type or role. Some tools that perform host discovery can
provide this information by querying the hardware information and
running applications to determine its type, such as server, workstation, or
portable computer. You can use this information to determine the
appropriate IPsec policy to assign, whether a specific computer can
participate in isolation, and in which isolation group to include the
computer.
You can use various methods to gather data from the hosts on the network.
These methods range from high-end, fully automated systems to completely
manual data collection. Generally, the use of automated methods to gather
data is preferred over manual methods for reasons of speed and accuracy.
Automated Discovery
Manual Discovery
You can use the Windows Script Host (WSH), VBScript, and Windows
Management Instrumentation (WMI) to create a script file that can collect the
system configuration information. VBScript and WMI are built-in to Windows
8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008,
and Windows Server 2008 R2. Starting with Windows Server 2008, Windows
PowerShell is included with the operating system. For more information, see
“Scripting with Windows PowerShell” (https://go.microsoft.com/fwlink/?
linkid=110413).
This inventory will be critical for planning and implementing your Windows
Firewall with Advanced Security design.
Windows 7 comes with several internal tools that can be used to diagnose the
computer system. One of them is the System Diagnostics Report which is part
of the Windows Control Panel.
Microsoft has hidden the tool deep inside the Control Panel which is why the
majority of users has probably never heard of the option before.
To run the system diagnostics report users need to open the Windows Control
Panel first. They can do that by clicking on the Start Orb and selected Control
Panel from the start menu. They then need to click on Performance Information
and Tools, and there on Advanced Tools in the left sidebar.
The Basic system checks group lists checks that have been performed by the
system diagnostics tool and how the system fared in the tests. Results are
shown for each test which should read passed for successful tests.
Users find here information about the system's average load, network
utilization or computer memory usage. Since this data is collected in the 60
seconds period it should be clear that users need to work normally on the
system during the test.
Lastly, there are loads and loads of in depth information about system
processes, services and other data that has been collected during the test
period. Some of the interesting information include files causing most disk IOs,
the processes that were using the most RAM memory or the IPs with the most
inbound or outbound traffic.
The System Diagnostics Report (or System Health Report) can help users find
problems quickly. It should be used as one of the first tools to analyze the
operating system.
NETWORK DESIGN PROPOSAL
FEASIBILITY STUDY
Network Scope: The proposed network is designed to serve the state Office of
Education and two of its school district offices. The state office, located
in Kenzington, contains five departments to be served by this network. Each
district office contains four departments to be served. The North School
District is located in Ricksville, 25 miles from the state office. The South School
District is located in Albanton, about 40 miles from the state office. Note that
this network does not serve instructional needs of students; other resources
have been allocated for that purpose. This network is for administrative
purposes and is specifically designed to be independent of student computing
facilities.
Intended Users. The primary users of the network at the state level will be the
three administrators, three secretaries, ten members of the Curriculum
Department, eight members of the Human Resource Department, six members
of the Finance/Accounting Department, and three members of the Computer
Services Department. At the district level the primary users will be four
administrators, four secretaries, four members of the Computer Services
Department, sixteen members of the Human Resource Department, and two
members of the Finance/Accounting Department. Parents, pre-service
teachers, teachers, and the public are secondary users of the network in that
they will receive information produced on the network, but they will not directly
use the network.
1. The State Education Network has a firewall that protects all information
coming and going from the network.
Data Types. The types of data served by the network will be reports, bulletins,
accounting information, personnel profiles, and web pages. The majority of the
data will be text (ASCII and non-ASCII), but there will be some still graphics
and possibly a small amount of voice and video (primarily for PC-based
teleconferencing).
Data Sources. Data will be created and used at all end stations on the
network. The data will be produced by software applications in Windows 2000,
primarily Dream Weaver and Office 2000 Professional (Word, Excel, Access,
PowerPoint, and Outlook). Other data sources to be supported on at least a
limited basis will Windows 2000 Accessories (Paint, Notepad, etc.), NetMeeting,
Media Player, and PhotoShop. Note that the network will be not be accessible
from outside…
Numbers of Users and Priority Levels. At the state level, the users will be
administrators, secretaries, and members of four departments. At the district
levels, the users will be administrators, secretaries, and members of three
departments. The maximum estimated number of users on the network at any
given time is 100: 33 regular users in the State Office, 30 regular users in the
North District Office, 30 regular users in the South District Office, and seven
otherwise unanticipated users.
Load Variation Estimates. Interviews with users and observation of LAN use
at the three locations yielded data on hourly average and peak loads from
January to March, 2001. The data are tabulated in the appendix. The data
indicate that the highest average traffic volume will occur from 8:00
a.m. to 6:00 p.m., Monday through Friday. The peak network traffic volume is
expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00 p.m.
to 5:00 p.m. At night and on weekends the network traffic is minimal except
for the daily backups of the PCs to the LAN servers in the districts and several
batch data transfers anticipated from the districts to the State Office. The data
indicate the following network design parameters:
· The average required throughput on any LAN during work hours (7:00
a.m. to 6:00 p.m.) will be only about 0.2 mbps.
· The average required throughput on the WAN during work hours (7:00
a.m. to 6:00 p.m.) will be only 0.04 mbps.
· The peak expected traffic load on any LAN will be about 10.4 mbps.
· The peak expected traffic load on the WAN will be about 6.4 mbps.
Of course, to avoid user complaints, the network is designed for the peak traffic
loads, not the average throughput.
