100% found this document useful (3 votes)
1K views

COC4

ssfs

Uploaded by

Dilan Dylan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
1K views

COC4

ssfs

Uploaded by

Dilan Dylan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 338

Competency-Based Learning Materials

COMPUTER SYSTEMS SERVICING NCII

Sector : ELECTRONIC SECTOR

COMPUTER SYSTEMS
Qualification : SERVICING NCII

Unit of MAINTAIN AND REPAIR COMPUTER


Competency : SYSTEMS AND NETWORKS

MAINTAINING AND REPAIRING


Module Title : COMPUTER SYSTEMS AND NETWORKS
Welcome to the Module “Maintaining of Computer System and Networks” . This
module contains training materials and activities for you to complete.

The unit of competency “Maintain Computer System and Networks” contains


knowledge, skills and attitudes required for a Computer Hardware Servicing NC II course.

You are required to go through a series of learning activities in order to complete each
of the learning outcomes of the module. In each learning outcome there are
Information Sheets, Job Sheets, Operation Sheets, and Activity Sheets . Follow these
activities on your own and answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your facilitator for assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in this module
because you have:
o been working for some time
o already have completed training in this area.

If you can demonstrate to your teacher that you are competent in a particular skill or
skills, talk to him/her about having them formally recognized so you don’t have to do
he same training again. If you have a qualification or Certificate of Competency from
previous trainings show it to your teacher. If the skills you acquired are still current
and relevant to this module, they may become part of the evidence you can present
for RPL. If you are not sure about the currency of your skills, discuss it with your
teacher.

After completing this module ask your teacher to assess your competency. Result of
your assessment will be recorded in your competency profile. All the learning activities
are designed for you to complete at your own pace.

Inside this module you will find the activities for you to complete followed by relevant
information sheets for each learning outcome. Each learning outcome may have more
than one learning activity.
COMPETENCY-BASED LEARNING MATERIALS

List of Competencies

No. Unit of Competency Module Title Code

Install and configure Installing and configuring


ELC724331
1.
computer systems computer systems

Set-up Computer Setting up Computer


ELC724332
2.
Networks Networks

Set-up Computer Setting up Computer


ELC724333
3.
Servers Servers

Maintain and Repair Maintaining and

ELC724334
Computer Systems
4. and Repairing Computer

Networks Systems and Networks


MODULE CONTENT

UNIT OF COMPETENCY: Maintain and Repair computer systems

MODULE TITLE : Maintaining and Repairing computer systems

MODULE DESCRIPTOR: This unit covers the knowledge, skills and attitudes
needed to set-up computer servers for LANs and SOHO systems. It consists
of competencies to set-up user access and configures network services as
well as to perform testing, documentation and pre-deployment procedures.

NOMINAL DURATION: 40 HOURS

LEARNING OUTCOMES:

At the end of this module you MUST be able to:

1.Plan and prepare for maintenance and repair

2. Maintain computer systems and networks

3. Diagnose faults of computer systems and networks

4. Rectify/correct defects in computer systems and networks

5. Inspect and test the computer systems and networks


ASSESSMENT CRITERIA:

1. Maintenance and/or Diagnosis of faults is planned and prepared in line


with job requirements.
2. Tools, equipment and testing devices needed for the maintenance are
obtained and checked for correct operation and safety
3. Materials necessary to complete the work are obtained in accordance with
established procedures and checked against job requirements.
4. OHS policies and procedures are followed in line with job requirements.
5. Computer systems and networks for maintenance are checked against
job/service order or instructions and specifications.
6. Appropriate personal protective equipment is used in line with standard
procedures.
7. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
8. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
9. Where necessary, needed repairs/replacements are made in accordance
with established procedures.
10. Unplanned events or conditions are responded to in accordance with
established procedures
11. Appropriate personal protective equipment is used in line with standard
procedures.
12. Faults or problems in the computer systems and networks are diagnosed
according to requirements and in line with the standard procedures.
13. Contingency measures are managed and implemented in accordance with
established procedures
14. Unplanned events or conditions are responded to in accordance with
established procedures
15. Appropriate personal protective equipment is used in line with standard
procedures.
16. Defective components or parts are replaced or corrected without damage to
the surrounding environment or services
17. Adjustments, if necessary are made in accordance with established
procedures
18. Unplanned events or conditions are responded to in accordance with
established procedures.
19. Final inspections are undertaken to ensure that the testing conducted on
the device conforms with the manufacturer’s instruction/manual
20. Computer systems and networks are checked/tested to ensure safe
operation.
21. OHS standards and 5S principles are followed according to enterprise
policies
22. Work site is cleaned and cleared of all debris and left in safe condition in
accordance with company procedures
23. Excess components and materials are disposed of based on WEEE
directives and 3Rs waste management program.
24. Report is prepared and completed according to company requirements

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO.1

 Plan and Prepare for Maintenance and Repair

LESSON CONTENT:

PLANNING AND PREPARING FOR MAINTENANCE


ASSESSMENT CRITERIA:

1. Maintenance and/or Diagnosis of faults is planned and prepared in line with


job requirements.
2.Tools, equipment and testing devices needed for the maintenance are
obtained and checked for correct operation and safety
3.Materials necessary to complete the work are obtained in accordance with
established procedures and checked against job requirements.
4.OHS policies and procedures are followed in line with job requirements.
5.Computer systems and networks for maintenance are checked against
job/service order or instructions and specifications.

RESOURCES:

Tools, Materials and Equipment and Facilities


METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:


Computer Maintenance is the practice of keeping computers in
a good state of repair. A computer containing accumulated dust and
debris may not run properly. Dust and debris will accumulate as a
result of air cooling. Any filters used to mitigate this need regular
service and changes.

2 Types of Computer Maintenance

There are two types of maintenance that can be


applied to a computer:

Preventive Maintenance: He applied to a PC in


order to avoid future mistakes and technical
problems, such as: Find and remove viruses from
your hard drive, find and correct errors in the
physical and logical disk, disk defrag, clean up the
motherboard and other cards to avoid technical
problems due to dust, etc..

Reader view
Preventive maintenance can be described as maintenance of
equipment or systems before fault occurs.
It can be divided into two subgroups:

-Planned Maintenance
-Conditioned-BasedMaintenance.

Planned Preventive Maintenance


Computers and IT equipment are fast becoming most business’ lifeblood, so it’s
important to keep them up and running. Waiting until a piece of equipment
shows signs of trouble can seriously impact production, and in turn, your
bottom line or even damage your reputation with your customers.

To combat this, a maintenance approach called Planned Preventative


Maintenance (PPM) should be implemented. Instead of waiting for the machine
to malfunction or stop working completely, maintenance and inspections are
scheduled at regular intervals. Footprints are normally left well in advance of a
system hardware or software failure, this enables us to discover potential
issues before they even arise.

How Planned Preventive Maintenance Works


NAP Computer Solutions Limited will complete an IT MOT initially which is like
a mini audit of your equipment. This allows us to check that all your
equipment is running effectively. It will also allow us to recommend a
maintenance schedule that fits in with your requirements. This could be
weekly, fortnightly or monthly depending on the size of your business.

It is a similar concept to a car maintenance plan. For example, a car


manufacturer may suggest a car’s oil should be changed every 3,000 miles or
every 3 months, whichever comes first, the transmission should be checked
annually, and a general tune-up should be done once a year as well.

This same concept is applied to the IT equipment in your organisation and


during these PPM visits your IT Equipment will be checked thoroughly in an
attempt to catch any hardware or software malfunctions before they even
occur. During the course of the year this should help you keep track of your IT
expenditure as well as reduce costs. As an example; replacing a computer hard
disk before it completely dies and scheduling this in after a PPM visit not only
saves cost but also saves valuable downtime which would occur if the hard
disk was left to completely malfunction.

Why This Approach Works

Instead of taking a reactive approach to equipment maintenance, i.e. waiting


for something to break before you react to it, PPM allows you to take a
proactive approach. If you check your equipment on a regular basis, you are
more likely to catch small things and repair them before they become larger
issues later. PPM lowers the chances of losing productivity due to a
malfunctioning or broken piece of equipment. The longer you can keep your
equipment functioning on a continuous basis, the more productive your
business can be.
Other benefits to this approach include:
 Setting up orders for replacement parts well in advance of when you will
need them.
 You can schedule any downtime more effectively and lessen the impact
on service / production time
 Spot potentially serious computer issues before they actually occur
 Reduce yearly IT Expenditure
 Reduce downtime to your business

Corrective Maintenance: One who is oriented to diagnosis and repair of


equipment when a technical problem.

When we maintain a computer, we must first determine what is the time of use
and delay of computer technology. The services on very old computers is more
expensive and therefore difficult to get the spare parts.

Then, evaluate the physical conditions of the computer. An ancient or modern


computer can not be installed on site very closed or have books and materials
on top that not allow to dissipate the heat generated on the motherboard.
(Despite being cooler on the inside). Not necessarily must be in a room with air
conditioning but in a cool place.

As for electricity, there are users that have hydro-pneumatic pumps, air
conditioners, and a number of electrical equipment that consume much energy
at boot time, is there just as the hard disk of the computer is suffering because
it is very sensitive to electric failures and every time the fridge turns on, there
is a low amperage in the electrical system throughout the house and
consequently on the PC. Since this fluctuation power, hard drives trend to
suffer much damage.

We can begin to look for and remove informative viruses with a good antivirus.

Find and delete temporary files on your computer (*. TMP) that occupy space
and trend to crash the computer.

Also look for files with the CHK, if your disk starts to make files of this nature,
it is likely that we are in the presence of a future damaged disk, because these
files are usually lost fragments of other files that are not well saved or maybe it
was lost because the computer turned off unexpectedly, or data recovered from
a bad sector on your hard disk.

If the computer has more than 2 years that the operating system was
installing, do a Back Up of all important files to the user and format the hard
disk, and reinstall all programs. Will see fast improvement.
Corrective maintenance workflow

Overview

Corrective maintenance is initiated when an additional problem is discovered


during a separate work order. For example, during an emergency repair, as
part of a routine inspection, or in the process of conducting preventive
maintenance, a technician spots another issue that needs corrected before
other problems occur.

Upon discovering an additional problem, corrective maintenance is planned


and scheduled for a future time. During the execution of corrective
maintenance work, the asset is repaired, restored, or replaced

How corrective maintenance decreases downtime

Think of corrective maintenance as something that gets caught just in time.