HIGH-LEVEL NETWORK DESIGN
State Office Network Sub-Diagram
Administration LAN
State Office Network Sub-Diagram
Finance/Accounting LAN
State Office Network Sub-Diagram
Human Resources LAN
State
Office
Network
Sub-
Diagram
Computer
Services
LAN
North District Network Diagram
(LAN cabling is 100BaseT CAT5)
North District Network Sub-Diagram
Finance/Accounting & Computer
Services LAN
South District Network Diagram
(LAN cabling is 100BaseT CAT5)
South District Network Sub-Diagram
Finance/Accounting & Computer
Services LAN
SELF-CHECK 3.1-1
2.
3.
4.
5.
6.
1. 5.
2. 6.
3. 7.
4. 8.
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you……
Wear your ppe
Locate the Fault
Determination and Removal of the Cause
Rectification of the Fault
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
Computer networks are, after all, highly complex systems that comprise
various components and are in use by multiple users. These structures may
bring many benefits, but they can also be a recipe for disaster. And, if your
network fails or experiences any issues, then your organization’s productivity is
going to be affected.
Your main objective, with your computer network, should be to keep it online
and functioning correctly. But you can only do this if you know what the most
common computer network problems are, so let’s take a look:
6. Computer is Slow
If your computer is slower than normal, you can often fix the problem simply
by cleaning the hard disk of unwanted files. You can also install a
firewall, anti-virus and anti-spyware tools, and schedule regular registry
scans. External hard drives are great storage solutions for overtaxed CPU’s,
and will help your computer run faster.
7. Strange Noises
A lot of noise coming from your computer is generally a sign of either hardware
malfunction or a noisy fan. Hard drives often make noise just before they fail,
so you may want to back up information just in case, and fans are very easy to
replace.
8. Slow Internet
To improve your Internet browser performance, you need to clear cookies and
Internet temporary files frequently. In the Windows search bar, type ‘%temp%’
and hit enter to open the temporary files folder.
9. Overheating
If a computer case lacks a sufficient cooling system, then the computer’s
components may start to generate excess heat during operation. To avoid your
computer burning itself out, turn it off and let it rest if it’s getting hot.
Additionally, you can check the fan to make sure it’s working properly.
Network viruses can completely disable a computer network, so this is the first
issue we’re going to tackle. There can be a number of causes of computer
viruses. Viruses can come from a wide range of sources, such as e-mail
attachments, malicious software, online advertisements, and yes, even social
media.
The Solution:
Step 1: Check the severity of the infection by running a complete network scan
to find malicious files or programs. Make sure that your antivirus and anti-
malware programs are up to date and able to scan hidden files, the root
directory, and all running programs. Also, try to have your antivirus/anti-
malware software scan your e-mail inbox for any malicious materials.
Step 2: Back up all of your system files using the necessary tools. Running a
complete system backup will ensure that your data isn’t lost and that the
network will remain stable. The Windows’ “System Restore” option will allow
you to set up a restoration that can often be useful in an emergency.
Step 3: Confine all suspicious, irregular files. Isolating them will prevent their
exchanging with other files or your network system. Then, disinfect or
completely wipe all quarantined files. Manually delete any emails that were
identified by your antivirus software.
Using a wireless network is great for mobility, but can hinder your productivity
when it decides to malfunction. There are a few different reasons why your
wireless network is having connectivity issues, such as the wireless router or
the network card itself. This issue will require a bit of network troubleshooting
to find a solution, so let’s get to work:
The Solution:
Step 1: If your router won't connect to the internet, try putting your computer
or device right next to the router. If this causes your equipment to connect,
then the system hardware may have been the issue. If this didn’t fix the
problem, proceed to Step 2.
Step 2: Update the network card. Sometimes, your network card will receive a
strong signal, but won’t be able to transmit it quickly and effectively resulting
in the need for network troubleshooting. Updating the driver might solve the
problem entirely, but if it doesn’t, you might need to contact your IT
department or provider and consider replacing the hardware altogether.
3.Duplicated IP Address
The Problem: I got an error message that says that the IP
address is already in use.
A small error window just popped up on your screen saying that your IP
address is already in use. How is this even possible and what causes this IP
address conflict? Well, there are a few reasons why this can happen:
These are just a few of the plethora of reasons why IP address conflicts take
place. Here are some ways to fix this issue:
The Solution:
Step 1: Click the “Start” button and click “Run”. Enter “cmd” into the text box
and click “OK”. The Windows command prompt will open.
Step 2: Type “ipconfig/renew” into the command prompt and press “Enter”.
This will refresh your dynamic IP address.
Step 2: Rick click onto your network card and click “Properties”. In most cases,
your network card will be labeled “Local area LAN Connection.”
Step 3: Select “TCP/IP” in the list and then, click the “Properties” button under
the list of options. Enter in a new IP address in the opened window. Click “OK”
to confirm the changes you’ve made.
Mac
Step 2: Select “Wi-Fi” on the left side of the window. Then, click “Advanced”,
which is located on the bottom right.
Step 3: On the next page, select the “TCP/IP” tab and then click “Renew DHCP
Lease” on the right side of the window.
4. Slow Performance
If this solution didn’t work for you, here’s what you can do:
The Solution:
Note: Be sure to enforce proper network use by making sure that users aren’t
viewing too much digital content via streaming or continuously downloading
large files. Doing so will help you keep your bandwidth use under control.
However, if you find that your employees are utilizing the network correctly, it
might be time to upgrade your network to meet your business needs.
If you feel that the sluggishness of your applications is due to another issue,
proceed to Step 1.