For example, if you see that the brake pads in your car are just about worn
down but haven’t affected the rotors yet, you caught them in time.

Within the maintenance arena, corrective maintenance is triggered when a


technician sees something that is about to break or will affect the overall
performance of a piece of equipment. It can still be repaired or restored without
incurring downtime.

If corrective maintenance is not scheduled, the problem may become


an emergency maintenance work order down the road and result in halted
production lines, interruption in service, or unhappy customers.
Examples of corrective maintenance

Corrective maintenance can include a wide variety of equipment, systems, and


situations.

For example, if you are performing preventive maintenance on a line of


production equipment and notice significant wear on a critical part or
component, you may initiate a corrective maintenance order to repair or restore
that part within the next month.

If you are responding to an emergency request to repair a heating system in the


middle of winter, you may notice that the HVAC system needs filters cleaned or
replaced to improve efficiency and prevent further heat loss. You can restore
the heat during the emergency call but you may schedule the corrective
maintenance order to handle the filter issue later.

In a public works situation, you may be performing routine roadway repairs


when you notice some signage damage from a recent storm. You can initiate a
corrective maintenance order to restore that signage at a later date.

Benefits of corrective
maintenance

Since corrective maintenance is


performed “just in time,” the main
benefit is reduced emergency
maintenance orders as well as increased
employee safety. Corrective maintenance
work orders are scheduled and
prioritized in a CMMS, that helps
maintenance teams resolve problems
before delays in production or service
interruptions occur.

Corrective maintenance, coupled with


good preventive maintenance, helps a
business extend the lifetime of its assets, reduce employee injury, and optimize
resource planning. Corrective maintenance work orders are often less
expensive to implement than emergency maintenance work orders may need to
be completed during overtime hours.

How to maximize corrective maintenance

Corrective maintenance has an important role within the scope of maintenance


services in a business, residential complex, or factory setting. Technicians who
can find and identify potential problems before they become emergencies can
save the company a great deal of money.

In order to maximize the benefits of corrective maintenance, provide training


and education to maintenance technicians and supervisors about what types
of things to look for while they are providing preventive or emergency
maintenance services.
Additionally, create a maintenance checklist of components that technicians
can visually check quickly. You want your maintenance staff to catch as many
problems as possible. This will generate more corrective maintenance orders
and help keep your facility running smoothly.
Key Takeaways
 Corrective maintenance work orders are placed when problems are
spotted during preventive or urgent maintenance tasks.
 Corrective maintenance repairs or restores equipment just in time, before
more significant breakdowns occur.
 Increasing employee safety, reducing facility downtime, and allocating
resources efficiently are some benefits of corrective maintenance.
DIFFERENCE IDEAL COMPUTER LABORATORY ATMOSPHERE

Computer labs are more than just rooms with lots of computers. Care must be
taken to ensure that the lab is easy to access and fulfills its purpose. Learn
about the four most popular computer laboratory layouts and designs used in
High Schools and universities.

Many high schools and colleges use computer labs to allow student access to
the software necessary to complete coursework. Computer labs are also used to
instruct students on computer use, programming, and related subjects.
However, many institutions give little thought to the design and layout of the
lab. Too often, they simply fill a room with computers and set up the machines
any way they fit inside the room.

WHY COMPUTER LAB DESIGN AND LAYOUT IS IMPORTANT


Computer labs must be designed intelligently and serve the purpose they were
intended to serve. Imagine if parking lots did not have lines telling you where to
park and everyone just drove in and parked wherever they wanted. Soon no
one would be able to enter to exit. The lines in parking lots create important
rules about how you should park in the lot.

Similarly, the design and layout of a computer lab creates rules and defines
how the lab can be used. Thought given to the layout of a computer lab
dictates the usefulness of the lab and increases user satisfaction which
justifies its expense and assists in future investments in upgrades.

Certainly, the layout of the lab depends on the equipment, the furniture, and
space available. The purpose of this document is to discuss some basic
computer lab layouts and their advantages and disadvantages.

Any of these layouts can be modified to satisfy the individual needs of the
institution. It just takes a little planning and imagination to adapt any of these
designs to a specific application.
 CLASSROOM COMPUTER LAB DESIGNS

The classic classroom computer lab


design serves as the default layout in
many High School and Colleges.
However, it does have two major
advantages. First, it serves as a great
instruction room where students
learn computer topics from an
instructor at the front of the room.
With everyone facing the same
direction, it allows instructors to see
the faces of the students with which
to read non-verbal cues as to whether
students are learning the material or
need more help. Second, it is similar
to the layout of other classroom
environment emphasizing that the
students are there to learn.

One disadvantage of the classroom layout is the need to disturb other


students along the rows of computers as students enter and exit the lab.
For labs where students are coming and going, the classroom layout is not
ideal. In addition, the classroom layout is not conducive to team work. It is
difficult for students to work together, especially on collective projects and
in peer-assist teaching models.

 FOUR-LEAF CLOVER COMPUTER LAB LAYOUTS

The four-leaf clover design offers the


most privacy for students and
reduces to a minimum the possibility
of cheating during tests or exercises.
It also eliminates the need for
students to disturb others when
entering and exiting the lab and
allows instructors to go from student
to student to address individual
problems and concerns.

One disadvantage of the four-leaf


clover design has to do with attention
spans. When students are sitting at their own computers, instructors will
not be able to see what each student is doing at his/her workstation.
Students may not be paying attention to lessons or may be surfing to
inappropriate websites in labs equipped with Internet access.

Four-leaf clover designs can also be more expensive if each computer sits on
its own table. Some computer lab furniture is made specifically for this
design offering space for four computers on one table or desk.

 The next two designs are less traditional but offer some things the
classroom layout and the four-leaf clover layout do not.

 U-SHAPED COMPUTER LAB DESIGNS

The U-shaped computer lab layout


encourages engagement between
instructors and students. Instructors
can enter the U and engage with
students one-on-one. This design also
serves as the most conducive layout for
computer maintenance as technicians
do not have to disturb others to gain
access to the computers. In addition,
students will not interfere with other
students’ work while entering and
exiting the lab.

Unfortunately, the U-shaped design


offers little opportunity for instructors
to monitor what students are doing
and looking at on their monitors. This
design is not compatible with test
taking and requires many assistants to monitor students. Furthermore, this
design often takes up more space that other layouts.
 INVERTED U-SHAPED COMPUTER LAB LAYOUTS

Like the U-shaped layout, the


Inverted U-shape also offers
engagement between instructors and
students. In addition, the layout
allows for the most convenient
method of monitoring students. For
individual learning, this layout
minimizes the distance instructors
must walk to move from workstation
to workstation and student to
student.

Like the classroom layout, traffic into


and out of the Inverted U-shape can
become constrictive especially when
all of the students must enter and
exit at the same time. This congestion
is reduced if students are entering
and exiting individually as in an open lab paradigm where students can
come and go as they please. In addition, this layout takes up the same
amount of space as the U-shaped design. If space is not a consideration,
either of the U-shaped layouts is appropriate.

 CONCLUSION
There are many options when designing the layout of a computer lab. The
key is to make sure form is following function. Thought and planning at the
beginning of designing the lab ensures that students and instructors are
satisfied with what the lab offers. Choosing a sub-optimal layout can
negatively affect student learning and reduce the engagement between
instructors and students.
SELF-CHECK 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE


A.ESSAY QUESTION

Direction: Write the 2 types of computer maintenance and explain

1.

2.

B. ENUMERATION: Gives difference of ideal computer laboratory


atmosphere and explain of it.

1.

2.

3.

4.
TASK SHEET 1.1-1

PLANNING AND PREPARING FOR MAINTENANCE

Performance Objective: given necessary tools,equipment and materials,

you should be able to planned and prepared for maintenance ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems ,utp cable,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1. Schedule the use of computer for its longer life. ...


2. Move the computer only when it is turned off and unplugged.
3. Place your computer in a well-ventilated area.
4. Treat your computer properly.
5. Design a monitoring, evaluating and updating plan.
6. Backup your files.
7. Update anti-virus and spyware.
8. Delete temporary files.
Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 1.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Schedule the use of computer for its longer life

Move the computer only when it is turned off and unplugged

Place your computer in a well-ventilated area

Treat your computer properly

Design a monitoring, evaluating and updating plan

Backup your files

Update anti-virus and spyware

Delete temporary files


UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: PERSONAL PROTECTIVE EQUIPMENT

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in accordance
with established procedures.
5. Unplanned events or conditions are responded to in accordance with
established procedures
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 2.1-1

PERSONAL PROTECTIVE EQUIPMENT


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Personal protective equipment

2. Determine the Personal protective equipment

Personal protective equipment is protective clothing, helmets, goggles, or


other garments or equipment designed to protect the wearer's body from injury
or infection. The hazards addressed by protective equipment include physical,
electrical, heat, chemicals, biohazards, and airborne particulate matter. 
Personal protective equipment (PPE)
protective clothing, helmet
s, goggles, or other
garments or equipment
designed to protect the
wearer's body
from injury or infection.
The hazards addressed by
protective equipment
include physical,
electrical, heat,
chemicals, biohazards,
and airborne particulate
matter. Protective
equipment may be worn
for job-
related occupational
safety and
health purposes, as well
as for sports and
other recreational
activities. "Protective
clothing" is applied to
traditional categories of
clothing, and "protective
gear" applies to items
such as pads, guards, shields, or masks, and others. PPE suits can be similar
in appearance to a cleanroom suit.
The purpose of personal protective equipment is to reduce employee exposure
to hazards when engineering controls and administrative controls are not
feasible or effective to reduce these risks to acceptable levels. PPE is needed
when there are hazards present. PPE has the serious limitation that it does not
eliminate the hazard at the source and may result in employees being exposed
to the hazard if the equipment fails.[1]
Any item of PPE imposes a barrier between the wearer/user and the working
environment. This can create additional strains on the wearer; impair their
ability to carry out their work and create significant levels of discomfort. Any of
these can discourage wearers from using PPE correctly, therefore placing them
at risk of injury, ill-health or, under extreme circumstances, death. Good
ergonomic design can help to minimise these barriers and can therefore help to
ensure safe and healthy working conditions through the correct use of PPE.
Practices of occupational safety and health can use hazard controls and
interventions to mitigate workplace hazards, which pose a threat to the safety
and quality of life of workers. The hierarchy of hazard controls provides a policy
framework which ranks the types of hazard controls in terms of absolute risk
reduction. At the top of the hierarchy are elimination and substitution, which
remove the hazard entirely or replace the hazard with a safer alternative. If
elimination or substitution measures cannot apply, engineering controls and
administrative controls, which seek to design safer mechanisms and coach
safer human behavior, are implemented. Personal protective equipment ranks
last on the hierarchy of controls, as the workers are regularly exposed to the
hazard, with a barrier of protection. The hierarchy of controls is important in
acknowledging that, while personal protective equipment has tremendous
utility, it is not the desired mechanism of control in terms of worker safety.