Step 1: Try restarting your PC. Sometimes, a quick reset will fix any and all
issues right away. Doing so will clear your system memory (RAM). If this works,
remember to shut down your PC when it’s not in use. If this doesn’t help,
proceed to Step 2.
Step 2: Now, it’s time to check on your hard drive and make sure that it’s not
approaching the end of its lifespan. So, let’s run a hard drive check:
Windows
Right click on “Drive”. Then, click “Properties” and then click “Tools”. Click
“Check Now”. Select “Scan for and attempt recovery of bad sectors”. Doing this
will stop your computer from tapping into any malfunctioning areas of the hard
drive.
Mac
Click “Applications” from the “Finder”, then “Utilities”, and then “Disk Utility”.
Highlight the hard drive that’s giving you trouble and then select “First Aid”.
If your hard drive is healthy, but you think it’s becoming too full with data,
proceed to Step 3.
Step 3: Get rid of unnecessary files from programs that have gone unused.
System backups and restore points can eat up a lot of space, so don’t hang
onto more versions of this software than you need. You might also consider
uploading your data onto the cloud to save your hard drive.
Step 4: If you’ve completely deep-cleaned your computer and checked all of the
possible issues above, but your computer is still running slowly, it might be
time to upgrade your RAM so that your computer has more memory. Certain
programs take more RAM to run properly than others and if you don’t have
enough RAM ready, your computer will not be able to handle it. Look into RAM
upgrade options.
5. IP Address Exhaustion
There are a few different reasons why this could happen. It could be that the
DHCP server is out of addresses, the device might be set to use a static address
rather than a DHCP address, or maybe the DHCP request from the device never
made it to the server. Either way, here’s what we need to do:
The Solution:
Step 1: Check the network interface card (NIC). You can find this by opening
the control panel, then the device manager. Then, select “Hardware and
Sound” and then select “Device Manager”. Expand the Network Adapters item
to view all network adapters, although you will most likely only have one. Verify
that your system is configured to utilize DHCP.
Step 2: Check the switch to see which virtual LAN (VLAN) the port is set as a
member. Verify that other devices on this particular VLAN are able to get an IP
address. If they can’t, the issue is that the network is not sending DHCP
requests to the server.
If this issue is taking place with more than one device, then the issue is likely
the server itself.
6. VPN Errors
Your virtual private network (VPN) works to provide a safe connection between
a local client and a remote server. When you can’t connect to a VPN, you’ll
receive an error message that usually states something along the lines of “VPN
error 800 – Unable to establish the VPN connection”. This can happen if the
client device disconnected from the local network, the network’s firewall is
blocking the VPN traffic, or if the name/address specified for the VPN server
was incorrect.
The Solution:
Step 1: Check the connection between the client and server. Attempt to
connect to the server from a different client device to verify whether the
network issue is a widespread issue or if it is affecting only one client.
Step 2: Verify that the name entered on the client side matches the server
name given by the VPN administrator. In some instances, users can specify an
IP address rather than a name, while it’s more typical for users to mistype the
address than the name. VPN servers can also change their IP addresses in
some instances, especially DHCP networks.
Step 3: If the first two steps didn’t clear up the issue, now it’s time to make
sure that the firewall isn’t blocking your connection with the VPN. Do so by
temporarily disabling it to retry the connection. If this solves the problem, you
need to update the firewall settings specific to the port numbers that the VPN
on the network is using to prevent this issue from happening again.
If none of this troubleshooting solved the issue, it could be possible that the
server is overloaded with clients or that it is offline. Check with your IT
department to see what can be done.
Connection issues are some of the most annoying, frustrating network issues
of all. These issues can be a result of all types of glitches and issues within the
computer and/or the network itself. So, if your computer has handed you a
lovely “Limited or no connectivity” error message, here’s what you can do to fix
it:
The Solution:
Step 2: Restart your router or modem. DO NOT reset the router or modem or
restore its settings back to factory default. Simply turn the router or modem off
and back on. If this doesn’t work or only works for a moment, keep going to
Step 3.
Step 3: If you are connected to your network via Ethernet cable, unplug the
cable and then reattach it. If needed, replace your network cable with a new or
different cable to see if this was the cause of the issue.
Step 4: If you’re connected via Wi-Fi when you see this error, it’s a possibility
that the network adapter is attempting to conserve power. Stop this by finding
the Network and Sharing Center in the Control Panel. Right click “Wi-Fi
Connection”, select “Properties”, click “Configure” and find the “Power
Management” tab. Click and uncheck the option that allows your computer to
turn off device to conserve power.
Step 5: If you’ve tried all of this and there’s still no connection, unplug your
router and connect your computer directly to your modem. If this solves the
issue, then your router is likely to be malfunctioning. If not, contact the router
manufacturer for support.
If the error remains and the network is still down, reach out to your internet
service provider for help.
SELF-CHECK 4.1-1
1. 6.
2. 7.
3. 8.
4. 9.
5. 10.
2. 6.
3. 7.
4.
you should be able to defects in computer systems and networks ff. standard
operating procedures within 2 hour
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you…….
Wear your ppe
Use ipconfig
ASSESSMENT CRITERIA:
RESOURCES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
Do you know what to do if your screen goes blank? What if you can't seem to
close an application, or can't hear any sound from your speakers? Whenever
you have a problem with your computer, don't panic! There are many basic
troubleshooting techniques you can use to fix issues like this. In this lesson,
we'll show you some simple things to try when troubleshooting, as well as how
to solve common problems you may encounter.