WHAT IS PERSONAL PROTECTIVE EQUIPMENT (PPE)?

PPE means personal protective equipment or equipment you use to guarantee


your (own) safety.

Use PPE always and anywhere where necessary. Observe the instructions for
use, maintain them well and check regularly if they still offer sufficient
protection. But when do you use what type of protection?

These 7 tips will help you on your way


1. SAFETY FOR THE HEAD

Wearing a helmet offers protection and can prevent


head injuries. Select a sturdy helmet that is adapted to
the working conditions. These days you can find many
elegant designs and you can choose extra options such
as an adjustable interior harness and comfortable
sweatbands.

2. PROTECT YOUR EYES

The eyes are the most complex and fragile parts of our
body. Each day, more than 600 people worldwide
sustain eye injuries during their work. Thanks to a
good pair of safety glasses, these injuries could be
prevented. Do you come into contact with bright light
or infrared radiation? Then welding goggles or a shield offer the ideal
protection!

3. HEARING PROTECTION

Do you work in an environment with high sound levels?


In that case it is very important to consider hearing
protection. Earplugs are very comfortable, but earmuffs
are convenient on the work floor as you can quickly put
these on or take them off.

4. MAINTAIN A GOOD RESPIRATION

Wearing a mask at work is no luxury, definitely not


when coming into contact with hazardous materials.
15% of the employees within the EU inhale vapours,
smoke, powder or dusk while performing their job. Dust
masks offer protection against fine dust and other
dangerous particles. If the materials are truly toxic, use
a full-face mask. This adheres tightly to the face, to
protect the nose and mouth against harmful pollution.

5. PROTECT YOUR HANDS WITH THE RIGHT


GLOVES

Hands and fingers are often injured, so it is vital to


protect them properly. Depending on the sector you
work in, you can choose from gloves for different
applications:

 protection against vibrations


 protection against cuts by sharp materials
 protection against cold or heat
 protection against bacteriological risks
 protection against splashes from diluted chemicals.
6. PROTECTION FOR THE FEET

Even your feet need solid protection. Safety


shoes (type Sb, S1, S2 or S3) and boots (type S4 or
S5) are the ideal solution to protect the feet against
heavy weights. An antiskid sole is useful when
working in a damp environment, definitely if you
know that 16,2% of all industrial accidents are
caused by tripping or sliding. On slippery surfaces,
such as snow and ice, shoe claws are
recommended. Special socks can provide extra
comfort.

7. WEAR THE CORRECT WORK CLOTHING

Preventing accidents is crucial in a crowded


workshop. That is why a good visibility at work is a
must: a high-visibility jacket and pants made of
a strong fabric can help prevent accidents. Just
like the hand protection, there are versions for
different applications.

WORST-CASE SCENARIO

Prevention is better than cure. A smart thing is to be prepared for the worst.
A classic first-aid kit is no luxury but a first-aid kit for the eyes can also be
an essential first aid. If the employee comes into contact with chemicals,
a safety shower is mandatory, so that he can rinse the substances off his body
at any moment.
PREVENTING ACCIDENTS: PICTOGRAMS

Not only is preparing your workshop for accidents a smart thing to do, it is
even smarter to organise your workshop in such a way that no serious
accidents can take place. A simple way to make your workshop safer is to use
pictograms: indicating flammable materials, the necessary use of hearing
protection, indicating emergency exits …

You can find all pictograms in the ‘Labels & decals’ catalogue under ‘Safety’.

If you want to read more


about how to secure your
workshop, then go to this
blog post with 5 tips on how
to work safely with a lift
truck.

SO TAKE CARE OF
YOURSELF!

The above-mentioned tips


are simple and easily
applicable to your working
environment. Correctly
observing the safety requires little effort, but it can have a big influence on your
health. Even at TVH, we work hard every day to create a safe working
environment. Our SHE-advisors put our safety first. They take training
courses on a regular basis in order to keep their knowledge up-to-date. From
our expertise, we have composed an assortment of safety products that
contribute to a safe working environment. We offer your protective equipment
from your head to your toes, because TVH also takes care of your safety!
Workplace Safety is one of the major concerns that has been successfully
driving the international industrial protective clothing fabric market. Today,
from hard hats to steel-toed boots, personal protective equipment, often known
as PPE, is keeping workers safe from head to toe. PPE has also been
successful in keeping employees safe and has also been acting as the last
line of defence against injury or death.

Development of new products are expected to give the market growth a boost
and the progress is driven by various factors such as growing concern towards
workers’ safety along with stringent governmental regulations, persistent
growth in demand for protective clothing from various end-user industries, and
extensive investments in research and development.

However, the high price of protective clothing and a constant threat of


substitution can act against the growth of the market during the forecast
period. Protective clothing in industries such as oil and gas and
pharmaceuticals will offer significant opportunities for manufacturers and an
upsurge in demand from emerging economies such as South Korea, China,
India and Brazil are expected to thrust the growth.

Industrial protective clothing market analysis

Growing workplace hazards and increasing worker safety are the major factors
that are expected to drive industry growth for the next decade in various
industrial sectors such as oil and gas, manufacturing, chemical, and food
processing. Plus, increasing industrial fatalities and awareness towards the
health and safety of workers’ is also expected to contribute to the market
growth. In fact, for many industries, it is mandatory to comply with rules
regarding workers’ safety at the workplace. Europe and North America are the
major drivers for industrial protective clothing along with the Asia Pacific and
the Middle East. The stringent regulations to follow the rules and guidelines in
these countries are making it mandatory for industries to take care of their
worker’s safety on account of increasing hazards. Additionally, upper
management in most of the industrial firms is taking proactive measures to
uphold workers’ safety at the respective workplace.

Today many companies are putting emphasis on raw materials that offer
material features such as lightweight, higher heat resistance, comfort, and
wear and tear resistance. This initiative is to achieve multi-functionality of
protective clothing and increase its application scope. However, one of the
challenging factors can be the rising costs of crucial materials such as aramid
fiber, carbon fiber, and silicates.
In 2015, the global protective clothing market was valued at $8 million. This is
expected to reach $10.2 million by 2022, supported by Compound Annual
Growth Rate (CAGR) of 3.6% during the forecast period 2016 to 2022.

Innovative trends in the market

Protective clothing is manufactured from fabrics that help in protecting the


workers daily from being exposed to extreme heat, flame, molten metal, and arc
flash. The protective clothes are designed to prevent contact with hazards or
adverse elements of the environments. Protective clothing markets are mostly
categorized based on the material type, namely, polyamide, aramid and blends,
PBI, Polyolefin and blends, UHMW polyurethane and others. Let’s now take a
look at some of the innovative trends in the industrial protecting market.

Soaring Demand for non-woven PPE: Breathability, comfort, high-tensile


strength, and fire and water resistance are some of the qualities that
nonwovens offer. They have also been playing a pivotal role in protecting
medical professionals against the exposure to bloodborne pathogens, and
shielding trained professionals against the risk of chemical exposure and
hazardous materials and conditions.

Wearable technology: Wearable technology is becoming increasingly prevalent


in PPE to enhance safety management and increase productivity at the
worksite. The sensors that monitor gas, chemical, heat, sound, and UV are
integrated into PPE and clothing to improve workplace safety. The technology
alerts the users to danger in time for preventative steps. Wearable technology is
also successful in offering long-term cost savings by preventing accidents on
site.

Coldwear, a clever jacket: This jacket developed in Norway, monitors workers’


health levels when they work in extreme cold. The readings of body
temperature, humidity, and perspiration both inside and outside the suit,
along with tracking the location of the worker are recorded. Coldwear, designed
for arctic oil fields, goes a long way in protecting the workers in a harsh
environment by sending information back to a central point. Furthermore, the
clothing can detect gas leaks and other harmful substances which may
endanger your workers.

Multifunctional textile for advanced personal protective equipment: In


partnership with Luna Innovations and Vertical Source, Inc., the Department
of Homeland Security Science and Technology Directorate (S&T) developed a
lightweight base ensemble that could be worn on a daily basis. This protective
equipment is capable of providing protection against multiple hazards for a
limited period of time. The multilayer textile system consists of:
 An antimicrobial textile treatment, a protection against a range of
bacteria.
 A chemical protective membrane
 Flame resistance textile layer
 Tear protection layer

Lightweight and breathable clothing: Workers often carry around a lot of gear,
and the last thing they need is a hot and heavy coat. The lighter protective
apparel and equipment is a strong need for most workers across the globe. In
fact, this need has been the driving force behind a significant number of
innovations in the textile, garment and face-shield design. Today,
environmentally controlled PPE is another developing technology that helps in
keeping the body’s core temperature consistent while ensuring that workers
are comfortable. These environmentally controlled PPE have been successful in
protecting the workers from heatstroke to frostbite.

Besides, lightweight garments have gained significance in recent times. The


textile innovations and the availability of high-performance yarns and
treatments have made it possible to produce technically proficient PPE with
different levels of thermal and chemical protection and water and fire
resistance. For those considering cost-effective solutions, the durability of these
testifies while ensuring value for money.

Soaring demand for disposable protective clothing: Used for protection from low
to medium level hazards such as fluid handling in a cleanroom or laboratories,
disposable industrial protective clothing is expected to generate revenue
exceeding $1.3 million by 2022. These products are designed to comply with all
the environmental standards and can be easily disposed of. Some of the areas
where disposable protective clothing can be used are disaster response,
hazardous waste management, specialist laboratories, emergency services,
sewage treatment, and drainage construction.

Choosing not to wear PPE can be dangerous in the workplace when it could
keep you protected. Workplace safety is essential and in-depth knowledge of
these various protection devices can help in preventing hazardous injury.
SELF-CHECK 2.1-1

PERSONAL PROTECTIVE EQUIPMENT


A.IDENTIFICATION: Write the Personal protective equipment  in the blank

__________________1.Its is a offers protection and can prevent head injuries.


Select a sturdy helmet that is adapted to the working conditions. These days
you can find many elegant designs and you can choose extra options such as
an adjustable interior harness and comfortable sweatbands.