There are many different things that could cause a problem with your
computer. No matter what's causing the issue, troubleshooting will always be a
process of trial and error—in some cases, you may need to use several
different approaches before you can find a solution; other problems may be
easy to fix. We recommend starting by using the following tips.
Write down your steps: Once you start troubleshooting, you may
want to write down each step you take. This way, you'll be able to
remember exactly what you've done and can avoid repeating the
same mistakes. If you end up asking other people for help, it will
be much easier if they know exactly what you've tried already.
Take notes about error messages: If your computer gives you
an error message, be sure to write down as much information as
possible. You may be able to use this information later to find out
if other people are having the same error.
Always check the cables: If you're having trouble with a specific
piece of computer hardware, such as your monitor or keyboard,
an easy first step is to check all related cables to make sure
they're properly connected.
Restart the computer: When all else fails, restarting the
computer is a good thing to try. This can solve a lot of basic
issues you may experience with your computer.
If you're having an issue with your computer, you may be able to find out
what's wrong using the process of elimination. This means you'll make a list
of things that could be causing the problem and then test them out one by one
to eliminate them. Once you've identified the source of your computer issue, it
will be easier to find a solution.
Scenario:
Let's say you're trying to print out invitations for a birthday party, but the
printer won't print. You have some ideas about what could be causing this, so
you go through them one by one to see if you can eliminate any possible
causes.
First, you check the printer to see that it's turned on and plugged in to
the surge protector. It is, so that's not the issue. Next, you check to make
sure the printer's ink cartridge still has ink and that there is paper loaded in
the paper tray. Things look good in both cases, so you know the issue has
nothing to do with ink or paper.
Now you want to make sure the printer and computer are communicating
correctly. If you recently downloaded an update to your operating system, it
might interfere with the printer. But you know there haven't been any recent
updates and the printer was working yesterday, so you'll have to look
elsewhere.
You check the printer's USB cord and find that it's not plugged in. You must
have unplugged it accidentally when you plugged something else into the
computer earlier. Once you plug in the USB cord, the printer starts working
again. It looks like this printer issue is solved!
This is just one example of an issue you might encounter while using a
computer. In the rest of this lesson, we'll talk about other common computer
problems and some ways to solve them.
Solution 2 (Mac only): Restart Finder. To do this, press and
hold Command+Option+Esc on your keyboard to open the Force
Quit Applications dialog box. Next, locate and select Finder, then
click Relaunch.
Solution 3: Press and hold the Power button. The Power button is
usually located on the front or side of the computer, typically
indicated by the power symbol. Press and hold the Power button
for 5 to 10 seconds to force the computer to shut down.
Solution 4: If the computer still won't shut down, you can unplug
the power cable from the electrical outlet. If you're using a laptop,
you may be able to remove the battery to force the computer to
turn off. Note: This solution should be your last resort after
trying the other suggestions above.
Solution 1: Check the volume level. Click the audio button in the
top-right or bottom-right corner of the screen to make sure the
sound is turned on and that the volume is up.
Solution 2: Check the audio player controls. Many audio and
video players will have their own separate audio controls. Make
sure the sound is turned on and that the volume is turned up in
the player.
If you still haven't found a solution to your problem, you may need to ask
someone else for help. As an easy starting point, we'd recommend searching
the Web. It's possible that other users have had similar problems, and
solutions to these problems are often posted online. Also, if you have a friend
or family member who knows a lot about computers, they may be able to help
you.
Keep in mind that most computer problems have simple solutions, although it
may take some time to find them. For difficult problems, a more drastic
solution may be required, like reformatting your hard drive or reinstalling your
operating system. If you think you might need a solution like this, we
recommend consulting a professional first. If you're not a computer expert,
it's possible that attempting these solutions could make the situation worse.
SELF-CHECK 4.1-2
1.
2.
3.
4.
1. 2.
5. 3.
6. 7.
4. 8.
TASK SHEET 4.1-2
Steps / Procedure:
Demonstration
CRITERIA YES NO
Did you…….
Wear your ppe
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 4.1-3
LEARNING OBJECTIVES:
IT Consulting
Your computer network is the most used, most relied upon, most critical
asset for running your business..... but it is probably the least appreciated.
There are two types of computer networks in business today. Those that were
designed and installed well by competent professionals, and those that were
not. Most likely your network falls into the second category because you are
looking for help and reading this! Most networks that we encounter are a
product of evolution. When you first set up a network, it was a simple matter
of running some wire around from computer to computer until the lights
started blinking. You either installed your first network yourself, or gave a
deserving kid an opportunity to earn some money and gain experience while on
summer vacation. Maybe it was your own kid or relative and nobody wants to
criticize their work. It all seemed simple enough, but then you started adding
more computers and eventually a server to share files. You added Internet and
maybe some multi-user software, printers, and other devices. At some point,
you added a wireless router so that your employees could use their laptops,
smartphones, and tablets. Somehow it all magically worked,,,, until it didn't!
This was all great until things started slowing down. Strange error messages
started appearing on your screens, and some computers could not get reliably
connected. Data got corrupted and you started having some real problems.
You can see from the variety of types and colors of network cable lying around
that different people have come through and expanded or repaired your
network, spendng no more than what it takes to get by. You lost track of what
goes where and what is actually being used. Employees come and go and
nobody today really knows exactly what you have or understands how it all
works, nor do they care. Eventually something breaks and you find out that
the company, or individual who installed your network is out of business, or
grew up and moved on. Now you have a mess and you want someone to come
in and straighten it all out. Yes, we have seen it all before. It is time for a new
network, this time professionally installed!
Networking
Problem Solving
Home
There are times when you need to call in Experienced Technical Problem
Solvers
Our extensive experience is our biggest asset. We take the time to listen to
users, analyze customer's needs, and recommend solutions that work.
Whenever we install something, we make sure we do the job right, according to
well established industry standards and best practices. We will only use the
best available computer hardware and software that will assure success. We
are used to solving problems that nobody else can.
Home
Problem Solving
Home
IT Consulting
User Training
Problem Solving
Emergency IT Service
Decisions need to be made, and right or wrong decisions can make or break a
business. Without consistant administration, your computer system will be
adrift and eventually show the signs of neglect. Your system needs someone to
keep a watchful eye on changing technology and innovations in Windows,
Linux, network security issues, as well as all the hardware and software in
use. Someone needs to make practical recommendations on how to utilize new
technology to your best advantage. Someone needs to be looking down the
road at emerging technology and the future of your company.
Many companies no longer have the luxury of their own IT Departments to, or
even dedicated, qualified, IT Personnel as a result of downsizing or recent
economic hardship. Your computing environment is unique and it is wasteful
to have different technicians come in from time to time and try to fix or
maintain a system they are not familiar with. By performing regular
maintenance and IT Technical support, we build a level of familiarity that will
allow us to diagnose problems and implement solutions much more quickly,
thus saving you a lot of money over time.
Maintenance Plans
We keep ourselves up to date on all the latest security patches, varnings, and
various bugs that are known problems. We know how to track down error
codes and search for solutions based on other peoples experiences with the
same problem. There is often no need to invent a solution. By keeping up and
reading about problems, vulnerabilities and their solutions, we can often
prevent a problem on your system before it ever happens.
Problem Solving
Software Implementation
User Training
Problem Solving
Emergency IT Service
Problem Solving
Any kind of technology can be intimidating. We are also capable and have
experience installing medical equipment, phone systems, security systems,
cash register point of sale systems, and sometimes become involved in the
technical design of customer products. We can work with your vendors and
their technical specifications to make sure their products will interface with
your computing environment and make any adjustments necessary.
IT Consulting
Problem Solving
IT System Modernization
IT Consulting
IT System Modernization
Once the problem is identified, we can quickly get the resources you
need.
We consider all the resources available to us whether it be placing a temporary
server, offloading services to our own network, or knowing where to quickly
obtain a critical replacement part. We do whatever it takes to get you
operational as quickly as possible. An example of this is a customer who runs
QuickBooks Enterprise on their server that crashed. In order to buy time to
build a new server, we installed their QuickBooks on one of our servers for the
customer to access remotely. Once the new server is up and running, the
QuickBooks and Data were transferred to the new or repaired server.
We have loaner Servers, Switches, Routers, Hard Drives, and pretty much
anything else to get your system back up and running so your business will
not suffer.
Emergency IT Service
IT Consulting
Problem Solving
We have the skills and tools to find and correct problems on your
network.
We have the ability to perform a full analysis of your network and find out what
is going on. We can find and correct connection problems due to bad cable,
connectors, or electrical interfearance. We analyze your network traffic to
abnormalities, traffic restrictions, or signs of virus activity. We make sure your
network is secure from attackers and hackers and that your corporate and
customer data is protected. We often implement QOS or Quality of Service
Policies to make sure that your Internet connection is shared in a way that
nobody can hog all the Internet bandwidth. We monitor your network remotely
and are alerted whenever a problem arises.
Problem Solving
Networking
Problem Solving
Maintenance Plans
Emergency IT Service
Emergency IT Service
Give us a call so we may meet and discuss your unique situation and Help
Desk Technical Support Needs.
We can come up with a Technical Support plan that works for you and is
within your budget. We will start supporting your users right away to take
care of their immediate needs and get an idea of what is required to provide
ongoing support.
Maintenance Plans
Give us a call so we may meet and discuss your networking needs. We are
professionals who understand what it takes to build and maintain reliable
networks.
We have experience building and maintaining reliable networks. We
understand that nothing is more critical to the operation of your business so
we do not compromise on quality. When we are finished, you can concentrate
on running your business rather than fighting computer and network
problems.
Networking
Give us a call so we may meet and discuss your problem and help find a
solution.
We have a lot of experience and resources that we can utilize to solve your
problem. We will work with you as a part of your management team with the
common goal of solving the problem. We have turned many problems into
solutions and turned bad situations around. We are often the Big Guns that
come in and solve problems where others have failed because we are
experienced and know how to solve problems.
Problem Solving
Give us a call so we may meet and discuss your needs. We will give you a
fast and honest answer whether or not we can help.
We do not pretend to do anything and everything. The things we know best are
computers and computer networking. Chances are that your problem is not all
that unique and we have worked on something similar before. Most of the time
our the solutions we recommend are based on real life experiences or things we
know we can handle. Just as importantly, we are also honest enough to let
you know our limitations and avoid the disaster of taking on something we are
not ready to handle.
SELF-CHECK 4.1-3
A. ENUMERATION: Write the common computer emergencies and how To
fix them.
1.
2.
3.
4.
5.
6.
7.
Steps / Procedure:
Assessment Method:
Demonstration
CRITERIA YES NO
Did you…….
Wear your ppe
Check your Solution
Hardware Configuration
Software Configuration
ASSESSMENT CRITERIA:
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
Corrective Action
Hardware Configuration
Software Configuration
LEARNING OBJECTIVES:
Hardware Configuration
Each device has a hardware configuration setting, which may include the
following:
Interrupt Request (IRQ) Lines: These are hardware interrupt lines, which
signal the CPU when a peripheral event has stopped or started.