__________________2. Its is a fragile parts of our body. Each day, more than 600
people worldwide sustain eye injuries during their work. Thanks to a good pair
of safety glasses, these injuries could be prevented. Do you come into contact
with bright light or infrared radiation? Then welding goggles or a shield offer
the ideal protection.

__________________3. Its is a work is no luxury, definitely not when coming into


contact with hazardous materials. 15% of the employees within the EU inhale
vapours, smoke, powder or dusk while performing their job.

___________________4. Its is a crucial in a crowded workshop. That is why a


good visibility at work is a must: a high-visibility jacket and pants made of
a strong fabric can help prevent accidents. Just like the hand protection,
there are versions for different applications.

___________________5.Its is a useful when working in a damp environment,


definitely if you know that 16,2% of all industrial accidents are caused by
tripping or sliding. On slippery surfaces, such as snow and ice, shoe claws are
recommended. Special socks can provide extra comfort.

B.ENUMERATION: List down the PPE 7 tips will help you on your way and
Explain brief of it.

1.______________________

2._____________________

3._____________________
4.______________________

5.______________________

6._____________________

7.______________________

TASK SHEET 2.1-1


PERSONAL PROTECTIVE EQUIPMENT

Performance Objective: given necessary tools,equipment and materials,

you should be able to personal protective equipment ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems ,utp cable,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below:

1. Identify and gather the proper PPE to don.


2. Perform hand hygiene using hand sanitizer.
3. Put on isolation gown.
4. Put on NIOSH-approved N95 filtering facepiece respirator or higher
(use a facemask if a respirator is not available).
5. Put on face shield or goggles.
6. Put on gloves.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Identify and gather the proper PPE to don

Perform hand hygiene using hand sanitizer

Put on isolation gown

Put on NIOSH-approved N95 filtering facepiece respirator or higher


(use a facemask if a respirator is not available)
Put on face shield or goggles

Put on gloves
UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO:2

 Maintain Computer Systems and Networks

LESSON CONTENT: Diagnosis of Computer Systems

and Network Function

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures
RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 2.1-2

Diagnosis of Computer Systems


and Network Function

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Diagnosis of Computer Systems and Network Function

2. Determine the Diagnosis of Computer Systems and Network Function


A Diagnostic Program (also known as a Test Mode) is an automatic
computer program sequence that determines the operational status within the
software, hardware, or any combination thereof in a component, a system, or a
network of systems. Diagnostic programs ideally provide the user with
guidance regarding any issues or problems found during its operation.
Diagnostics programs may be simple or complex, operating unknowingly within
everyday devices or awaiting their invocation to make more complex
performance assessments. Everyday examples are a microwave oven that
displays code F6 to warn of a shorted temperature probe[1] or a garage door
opener that flashes its control board's LED four times warning of critically
misaligned safety sensors and impending shutdown.[2]
Diagnostic programs are also inserted into consumer electronic products
and electronic games. Sometimes if the owner of an electronic device asks the
manufacturer how to access the hidden diagnostic program, they may reply to
the consumer saying that the information is considered to be "proprietary" and
cannot be shared

COMMON PC PROBLEMS & SOLUTIONS

1. Check the POST. This is generally the first or second thing that appears
on a computer after turning on the power. This appears before the operating
system begins to load. The POST will display any problems found with
hardware that makes the computer unable to boot, POST may also display
problems with hardware that allow the computer to boot, but not operate at its
full capacity during operation

2. Notice the load time of the OS (operating system). A longer


than usual load time may indicate errors in the hard drive.

3. Notice any graphics problems once the OS has loaded.


Reduced graphics may indicate driver failures or hardware failures with
graphic cards.

4. Perform an auditory test. An auditory test is an unorthodox, but still


effective way of judging how a computer is working. With the computer on and
running, play any decent length audio file (usually above 30 sec). If the audio is
choppy or slow, it usually means that the processor is working at an elevated
level, or there is not enough RAM to run all programs loading. Changing the
startup sound is a great way to apply this test. Another issue associated with
choppy sounds is PIO (Programmed Input/Output) Mode. This affects how the
hard drive reads and writes data from a drive. Switching to Direct Memory
Access (DMA) allows for faster reads and writes, and can sometimes repair
choppy audio.

5. Check any newly installed hardware. Many operating systems,


especially Windows, can conflict with new drivers. The driver may be badly
written, or it may conflict with another process. Windows will usually notify
you about devices that are causing a problem, or have a problem. To check this
use the Device Manager, this can be accessed by entering the Control Panel,
clicking the System icon, clicking the Hardware tab, and clicking on Device
Manager. Use this to check and arrange the properties of hardware.

6. Check any newly installed software. Software may require more


resources than the system can provide. Chances are that if a problem begins
after software starts, the software is causing it. If the problem appears directly
upon startup, it may be caused by software that starts automatically on boot.

7. Check RAM and CPU consumption. A common problem is a choppy


or sluggish system. If a system is choppy it is good practice to see if a program
is consuming more resources than the computer can provide.

A .CON’T. An easy way to check this is to use the Task Manager, right click
on the taskbar select Task Manager, and click the Processes tab. The CPU
column contains a number that indicates the percentage of CPU the process is
consuming.
B. CON’T. The Memory Usage column indicates how much memory a process
is consuming. • Network HUB • Network cable • Network card

8. Listen to the computer, if the hard drive is scratching or


making loud noises, shut off the computer and have a
professional diagnose the hard drive. Listen to the CPU fan, this
comes on a high speed when the CPU is working hard, and can tell you when
the computer is working beyond its capacity.

9. Run a virus and malware scan. Performance problems can be caused


by malware on the computer. Running a virus scan can unearth any problems.
Use a commonly updated virus scanner (such as Norton Antivirus or Avast!
Antivirus)

10. Check for the problem in safe mode. To enter safe mode, tap F8
repeatedly during POST (this works on most systems). If the problem persists
in safe mode, it is a fair bet that the operating system itself is to blame.
Common Trouble shooting for Computer Units

1. Double check the power connections.

2. Voltage Regulator and power supply could cause power failure in the
computer unit.

3. Check the power cords and cable connectors in your computer unit.

4. Unseated card. Loose cards could cause malfunction.

5. Check the boot sequence configuration in the advance BIOS (Basic


Input /Output Unit) setup.

Diagnosing Network Connection


Things to look for if a PC is connected to the internet or network:

• First check the cable connecting to the network card into the network hub.

• Check the back of the computer to see if the network card light is on

• Check the network cable ( use cable tester)

• Check the network HUB (use multi-tester)

DEX_Identify the following:


1. Moderately dangerous types of errors among those that can pop up on your
PC.

2. Caused by malfunctioning hardware components, and are characterized by


short beep sounds from the tiny internal speaker of your motherboard.

3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.

4. Usually caused by corrupted driver files or malfunctioning hardware


components.

5. Caused by corrupted or malfunctioning system files or software executables.

6. Caused by corrupted hardware, especially malfunctioning RAM modules and


bad sectors on hard disks.

7. Caused by problems faced by browsers when trying to access a website.


Five Best Computer Diagnostic Tools

Computer diagnostics tools are pieces of software that give you the
knowledge you need to be able to potentially repair your own computer.  Some
of these tools come built in to your operating system while others come from
3rd party software developers. Either way, these tools help save you time and
money.

Computer diagnostic tools can be used scan your computer’s hard drive, check
your ram for errors, check cpu temp and give you information about any other
devices connected to your computer. These tools are made to find problems
that may be disrupting your computer’s normal performance. Once a problem
is found,  you can then plan your repair.

Here are our top 5 favorite computer diagnostic tools:

1.Windows Performance Monitor

The first one on our list is built right in to Windows operating systems.
The performance monitor gives you a quick view of vital information related
your computers hardware. From here, you can check out your CPU, Memory,
Disk info and Ethernet information. You can use Performance Monitor to
examine the effects of your running applications in both real time and by
collecting data to check out for later analysis.

2.Windows Resource Monitor

Windows Resource Monitor is number two on our list. This diagnostic tool is
more robust that Windows Performance Monitor. It is better suited for tracking
individual aspects of CPU, Network, memory and disk usage. This tool gives
you an in depth look at what processes are affecting your CPU, how much
memory is being used what is using it, individual process disk activity and
network information like current TCP connections and what processes are
listening on what port.

3.Open Hardware Monitor


Open Hardware Monitor is a free open source application that runs on
Windows and Linux systems. This diagnostic tool monitors your computers
temperature sensors, fan speeds, voltages, load and clock speeds. If your
computer is shutting down by itself, hanging or crashing, this tool can come in
real handy by telling you that your system is overheating or the fans aren’t
working properly

4.Speccy
Speccy is another great computer diagnostic tool . This application gives
information on just about everything including software, hardware,
peripherals, disk info, graphics & network data. Its easy to use layout make
troubleshooting and maintenance a breeze. Great application to start with
when you are looking for specific info about your computer.

5.HD Tune

HD Tune Pro is a great tool for HDD and SSD diagnostics. This utility allows
you to benchmark your storage device showing you the minimum, maximum
and average transfer rates along with many other useful tools. The other
features of HD Tune include detailed drive info, error scanning, & drive health.
The pro version allows you to check the health status of multiple drives, offers
folder usage info, secure erase, file benchmark, disk monitor, cache test &
extra tests.

Computer diagnostics are meant to serve a vital purpose . They are


important tools which work automatically, with very little effort necessary from
the end user. They help you discover and fix problems within your hard disks
and network configurations. Rather than manually searching for small, hard-
to-find problems on your own, you can simply allow computer diagnostics tools
to take care of your problems for you!

Diagnosis of network problems


Our Customers are reporting to us all kinds of problems, from lack of internet,
wifi network problems, ending with informing about the failure of their
computer at 3 am :) We decided to collect and describe the most typical cases
and accidents, which occured to our Users. The majority of problems reported
to us are results of suspension of router, occupied wireless network bandwidth,
or running, without user knowledge, program to exchange files. We hope that
this tutorial will introduce our Customers to functioning of the network sites,
and to rectify the cause of the defect independently, before they decide to tap in
the phone our emergency number:)

 I The problem of the Internet. User has a router.