Direct Memory Access (DMA) Channels: This is a method for transferring
data from the main memory to a device without going through the CPU.
Input/Output Port: This connects the input and output devices to the
computer. There is a memory address for each port.
Memory Address: There is a unique identifier used for each memory
location. The memory address is typically a binary number, which is
numbered sequentially.
All hardware devices have configuration settings that can affect performance
and system function. Hardware configuration information may include:
Available memory
Power management features
Devices that are connected such as modems, disc drives and serial ports
First decide on for what purpose you are buying the computer and fix the
budget you have to spend for it. Then choose the hardware components
carefully according to your needs. This article briefs the hardware
configuration needed for different types of computers.
1. Office computers
The graphics card that comes with the motherboard alone is enough, so no
need for separate graphics card. A 500 GB HDD can be affordable since the
prices of hard disk drives are going down.
2. Multimedia/graphics computer
More importance should be given to the graphics card in this type of computer
since they have to work with high quality graphics. Get a graphics card from a
branded company and of high quality. There should be PCI-E slots in addition
to PCI slots.
The size of RAM also should be quite big. Something in the range of 4 to 6 GB
is okay. Considering the processor as triple or quad processor is good for this
type of computers.
3. Gaming computer
This type of computer should be more rigid and tough since they have to come
across all the bumps and pats of the frustrated user who loses the game.
Definitely a HD LCD monitor of at least 21’’ should be provided for more
attraction towards games.
Dual core processors are enough but dual processors could be advantageous
for several games. Motherboard with PCI-E slots, a graphic card which provides
at least 30 frames per second, a good cabinet with airflow, quality speakers,
multimedia keyboard and a durable mouse are other important things for a
gaming PC. RAM size of 4 GB will be perfect for this type of computer.
These three are the most different types of computers we come across. You
might wonder why there is no information on personal home computer. But the
fact is, it is good enough to buy computers which are sold with pre-assembled
configuration for home use, according to your financial plans.
In ClearCase, a checkout operation creates a local copy of the file in which you
can make changes. When you are satisfied with your work, you check in the
file to create a new version. The original file version always exists.
One fact of life in a multiuser environment is that many users can check out
the same file at the same time. When this happens, a special feature of the
software configuration management system called "merge" is available to
combine multiple changes to a single file. The first user to check in the file
creates the new version. The second user to check in the file must merge her
changes into that version. If the software configuration management system
can combine the changes, they are merged into a new version of the file. If the
changes conflict or cannot be resolved by the software configuration
management system, the conflicts must be resolved manually.
Rational Team Concert:
You can use Jazz source control to manage source code, documents, and other
artifacts that you want to place under version control and share with a team.
Jazz source control is closely integrated with the other application development
lifecycle tools included in Rational Team Concert.
You can create a project in your workspace, share the project to place
the project under Jazz source control.
Check-in your changes to the repository workspace.
Deliver the changes to the stream from the repository workspace so that
the changes are available to all members of the team.
You can accept a team invitation, or create a new repository workspace
from one of the streams of the team.
Functional test assets
A typical Rational Functional Tester test script object includes these files:
Script file ( scriptname.java for Rational Functional Tester, Eclipse
Integration, or scriptname.vb for Rational Functional Tester, Microsoft Visual
Studio .NET Integration)
This file is created through recording.
Script helper file ( scriptname ScriptHelper.java for Rational
Functional Tester, Java Scripting, or scriptname ScriptHelper.vb
for Rational Functional Tester, VB.NET Scripting)
Each script has a script helper file that is generated after recording.
Shared test object map file ( kadov_tag{{<ignored>}}filename.rftmap
kadov_tag{{</ignored>}}) or private test object map file (scriptname.rftxmap )
Each script has a map file. The map file can be associated with only one script
(*. rftxmap ) or shared among many scripts (*. rftmap ). To prevent users from
accidentally selecting a private map name as a shared map, the suffixes are
different.
Verification Point file ( verificationpointname .rftvp )
Each script may also contain one or more verification point files. Verification
point files are not shared among scripts.
Script Definition file (scriptname.rftdef )
Each script contains a script definition file. The script definition file contains
the name of the map file, script name, the names of all of the recognized
objects, and other file linkage information.
Public Test Datapool ( filename.rftdp ) or Private Test Datapool
( scriptname.rftxdp )
You can associate a public or private test datapool with a test script. You can
associate a public test datapool with one or several test scripts.
This topic shows example hardware/software configurations for different
LabKey Server installations. These are intended as guidelines only -- your own
configuration should be adjusted to suit your particular requirements.
Disk
164GB (64GB for File Storage, 100GB for database storage)
Storage
We recommend placing the web server and the database server on different
machines in order to optimize maintenance, update, and backup cadences.
Disk
64GB (for OS and LabKey binaries), 512GB (for file storage)
Storage
Network 1 GB/s
Disk
100GB (for database storage)
Storage
Network 1 GB/s
SELF-CHECK 4.1-4
1.
2.
3.
B. ESSAY:
Corrective Action
Hardware Configuration
Software Configuration
Steps / Procedure:
2. Provides details about the Hardware and Software used in our testing.
3. Client Hardware and Software setup that was used the tests.
Assessment Method:
Demonstration
CRITERIA YES NO
Did you…….