 1. Cables
 2. Router
 3. Interferences
 II Problems with internet when the user doesn't use router.
 III Problems with computer

I.The problem of the Internet. User has a router


Possible reasons:

 Problem with the suspension of the router


 The problem of wiring problem with p2p running
 The problem of the occupied bandwidth of wireless network

1. Cables
The router has several dozen of wires attached. This cables may get pulled off,
unplugged, or could be just damaged.

 Push all the cables to make sure that none of them slipped.
 Check destruction of the wires, look if any of the end-piece isn't twist off.
 Make sure the power wire is plugged into the router properly. If the
device LED's do not shine, there is a problem with power.
 Next check if all of cables are properly plugged. Below is a picture which
shows all the ports of the router. Depending on the producer and model,
they may look slightly different, but the idea is the same everywhere -
internet cable must be plugged into the internet port / WAN (Blue port in
the figure)
 if you have any computers plugged by the cable, they must be plugged in
the LAN port (yellow port in the figure)
WARNING: Plugging internet cable into a port other than the WAN may cause
serious problems!
If your computer is connected to the router using a network cable, make sure
that the network cable is plugged into the computer port properly. Additionally,
after cable plugging You should have observed two LEDs, one of them ought to
„blink”. You need to know also that some computers do not have any diode
signal.

Some PC's have more than one Ethernet (network) connector . Check also the
second link.
2. Router
Common causes of problems:

 router-crash
 failure of router
 interference in a wireless network
The first case is the simplest. If Yours internet connection slowed drastically, or
it doesnt exist, try turn off the router by disconnecting him from power system
for several seconds and plug again. If reboot doesn't help, go to the second
point- router failure.
You can very simply and independently verify if the router has failed. Just
unplug the Internet cable from the router (look at the description of the cable
connection on the router) and connect it to the network adapter in your
computer. If the computer, was register in our web, you should see page which
you wanted to visit, if not, you will see our welcome page „Welcome to
Sloneczko.net”. These two cases show the router failure. If nothing show up, it
means a breakdown of the network - please contact us immediately.
Another cause of problems with the router is so wide that we will describe it in
a separate chapter.
3. Interferences
Wireless network, so-called wifi is very nice but also very imperfect thing.
Theoretically reach of the wireless network in open space and without any
noise is only 150 meters! Obstacles such as walls, windows and doors cause
high damping and decrease of signal quality. Also interferences of energy
networks and other wireless networks (e.g. of our neighbours) could be possible
source of problems.

So what to do to make sure that the problem with speed is caused by weak wifi
signal?

 Plug in to the router via cable – plug in the ethernet cable to your
computer then plug in that cable to one of the LAN ports of the router
(check description of cable pluging to the router). If there's no problem on
the cable, surely you have problem with wifi connection.
 Plug in ethernet cabel directly to the computer ommiting the router
(check the description of diagnosing of the router's damage). If you
see our welcome page “Welcome sloneczko.net” fill in the form on there
and send it to us. When we register your computer as active device you
will be able to check your speed without a router. If it's ok – you have a
problem with wifi
 The third method requires some knowledge about the system . You
can check the response time of the router using commend “ping”. You
must know its address to do this. Router address is the address of a
gateway on your computer. Checking the IP address of the router we
described in the article about configuring dhcp in router TP-Link

Now, when you know IP address, type commend “ping” into the dos window
(which is described in the article). You can stop commend executing by
pressing ctrl + c.

If response time is high (about 50 - 70 milliseconds or more) or which is worse,


part of the package is lost, this means that we definitely have a problem with
wifi.
Ok. So we have diagnosed problem with wireless network and what next? First
check the location of the router. Should be placed high, possibly in the center
of the apartment.. Another very important element is to find a free channel,
which is the least used. Unfortunately, most routers do not have the tools that
allows to check the bandwidth usage at different frequencies. That's why we
can only set one after another all the channels and check the operation of the
network.
To change the channel we have to login to the router. Type router address (that
you found before) into address bar in the browser.
If the router was configured by us, surely you received from us the access data.
If not ask person configuring the router for login and password.
After logging into the router go to wireless settings. Remember that in different
models of routers managing panel will be slightly different. In our example,
click on the Wireless (4) then the wireless settings (5).
In the channel menu select the wireless channel. Sometimes before we can find
the channel on which our network is working well we will need to check a few
other channels. Avoid channel 6 (very often used by equipment manufacturers
as a default channel), and extreme ones. You can also select the network at 11
Mbps (b), instead of the network at 54 Mbps (g). It will increase the transmitter
power in our router.
We check our work effect on each channel by checking router response time
with the command “ping” or checking connection speed at network speedtest.
II .Problems with internet when the user doesn't use router.

If you don't have a router in your home you can check external causes
described in chapter I.1. cables. If there aren't any problems with operator's
network, the cause of problems with connecting to the internet may be your
computer.
III. Problems with computer

Hardware parameters
Size of materials distributed via inrernet continues to grow. A few years ago
web pages used to be smaller than 1 megabyte, today some of them are bigger
than gigabyte. If your computer is an old Pentium 1 ghz and you've got half
gigabyte of RAM you have to know that probably all of it will be occupied by the
system and web browser. Firefox with a few tabs opened can use hundreds
megabytes of RAM. In that case page rendering can take forever.
The use of hardware resources OK, so your computer's a powerhouse,
processor takes first place in all benchmarks and all of your RAM would be
enough for four other computers. But it doesn't make any difference if you have
twenty different plugins form weird pages, computer's registry swells and
processor is used by plugin for watching TV. Not to mention that two
antiviruses finish the system of.
Check the list of installed applications. Delete what's redundant. One antivirus
is enough. Take a look at process list, to see if some application uses too much
memory or processor. If your computer is overloaded, rendering pages will take
lots of time.
Viruses There's no need to say much. Check if your antivirus is up-to-date.
Scan your computer. Nothing uses your bandwith as viruses sending all over
the internet.
Peer2Peer software P2P, torrents, eMule and lots of other applications for file
exchange. The only thing we have to do to stop it from disrupting our work is to
configure it in the way that won't allow it to use more than 1/2-3/4 of our
bandwith, sending faster than a few kilobytes per second and opening more
than 200-300 connections. And, of course, shuting it down when all of the files
are downloaded. Even though you finished your download, thousands of people
from around the world can connect to your program and efficiently blocking
your bandwith.
P2P software left unconfigured causes that even if you're not downloading
programs connecting with your computer won't let you work normally. To
download something from the internet you need to send a request. And how
can you send it if your bandwith is clogged?
If you don't know how to check your network traffic you can always log into
your client control panel - you can find graph of your network traffic. If there's
something wrong you'll notice it right away.
We're hoping that this simple tutorial will help you understand how the
network works and will make using the internet more comfortable.

SELF-CHECK 2.1-2

Diagnosis of Computer Systems and Network Function


A.IDENTIFICATION: Write the diagnosis computer systems in the blank

__________________1. Its is a performance monitor gives you a quick view of vital


information related your computers hardware. From here, you can check out
your CPU, Memory, Disk info and Ethernet information.

___________________2. This is a tool gives you an in depth look at what processes


are affecting your CPU, how much memory is being used what is using it,
individual process disk activity and network information like current TCP
connections and what processes are listening on what port.

____________________3. . This is a diagnostic tool monitors your computers


temperature sensors, fan speeds, voltages, load and clock speeds. If your
computer is shutting down by itself, hanging or crashing, this tool can come in
real handy by telling you that your system is overheating or the fans aren’t
working properly

___________________4. This is a utility allows you to benchmark your storage


device showing you the minimum, maximum and average transfer rates along
with many other useful tools

___________________5. This is a application gives information on just about


everything including software, hardware, peripherals, disk info, graphics &
network data.
B.ENUMERATION: List down common pc problems & solutions the & Explain
brief of it.

A.

1.______________________

2._____________________

3._____________________

4.______________________

5.______________________

6._____________________

7.______________________

8.______________________

9.______________________

10.____________________

List down common Trouble shooting for Computer Units


B.

1.

2.

4.

Things to look for if a PC is connected to the internet or network

C.

1.

2.

3.

4.

TASK SHEET 2.1-2


Diagnosis of Computer Systems and Network Function

Performance Objective: given necessary tools,equipment and materials,

you should be able to diagnosis of computer systems and network function ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

1. Describe the problem


2. Define the affected subsystem
3. Is it hardware or software
4. Diagnose printing woes
5. Deal with networking trauma
6. Resolve login issues
7. Troubleshoot specific software
8. Look for virus issues
9. Ask for a demonstration
10. Use your tools

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-2


CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Describe the problem

Define the affected subsystem

Is it hardware or software

Diagnose printing woes

Deal with networking trauma

Resolve login issues

Troubleshoot specific software

Look for virus issues

Ask for a demonstration

Use your tools

 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks


LESSON CONTENT: Maintenance of Computer and Networks

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 2.1-3


Maintenance of Computer and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the maintenance of computer and networks

2. Determine the maintenance of computer and networks

Procedures in Planning and Conducting Maintenance

Preventive Maintenance
Preventive maintenance can be described as maintenance of equipment or
systems before fault occurs. It can be divided into two subgroups: Planned
Maintenance and Conditioned-Based Maintenance. 
Planned Maintenance (PM) is any variety of scheduled maintenance to an
object or item of equipment. Specifically, PM is a scheduled service visit carried
out by a competent and suitable agent, to ensure that an item of equipment is
operating correctly to avoid any unscheduled breakdown and downtime of an
equipment. 
Condition Based Maintenance (CBM) is a maintenance strategy that uses the
actual condition of the asset to decide what maintenance needs to be done.
CBM dictates that maintenance should only be performed when certain
indicators show decreasing performance or upcoming failure. Checking a
machine for these indicators may include non-invasive measurements, visual
inspection, performance data and scheduled tests. Condition data can be
gathered at certain intervals, or continuously.
The purpose of systematic inspection, detection and correction of existing /
future problems is very important to maintain equipment / facilities in
satisfactory condition before it may cause major problem. 
Maintenance, including tests, measurements, adjustments, and parts
replacement, performed specifically to prevent faults from occurring. 
Maintenance is divided into two (2) general type. Preventive maintenance is
given for maintaining equipment and facilities in satisfactory operating
condition to extend the life of the equipment. Corrective maintenance is task
performed to identify, isolate and rectify a fault so that the failed equipment or
system can be restored to an operational conditions within the tolerances or
limits.    
Common methods of determining what preventive (or other) failure
management policies should be applied are: Original Equipment Manufacturer
(OEM) recommendations, requirements of codes and legislation within a
jurisdiction, what an "expert" thinks ought to be done, or the maintenance that
is already done to similar equipment, and most important measured values
and performance indications.