Wear your ppe
Provides details about the Hardware and Software used in our testing
Client Hardware and Software setup that was used the tests
ASSESSMENT CRITERIA:
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
LEARNING OBJECTIVES:
2. Determine the Inspect and Test the Computer Systems and Networks
List of Tutorials:
What is System Testing
System vs end to end testing
The process of testing an integrated hardware and software system to verify
that the system meets its specified requirements.
Technicians need to adhere to health and safety regulations as they will help to
protect everyone and to avoid any unnecessary legal action for reckless and
unsafe working practices. Any health and safety problems, the line manager or
the health and safety representative must be informed immediately.
The most basic test is to switch the system on to check it starts without errors.
ICT professionals are also likely to use tools and utilities to check that all is
well with the system after installation.
Diagnostic Tools in testing installed components
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools
include the following:
Software Tools
Like hardware tools, there are a variety of software tools that can be used to
help technicians pinpoint and troubleshoot problems. Many of these tools are
free and several come with the Windows operating system.
TEST PROCEDURES
A test procedure is a set of steps to guide you through what needs to be done
to thoroughly test the installation. It is designed to help you work more
effectively and to make sure you test everything that needs testing.
NOTICE: Before you proceed with the internal visual inspection, ensure
that all open files are saved and exited all open application programs if
possible.
CAUTION: When handling the heat sink assembly, take care to avoid sharp
edges on the heat sink.
3. Verify that the chips, expansion cards, and SEC cartridge and heat sink
assembly or assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on
the top of each chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are
firmly attached to their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power
sources, and turn them on.
1.
2.
3.
4.
B. List down the OBSERVING THE BOOT ROUTINE and INTERNAL VISUAL
INSPECTION
1.
2.
3.
4.
5.
6.
7.
8.
TASK SHEET 5.1-1
you should be able to testing methods and procedures ff. standard operating
procedures within 2 hour
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-1
CRITERIA YES NO
Did you…….
Wear your ppe
ASSESSMENT CRITERIA:
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-2
LEARNING OBJECTIVES:
What is 5S
One of the most powerful Lean Manufacturing Tools and a cornerstone of any
successful implementation is that of 5S, but what is 5S and its 5 Steps of Seiri,
Seiton, Seiso, Seiketsu and Shitsuke?
5S is a simple tool for organizing your workplace in a clean, efficient and safe
manner to enhance your productivity, visual management and to ensure the
introduction of standardized working.
Most of the other definitions of 5S and descriptions that I see here on the
internet concentrate heavily on the aesthetics and the efficiency gains that you
achieve through implementing 5S and neglect the real aim of 5S; the need to
introduce standard operational practices to ensure efficient, repeatable, safe
ways of working.
In addition to standardised working which provides you with a stable
foundation to build all of your other improvements through implementing Lean
Tools, you also provide a highly visual workplace. One of the most important
factors of 5S is that it makes problems immediately obvious.
5S is a team run process and should be conducted by the people who work
within the area in which the principles of 5S are being applied, it is not a tool
that can be applied by an outsider onto an area without the knowledge and
cooperation of the people within it.
Origins of 5S
5S as a methodology has come out of the techniques within Total Productive
Maintenance (TPM) and from the Toyota Production System (TPS). However
many of the individual components such as creating ergonomic and efficient
work places can be seen to owe their roots to people such as Taylor for his
work on “scientific management” and Frank Gilbreth’s “time and motion
studies.”
Frank Gilbreth showed that by improving the ergonomics of a bricklayers
working methods he could reduce the number of individual movements
required and increase the hourly output from 120 to 350 bricks laid each hour.
The Concept of 5S
5S is a methodical way to organize your workplace and your working practices
as well as being an overall philosophy and way of working. It is split into 5
phases, each named after a different Japanese term beginning with the letter
“S”; (Seiri, Seiton, Seiso, Seiketsu, Shitsuke) hence the name 5 S.
These five distinct phases are (with English descriptions);
Steps of 5S
5S Seiri; Sort, Clearing, Classify
5S Seiton; Straighten, Simplify, Set in order, Configure
5S Seiso; Sweep, shine, Scrub, Clean and Check
5S Seiketsu; Standardize, stabilize, Conformity
5S Shitsuke; Sustain, self discipline, custom and practice
And for completeness, some companies add a 6th (6S) of Safety, although in
my opinion this should be an integral part of the steps of 5S and not a separate
stage in itself.
5C and CANDO
There has been reluctance for some companies in the past to take up
“Japanese” initiatives for business improvement, so some consultancies and
other bodies have come up with non-Japanese equivalents; two of which are
listed below as alternatives for 5S.
5S is also known in some quarters as 5C, with the “S” words replaced by
Clearing,
Configure,
Clean and Check,
Conformity and finally
Custom and practice.
CANDO is;
Cleanup,
Arrange,
Neatness,
Discipline, and
Ongoing Improvement.
5S Definition
Below are definitions and explanations of each step of the 5S process;
5S Seiri or Sort
5S Seiri removing Clutter
5S Seiri or Sort is the first step in 5S, it refers to the sorting of the clutter from
the other items within the work area that are actually needed. This stage
requires the team to remove all items that clearly do not belong in the working
area and only leave those that are required for the processes in question.
SELF-CHECK 5.1-2
A. ENUMERATION: Write the 5s and 3rs environmental policies
you should be able to 5s and 3Rs Environmental Policies ff. standard operating
procedures within 2 hour
Steps / Procedure:
Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-2
CRITERIA YES NO
Did you…….