Maintenance Procedures

In preparing maintenance procedure, you also have to consider designing


a systematic plan for both for hardware and software. This saves time, money
and frustration and ensures safe conditions to prevent injury to people and
damage to computer equipment. 

Planning Maintenance Procedures for Computer System and


Networking:

A. Design a systematic maintenance plan for hardware.   


Design a monitoring, evaluating and updating plan.
Place your computer in a well-ventilated area.
Schedule the use of computer for its longer life.
Move the computer only when it is turned off and unplugged.
Treat your computer properly.

B. Design a systematic maintenance plan for your software.


Backup your files.
Install or secure passwords. 
Delete temporary files.
Update anti-virus and spyware.
Design a systematic monitoring, evaluating and updating plan
for hardware. 

Computers have significantly changed the working environment, simplifying


and speeding up many tasks across many work areas. However, with these
advances are some potential problems and maintenance issues. These
guidelines describe how computer technicians, students and computer users
can work together to achieve a productive workplace environment. The
guidelines reflect current knowledge and best practice for the use of computers
so you can achieve maximum efficiency and safety in your workplace.

SAMPLE MONITORING PLAN


Date:
Comp Comp Comp  Comp Comp Recommendations
1  2 3  4  5
Monitor is
functional.  
Printer Cartridges
are replaced.
Storage devices are
functional.
Optical Drives are
functional.

Place your computer in a well-ventilated area.


This will allow proper circulation of air inside the computer unit.

Schedule the use of computer for


its longer life.

This will help lessen the attacks


of viruses and increases the life
span of your computer.

Move the computer only when it


is turned off and unplugged.
To avoid damage to the computer unit always turn off and unplugg it when
transferring the computer to another location.

Treat your computer properly.


This means taking care of your computer. PCs and laptops should be properly
turned off.

Do systematic maintenance plan for your computer software.

Things to Maintain And Repair Computer System and Networks


Everyone loves computers when they work. Everyone screams at them when
they don't. Here's ten ways to keep your computer running smoothly into its
old age. While I can't promise that these tips will keep your computer from ever
having problems, it will at least help prevent them, and make recovery easier
when they do occur.

1. Back up your data.


When was the last time that you backed up your data? Not 'when was the last
time you thought about it', or 'when was the last time you told someone how
important it is', but when was the last time you actually backed up your data?
And how much will you lose if your current hard drive fails right now and you
have to rely on that backup?

Think about that for a second. Now, go


create a backup.

If you don't know how, don't have a


regular plan, or just want to see what's
new in the field, Consumer Reports has
a good overview of the most common
options. Personally, I have very little
media on my computer, so I burn my
files to CD once a year or so, and copy
files to a flash drive in between. It's
quick, inexpensive, and secure enough
for my needs.

Another decent solution is to use a


program like Foldershare to synchronise your files between two computers
(even better, two locations).

If you have the opportunity, make a full disk image (a 'snapshot' of your entire
hard drive) immediately after reloading the OS and all your programs. This
gives you a clean starting point to go back to if you need to reload everything
again, and will be much faster than redoing everything manually. Acronis True
Image 11 is good for the job.

2. Clean dust from your computer.


Computers are some of the most efficient dust collectors known to man. Aside
from looking gross and possibly being an allergy hazard, a dusty computer will
trap heat, which can reduce its performance and lifespan. The easiest way to
clean it is with compressed air - open up the case, take it outside, and blow the
dust out. The exterior of the case can be wiped down with a damp cloth. Be
careful about using household cleaners, as they can easily destroy circuit
boards. For most computers, cleaning once every year or eighteen months
should be adequate.

Beyond just getting the dust out, here are some other
steps to consider: Dust often collects inside the CPU
and video card heatsinks, consider disassembling and
cleaning them if you're comfortable doing so, or at least
using compressed air to specifically blow them out.
While the case is open, plug in the computer and turn
it on long enough to make sure all the fans are still
spinning. Replace any that are dead or noisy (a
common sign of a worn-out fan). If there is sticky
residue or dirt on the circuit boards, it can be removed
with a cotton swab dipped in rubbing alcohol, which
will evaporate cleanly. (Make sure the computer is
unplugged first!) If you're not comfortable with working
inside your computer or suspect your computer has
chronic overheating issues, Puget Systems or another
professional repair service can help you out.

3. Clean up your cabling, and everything else too.


There are probably two things behind your computer: a mess of cables, and
dust bunnies. If you're moving your computer, take the opportunity to clean
your desk and floor as well. While I can't claim that a clean work area will
improve your computer's performance or lifespan, it will certainly improve your
peace of mind, and clean cabling will help prevent snags and stresses on your
computer ports. If you have a lot of peripherals, consider using cable
management of some type. Twist ties work fine, or make a trip to any large
office supply store. You can use a full out cable solution, but even a five dollar
cable wrap can neaten up your desk considerably.
 While you're wiping down your desk, wipe down the monitor too. CRT
screens can be cleaned with any mild glass cleaner, but LCD screens can't
tolerate it. Use a dampened cloth or a
product specifically made for LCD screens.

 Keyboards can be turned upside down to dump out crumbs and dirt, or
keys can be pried off and the whole assembly cleaned with compressed air.
There are some good step-by-step guides available on Lifehacker. Take a
picture first so you can put the keys back in the right place! If you're feeling
adventurous (or just have a really disgusting keyboard), some people
advocate running it through the dishwasher.

This is a good time to take a look at where your computer is located. Is there
adequate ventilation? Is the computer out of direct sunlight, and away from
heat sources? What is it plugged in to? There's no excuse for not having a
good surge protector (not just a plastic power strip!), and battery backup
units have become affordable for most users. This will affect the lifespan of
your computer.

Smoking will make a mess of a computer faster than anything else I know
of. While we at Puget Systems have never seen one quite this bad, we can
always identify a smoker's computer as soon as we unbox it. Electronics
absorb the smell very easily, and even an all-metal case will retain the odor
after all the components have been removed. Plus, there's usually a layer of
dust and tar on the circuitry that tends to be a giveaway as well. Please, if I
can't convince you to quit smoking all together, at least take it somewhere
away from the computer!
4. Organize your installation disks
Keep software, peripheral, and driver disks in a single location, preferably close
to the computer. A shoebox works fine. Make sure you have them handy before
attempting computer maintenance or repairs - it's amazing what can become
necessary in the middle of a lengthy troubleshooting session, and it is common
to not know what you're missing until you need it!

5. Run antivirus and spyware scans regularly.


This item should go without saying, but I'll say it anyway.
Any computer that is connected to the internet needs to
have some sort of antivirus software. There is a tremendous
variety available, everything from AVG Free to enterprise-
level solutions. Use whichever you like best. Most antivirus
software will monitor the system for threats in real time, so a
full daily scan probably isn't necessary, but do make time to
run a full scan every month at the least.

Some antivirus programs also protect against adware and spyware, but not all.
If yours doesn't, or if you just want an extra layer of
security, AdAware and SpyBot are two of the best known (and free!) products
available. While they may not be as destructive as viruses, adware and spyware
will compromise privacy and slow your computer drastically. Run scans for
them at the same time as your antivirus.

6. Clean up your software.


Every few months, look through the 'Add or Remove Programs' interface that is
found in the control panel. If there's software on there that you don't use any
more, remove it. This goes triple for browser toolbars, free games, and other
resource-eating bits of fluff. Be a little cautious, though - some system drivers
appear in this list, and can cause hardware to stop working if you remove
them.

There's an excellent scanning utility on Steffen Gerlach's website that gives a


graphical representation of the data stored on your hard drive. This will give
you a good idea of just how much room your music collection really takes, or
how much space is going to old games.

7. Clean up your OS
Windows is not the most efficient operating system, and sometimes needs
attention itself. It saves a large amount of unnecessary information, mostly in
the form of 'temporary' files (which never get deleted) lists of recently performed
searches, and the like. There's an excellent program called CCleaner, which
will clear out most of the unneeded data automatically. If you're interested in
further optimizing your OS, there's a wealth of information available online,
including an article on improving XP performance available here on Puget's
website.

8. Update everything
Check for updates for your hardware and software. This includes
running Windows Updates, checking for updated drivers, and
checking for software patches. The easiest way to find these is to go
to the manufacturer's website, to their support section, and then
look for a 'downloads' section or search for your product's name. If
you've been having problems with a piece of hardware or software,
be sure to check for patches or updates - if other people have been
having similar problems, it's likely the manufacturer has released a fix for it.

The exception to this is motherboard BIOS updates. Flashing a BIOS can be


difficult, and if it's done incorrectly you may need to send the computer for
professional repair to get it working again. If the update was specifically
released to address problems that you've been dealing with, it's probably worth
it. Follow the manufacturer's directions carefully! Otherwise, leave it alone.

9. Defragment
Once your hard drive has been cleaned up, it's a good time to defragment. This
organizes your files, leading to faster disk access times and improved system
performance. The Windows defragmenting tool (Start > All Programs >
Accessories > System Tools > Disk Defragmenter) works well, or there's a list of
open source and commercial defragmenting software available on Wikipedia if
you'd rather use something else.

10. Read more articles like this one


Last but not least, continue to read articles like this one, and anything else
computer related that catches your eye. The computer industry is constantly
changing - even if you have the same computer, there will be innovations that
affect you. At the very least, you'll go into your next computer purchase far
better informed than you would be otherwise.

We at Puget Systems always encourage our customers to learn about


computers in general and their system in particular. Well educated users tend
to have fewer difficulties with their system, and besides, we love computers and
think everyone else should too! Our commitment is to create a computer to
meet your needs and budget, using our experience to assist you every step of
the way from the first visit to our website to tech support calls two years later.
We accomplish this in part through friendly sales and support reps, an
informative website, and publishing articles on a regular basis. Give us a call
or email, we'd love to hear from you!
Tags: Advice, Support, Maintainance

SELF-CHECK 2.1-3

Maintenance of Computer and Networks


A.ENUMERATION: Gives the maintain and repair computer system and
networks and explain brief it.

1._____________________

2._____________________

3._____________________

4.______________________

5.______________________

6.______________________

7.______________________

8.______________________

9.______________________

10._____________________
B.Gives the sample of monitor plan?
TASK SHEET 2.1-3

Maintenance of Computer and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to maintenance of computer and networks ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Things to Maintain And Repair Computer System and Networks


1. Back up your data.
2. Clean dust from your computer.
3. Clean up your cabling, and everything else too.
4. Organize your installation disks.
5. Run antivirus and spyware and scans regularly.
6. Clean up your software.
7. Clean up your OS.

Assessment Method:
Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-3

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Back up your data

Clean dust from your computer

Clean up your cabling, and everything else too

Organize your installation disks

Run antivirus and spyware and scans regularly.

Clean up your software

Clean up your OS
 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: Repair or Replace faulty System

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 2.1-4

Repair or Replace faulty System

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the repair or replace faulty system

2. Determine the repair or replace faulty system

When to repair your computer and when to replace it

No computer lasts forever, but


to get the most out of your
investment, you probably want
to stretch its life out for as long
as you can. Upgrades and
repairs can carry your machine
along for a decent amount of
time, but at a certain point,
you might be better off
investing in a new computer
instead of dribbling away your
money on continuing
maintenance.

Eventually, every computer


slows down—even if you’re
using it for the exact same things you were five years ago.

"Over time, you'll get Windows updates, or a new version of macOS, and these
things can weigh heavily on the PC," says Joe Silverman, owner of New York
Computer Help. Even some of your apps will update themselves over time, and
the web pages you visit may just require more resources than they used to.
(Remember what the web looked like in the 90s?). When the machine slows to
a crawl, you'll have to bite the bullet and spend your money on something
better.

Before you shell out for a new set of RAM though, you should figure out what’s
actually causing the slowdown. This will tell you whether you really need a
replacement, or you’ll find it worthwhile to eke out more time with an
incremental repair or upgrade.

Diagnose the problem


Your computer consists of multiple components, each with their own specific
purpose. Any one (or more) of them could be causing your slowdowns or other
issues. To make sure you spend your money in the right place, you need to
diagnose the source of the problem.

First, make sure it isn't a software issue. "It's always good to run a virus or
malware test, and make sure there are no infections in the background," says
Silverman. You can also check programs' resource usage: On a PC, open the
Windows Task Manager (hit Ctrl+Shift+Esc) and click More Details; on a Mac,
open Spotlight (press Command+Space) and search for Activity
Monitor instead. If you see one program gobbling up all the CPU or RAM,
uninstalling it and replacing it with an alternative may speed things up.

“Check the operating system, too—there could be corruption somewhere,” says


Silverman. “If you haven’t reinstalled the operating system in five years, it
might be time.”

If you can't narrow the issue down to just one program—or the problem lies
with an essential one, like your web browser—then you may need to upgrade
your hardware. During the next slowdown, open up that same Task Manager,
head to the Performance tab, and look at your CPU and memory usage. If
either of those graphs shows particularly high, sustained usage, you know
which part probably requires an upgrade.

It's also possible that one of your components is failing entirely. "Do a hard
drive test with a program like HD Tune, which has a free trial," says Silverman.
"It will let you know how slow or abnormal some of the read-write activities are,
and if your hard drive is failing." I also like CrystalDiskInfo, which isn't as
thorough as HD Tune, but will give you a basic, clear idea of your hard drive's
health for free.

While you're running through potential trouble areas, check your RAM as well.
"Failing RAM could cause slowness, but it can also stop your computer from
turning on, or it may shut down randomly," says Silverman. "So run a RAM
test like Memtest, which will check each stick and see if it's good or not. If you
have a bad stick, you want to make sure you replace it."

REPAIR FAULTY SYSTEMS


You don’t have to run to the repair shop every time your PC ends up with an
issue. Many of the common PC problems have a rather simple solution, and
you can fix them yourself with a few simple steps.

To help you troubleshoot common PC problems yourself, I have listed 15 most


common PC hardware problems and what your options are if you face any of
them.

Read Also: How to Fix Corrupted Windows System with System File Checker

1. PC Overheating

A heating PC slows down the whole system and leads to frequent crashes.
Additionally, PC components may also get permanently damaged due to
constant exposure to heat.

There are two main reasons your PC heats up, i.e. either the cooling system
isn’t working properly or the PC is heating to the point your cooling system
can’t handle it anymore. In either case, I have written a comprehensive article
on different solutions to handle an overheating PC. Do check it out.

2. Dysfunctional USB Port

If your USB port stops working, it’s not necessary that it’s broken. Below are
some solutions that can fix this issue:

Method 1: Restart the PC


Restarting the PC is the answer to many problems, and it is a common solution
to USB port problem as well.
Method 2: Uninstall USB port driver
Uninstalling the driver of the USB port will force Windows to reinstall it when
you will restart the PC. This may fix the problem. Here is how to do it:

1. Press  Windows  +  R  keys and enter devmgmt.msc in the Run dialog to


open the Device Manager.
2. Here, expand Universal Serial Bus controllers option.
3. Now right-click the entry USB Host Controller and then click
on Uninstall.
4. Repeat this for all entries with USB Host Controller to uninstall drivers
for all the USB ports.
5. Once deleted, restart the PC and Windows will automatically reinstall
the drivers and fix any driver issues.

Method 3:
Disable USB selective suspend
USB Selective Suspend is a Windows power saving feature that suspends
unused or idle USB ports to conserve power. Sometimes it could stop a USB
port from working. Here is how to disable it:

1. Press  Windows  +  R  keys and type powercfg.cpl in the Run dialog to


open Windows Power options.
2. Here click on Change plan settings next to your current plan and then
click on Change advanced power settings.
3. Now, expand USB settings and disable USB selective suspend setting.
4. Restart the PC to see if it fixes the USB port issue.

Note: This option should be kept enabled if you want to save battery power. If
it doesn’t fix the USB port issue, then enable it again.

3. PC keeps disconnecting from WiFi

If your Wi-Fi is working fine but your PC keeps disconnecting from it, then
your PC’s network card may not be receiving full power. Windows has a built-
in power saver option that gives less power to the network card. You need
to disable this feature:

1. Go to Advanced settings in the Power Options.


2. Here expand Wireless Adaptor Settings and then expand Power Saving
Mode.
3. Set this to Maximum Performance.
4. PC beeps

The PC motherboard is smart enough to detect problems and sounds beeps


in different rhythms to tell you. Here is an article on what it actually means
when the PC beeps multiple times.

If the PC doesn’t start after the beeps, then it’s usually difficult to solve the
problem yourself. However, I’m going to list down two of the most common
problems due to which beeps occur, and thankfully, you can solve them
yourself as well.

Problem 1: Out of place RAM


A problem I recently dealt with. If the RAM inside your PC gets loose or out
of place, then your PC will beep 2-3 times and won’t boot at all. The solution
is simple, open up the PC (laptop users should let an expert handle this)
and reinsert the RAM. Here’s how:

1. Take out the RAM completely and clean any dirt inside the slot using
a cotton bud.
2. Now insert back the RAM and put enough pressure on both ends to
ensure it is fully inside.
3. Afterward, close the clips and make sure they’re properly locked. Even
a slightly loose RAM will be unable to work.

Read What Causes Memory Damage?


 Power surges can damage most computer components, including RAM.
You should plug your computer and other expensive electronics into a surge
protector. Make sure you know the difference between a surge protector and a
power strip.

 Before you handle any parts in your computer, make sure you ground
yourself by touching a piece of grounded metal to discharge static electricity.
Electrostatic discharge can damage your computer.

 Excessive heat can cause RAM and other parts to wear out over time.
Individual components can overheat, or heat from one component can cause
damage to adjacent parts.

 If you have overclocked any part of your computer incorrectly, it may


cause damage in the form of excess heat.

 Your memory module may have some fault that passed through quality
control and worsened over time. This is the most likely cause behind a
damaged RAM.
It is also possible that the memory module is fine, but one or more memory
slots on your motherboard are defective, hindering the RAM's performance. The
defect may even be so bad that it damages the memory stick.

Diagnosing the Problem


 If the symptoms started after you recently added more memory, the new
module could be faulty. This seems obvious, but any time a problem begins
after making a change, first check to see if the change caused the problem.

 Your computer may produce multiple beeps or a continuous beep when


you turn it on. These beeps can indicate many different problems, including
being a symptom of bad RAM. Beep codes vary depending on the manufacturer
of your BIOS. You can look up the beep codes for your specific computer to
figure out its specific problem.

 If you are not comfortable fixing your computer yourself, I recommend


taking your computer to a local repair store rather than a big retail store. Big
stores are in the business of selling additional parts, not fixing problems.
 If you are an advanced user, there are diagnostic programs that can help
you figure out if you have a memory problem. Your computer may have one
pre-installed by the manufacturer or you can download a third-party program.
The Windows Memory Diagnostic by Microsoft is also good if you suspect
memory problems on a Windows PC.
 If the above programs indicate your memory sticks are functioning, but
you still suspect a RAM problem or if you need to find which memory module is
the problem, you can try removing the modules and placing them in different
slots.

10 Pieces of Hardware you should replace rather than repair

Any time a computer component stops working, or just becomes unstable -- as


we all know will happen from time to time -- we have to decide whether to
replace it, have it repaired, or just get by as is with perhaps a temporary fix.
Repair or just getting by will nearly always be the cheapest solution, at least in
the short run. Replacement, however, will usually provide a good opportunity
to upgrade. In fact, given the rate at which the various technologies behind
computer hardware are advancing, unless you replace something a week after
you buy it, you may almost be forced to upgrade.Following are a few items
which, if replaced (and generally upgraded), can provide excellent benefits,
from an enhanced user experience to additional compatibility, greater
longevity, and stability for the whole system.

#1: Power supply


One of the most overlooked pieces of computer hardware is the power supply
unit (PSU). Computer enthusiasts often brag about their blazing fast
processors, top-of-the- line video cards, and gigs upon gigs of RAM, but rarely
about their great PSUs.

The truth is, the power supply is the last thing we should skimp on when
choosing components for our system. If a computer's brain is its processor, its
heart is the power supply. And having one that is worn out, underpowered,
unstable, or just generally cheap can be a major cause of hardware failure.

Every computer's power requirements are different, but a good minimum for a
modern PC is 450 watts. Some systems, especially those with multiple high-
end video cards or lots of add-on cards and peripherals may require a PSU
rated at 800 watts or more. Replacing a failing or inadequate power supply can
make a previously unstable system stable.
Aside from supplying enough power, that power must be supplied stably. A
common cause of "unexplained" lockups and system crashes is a drop in
voltage supplied to the system when under load, caused by a poorly
manufactured PSU. The easiest way to find a quality PSU is to stick to the
consistently top brands such as Antec, EnerMax, and PC Power & Cooling.