Wear your ppe
Less space
Improved self-discipline
Improved culture
LEARNING OUTCOME NO.5
ASSESSMENT CRITERIA:
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-3
LEARNING OBJECTIVES:
Status: Published
Legacy Id: TECH95541
Products:
Endpoint Protection
Issue/Introduction:
Resolution:
The table below describes some typical uses for the kind of information
that you can get from Computer Status reports and logs.
Virus Definitions Use this report to make sure that all the groups, domains, or servers in
Distribution your network use up-to-date virus definitions files versions.
Computers Not Use this report to find the computers that have not checked in with a
Checked into server and therefore might be lost or missing.
Server
Symantec Use this report to check the versions of product software, virus
Endpoint definitions, IPS signatures, and proactive protection content in use in
Protection Product your network. With this information you can pinpoint the computers that
Versions need an update.
Intrusion Use this report to make sure that all the groups your network use up-to-
Prevention date intrusion prevention signatures. You can also see which domains or
Signature servers are out-of-date.
Distribution
Client Inventory Use this report to see the number and percentage of computers that fall
into certain hardware and software categories. Available information
includes the computers' operating system, total memory, free memory,
total disk space, free disk space, and processor type. For example, from
the Client Inventory report, you might see that 22% of your computers
have less than 1 GB of free disk space.
Compliance Status Use this report to see which groups or subnets have the largest
Distribution percentage of computers out of compliance. You may want to
investigate if certain groups seem to have a lot more compliance
problems than others.
Client Online Use this report to see which groups or subnets have the largest
Status percentage of clients online. You may want to investigate why some
groups or subnets currently experience more problems than others.
Clients With Latest Use this report to see which groups or subnets have the largest
Policy percentage of computers that don't have the latest policy on them.
Client Count by Use this report to see the total number of clients and users, by group.
Group
Security Status Use this report to quickly see the total number of computers that
Summary have the following problems:
o Auto-Protect is disabled
Protection Content Use this report to check the versions of Proactive Protection content in
Versions use in your network, to pinpoint any computers that need an update.
Client Migration Use this report to see the migration status of clients by domain, group,
and server. You can quickly identify clients where migration has failed or
has not yet started.
Clients Online/ Use this report to pinpoint the clients that don't connect to the network
Offline Over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)
Clients With Latest Use this report to pinpoint the clients that don't get policy updates
Policy over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)
Client Software Use this report to pinpoint the clients that don't have the latest software
Rollout version deployed. This report is available only as a scheduled report.
(Snapshots)
Non-compliant Use this report to pinpoint the clients that frequently fail host integrity
Clients Over Time checks. This report is available only as a scheduled report.
(Snapshots)
Virus Definitions Use this report to check to see the definitions versions that clients have.
Rollout This report is available only as a scheduled report.
(Snapshots)
Computer Status Check the Computer Status log if you need more details about any of
log the areas that the reports cover.
ASSESSMENT CRITERIA:
4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures
RESOURCES:
METHODOLOGIES:
Lecture /discussion
Demonstration
Self-learning
INFORMATION SHEET 5.1-4
LEARNING OBJECTIVES:
wastewater-treatment plant
Wastewater-treament plants remove chemical or biological waste from water.
The good news is that you have plenty of options for properly recycling or
donating your used electronics. It’s important to understand this: Even if you
take your e-waste down to your local recycling center, there’s a high
probability that it won’t get recycled properly. As ABC News discovered, e-
waste recyclers are often more concerned with making a buck than they are
with making sure these hazardous materials are disposed of properly. So
what can you do?
Many communities post a calendar that will include recycling days, so check
your local paper or visit their website. When you recycle your items locally,
you can make the occasion a day trip and a community event. Encourage
your neighbors to join you and spread the word about educated e-waste
disposal.
Best Buy makes sure that the recyclers we work with adhere to the highest
guidelines and standards so that the products customers bring into our
stores for recycling don’t end up in landfills or in foreign countries, and that
all hazardous materials are disposed of properly. We partner directly with a
short list of qualified, respected recycling companies who ensure all products
collected for recycling through Best Buy are handled responsibly. These
recycling companies meet our standards, and we encourage them to examine
and consider additional third-party standards for responsible practices (such
as the EPA R2 and e-Stewards).
You can drop off all kinds of e-waste for recycling at Best Buy including:
Cell phones
TVs
Power cords
GPS devices
Speakers
DVD players
Paper shredders
Memory cards
Desktops
Laptops
Netbooks
Additionally, Gettington teams up with an e-Stewards partner, CExchange, to
provide you with an opportunity to recycle your e-waste via pre-paid postage
containers. You can recycle old items and get the benefit of cash reward for
some products. You can even transfer the rewards to charitable organizations.
Gazelle, a marketplace that can also provide some cash incentives, will help
you organize a Gadget Drive if you’re trying to raise money for your school or
non-profit. To get a feel for the kind of money people are willing to spend,
check out Ecosquid. When you run a Gadget Drive, people in your community
will drop off their devices. You’ll ship everything off to Gazelle, and then you’ll
get a check for everything that was donated. Gazelle, in turn, will either sell
the electronics or make sure they’re recycled responsibly.
SELF-CHECK 5.1-4
A. ENUMERATION: Write the Recycle Your E-Waste Safely and explain
brief it.
WASTE MANAGEMENT
Performance Objective: given necessary tools,equipment and materials,
Steps / Procedure:
1. Prevention.
2. Preparation for reuse.
3. Recycling.
4. Other utilization (e. g. energy recovery).
5. Landfilling.
Assessment Method:
Demonstration
Did you…….
Wear your ppe
Prevention
Recycling
Landfilling