#2: Fans
As computers have gotten more powerful over the last decades, they have also
gotten hotter. Gone are the days of a passively cooled Pentium 100; now we
have fans on our massive CPU heatsinks, on our monster video cards, and on
intake and outtake vents to our computer cases. All of these fans are playing
important roles by keeping our computers safely cooled, and we should try to
ensure that they continue doing so.

Fans are one of the few parts that when replaced will not usually be replaced
with something better. But they deserve mention because:

 As one of the few moving parts in our system, they are one of the most
likely to actually break.
 When they break, it's likely to pass unnoticed or not cause much
concern.
Also, fans are cheap and easy to replace. It generally takes about 10 dollars, 15
minutes, and a screwdriver to install a new one, so there's really no good
excuse for not doing so.

#3: Surge protector / UPS


This is another item that keeps our computers safe and should not be
neglected. A surge protector can be a stand-alone power strip, but one is also
built into virtually every Uninterruptible Power Supply (UPS). The surge
protector guards our devices against spikes in energy that occur in our circuits
at the home or office, usually due to lightning or the powering up of high-
powered devices, such as hair dryers or refrigerators. Repairing a surge
protector would be difficult and expensive at best; replacement is almost
always the best option.

It can be tricky to know when it's time to replace a surge protector, because the
component inside that diverts excess power from surges to the ground simply
wears out with repeated use. However, there is often no interruption of power
or other indication that it's done. You may still have juice but not be protected.
The cheapest protectors may wear out after fewer than 10 small surges, while
the better ones can last through hundreds. The safest thing to do is to get
higher quality protectors but still replace them occasionally.

#4: Video card


The video card is one of the most important elements in the performance of
your system and overall user experience. Even though it is also one of the
priciest components, there are two good reasons to replace it should your old
one bite the dust.

First, video cards are one of the components that are being improved upon
seemingly every day. Just like with CPUs, a video card that's two years old
simply isn't as fast as a current one and won't have the newest features (such
as support for DirectX 10).

Also, the video card is the number one hardware stopgap as we migrate to
Vista. Manufacturers just aren't providing new Vista-compatible drivers for lots
of their old video cards. This means that many of us will have to replace our
video cards whether they are broken or not, if we plan to switch to Vista.

#5: Flash media reader


All kinds of devices use flash cards these days: cameras, MP3 players, even cell
phones. These small devices let us take our data anywhere easily. Since it
seems as if every device uses a different format of flash media, most of us have
all-in-one type card readers. If the reader breaks or gets lost (which seems to
happen a lot), there are two excellent reasons for upgrading to a newer model
instead of trying to repair the old one.

First, many old card readers are USB 1.1. The newer ones use USB 2.0
instead, which is 40 times faster. This is more than enough reason to replace
an old reader, even if it's not broken.
In addition, new formats are constantly coming out for flash cards, and when
they do, you need a new reader to use them. For example, Secure Digital High
Capacity (SDHC) and xD from Fujifilm are not supported by older readers.

#6: CD/DVD drives


Considering that it has moving, spinning parts, the average CD/DVD drive is
actually fairly robust. Because of that, however, many people are still using old
read-only (or CD RW) drives instead of amazingly cheap (and handy) DVD
writers. If you're still using an old drive and it finally gives up the ghost, you'll
probably be glad it did when you replace it with a DVD/CD RW combo drive for
less than 50 dollars.

#7: Hard drives


The computer component we all least want to fail is the hard drive. It's easier to
cope with the loss of the much more expensive processor or video card as long
as we still have our precious data, so your first instinct is to try to repair it. But
if you've been practicing good backup habits, you can actually come out of the
situation better off when you replace the old drive with something bigger and
faster.

The "giant" 100-GB hard drive of a few years ago is no longer so large. Today,
you can get 750 GB for less than 200 bucks. In addition to being much, much
larger, newer hard drives will generally be Serial ATA II (SATA II), which has a
maximum data transfer rate of about 300 MB/s as opposed to SATA I's 150
MB/s and the older Parallel ATA (PATA) rate of 133 MB/s. SATA II is fairly new,
so many motherboards don't support it. But even if yours doesn't, the SATA II
drives generally have a jumper that can put them in SATA I mode.

TIP: Right now, most SATA II hard drives ship with this limiting jumper in
place by default, so if your board does support SATA II, be sure to change the
jumper before you install the drive.

#8: Monitor
With the exception of servers, a computer isn't much good without a monitor.
Monitors rarely make it all the way to the stage of completely not working,
because we replace them when they start to fade. If you replace a monitor
that's more than a few years old, the new will likely not much resemble the old.

Any reluctance you may have had to switch from the giant 50-pound cathode
ray tube (CRT) monitor to a slim and featherweight liquid crystal display (LCD)
should be gone by now. The gap in performance in terms of color rendering and
refresh rates between CRTs and LCDs is very small. Unless you're a graphics
designer who needs a multi-thousand dollar large screen CRT, the benefits of
size, weight, power consumption, and less eye fatigue that LCDs enjoy will far
outweigh any small performance advantages of a CRT. With the exception of
the extremely high and extremely low end markets, it's quite hard to find a new
CRT monitor anyway.

If you were already using an LCD that's a few years old, when you replace it
you'll enjoy those leaps in performance that the LCDs have made in the last
few years.

#9: Keyboard
Since so many of us spend hours every day banging away at them, it's
important to have a keyboard that's comfortable and efficient. And since we
use them so much and often so brutally, it is no wonder that they break often.
Keys come off, get stuck, or just get really dirty. When these things happen,
you should usually go ahead and replace the keyboard rather than live with the
hassle.
Today's keyboards have new, handy features. Some have built in user-defined
macro keys for often-repeated commands; some can fold up for easy
transportability; some have built-in ports so they can double as USB hubs.
There is a keyboard with some unique feature to suit nearly anyone's needs.

#10: Motherboard and processor


Replacing the motherboard is always the most involved upgrade. Since it
usually means "starting over" with a clean installation of the operating system,
lots of people are reluctant to change to a newer board even when the old one
gives up the ghost, preferring instead to replace it with the exact same model,
thus avoiding having to wipe the OS. However, since a motherboard upgrade is
the most involved, it also can give the widest range of benefits.

First and foremost, replacing the motherboard usually gives us the chance to
upgrade to the latest processor technology. Today, you can get the benefits of a
dual or even quad CPU setup with only one processor, thanks to multi-core
technology, in which more than one processing core is placed on a single wafer.
In a multitasking or multithreaded environment, this effectively increases your
computer's performance by a factor of two or four.

Additionally, upgrading the motherboard gives you access to new technologies


for other components. PATA and SATA I hard drives (and optical drives) can be
upgraded to SATA II. AGP video cards can be upgraded to PCI-E. USB 1.1 ports
become USB 2.0. The list goes on for virtually every component. Sometimes,
even though it can be a pain, starting over can be the best thing.

SELF-CHECK 2.1-4

Repair or Replace Faulty System

A.ESSAY: Gives the repair faulty system and explain brief it.
B.ENUMERATION: Gives the 10 Pieces of Hardware you should replace
rather than repair and networks explain brief it.

1._____________________

2._____________________

3._____________________

4.______________________

5.______________________

6.______________________

7.______________________

8.______________________

9.______________________

10._____________________
TASK SHEET 2.1-4

Repair or Replace Faulty System

Performance Objective: given necessary tools,equipment and materials,

you should be able to Repair or Replace Faulty System ff.

Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

steps to troubleshooting (almost) any IT issue

Step 1. What exactly is the problem?

Step 2. Gather more details, eliminate variables


Step 3.Reproduce the problem, develop hypothesis of root cause

Step 4.Attempt a fix based on findings

Problem Solved? Prepare for future issues

Looking for free help desk software?

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-4

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

What exactly is the problem?

Gather more details, eliminate variables

Reproduce the problem, develop hypothesis of root cause

Attempt a fix based on findings

Problem Solved? Prepare for future issues

Looking for free help desk software?


 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: Use and Operation of Tools,Instrument

And Testing Devices

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion
Demonstration

Self-learning

INFORMATION SHEET 2.1-5

Use and Operation of Tools,Instrument

And Testing Devices

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Use and Operation of Tools,Instrument and Testing Devices

2. Determine the Use and Operation of Tools,Instrument and Testing Devices


Use and operation of tools instruments and testing devices
1. When referring to software, tools (also known
as toolkits) are a set of basic components and
accessories that help software developers create
programs in a more efficient manner.

 See the Computer Hope tools for a list of

available online tools.

2. With hardware, tools are what enable a person


to install, remove, or perform other actions on the
components within their computer.

Tools to have when working on a computer

The following list of tools is in order of importance,


in our opinion. Ideally, any technician that goes
onsite to repair or troubleshoot computers should
have most, if not all, of them. However, most
situations don't require all of these tools at the
same time. So, we have broken the list into
sections to help identify which tools you need for
each job.
TOOLS FOR COMPUTER HARDWARE

 A. ESD TOOLS:

Antistatic wrist strap: Protects computer equipment when grounded to a


computer chassis.

Antistatic mat: Protects computer equipment by


preventing static electricity from accumulating on the hardware or
B.HAND TOOLS :

Most tools used in the computer assembly process are small hand tools. They
are available individually or as part of a computer repair toolkit. Toolkits range
widely in size, quality, and price. Some common hand tools and their uses

Flat-head screwdriver: Used to tighten or loosen slotted screws.

Phillips-head screwdriver: Used to tighten or loosen cross-headed screws.


Torx screwdriver: Used to tighten or loosen screws that have a star-like
depression on the top, a feature    that is mainly found on laptops.

Hex driver: Used to tighten or loosen nuts in the same way that a screwdriver
tightens or loosens screws  (sometimes called a nut driver).
 Needle-nose pliers: Used to hold small parts.

Wire cutters: Used to strip and cut wires.


Tweezers: Used to manipulate small parts.

Flashlight: Used to light up areas that you cannot see well.

Wire stripper: A wire stripper is used to remove the insulation from wire so
that it can be twisted to other wires or crimped to connectors to make a cable.
Crimper: Used to attach connectors to wires.

Punch-down tool: Used to terminate wire into termination blocks. Some cable


connectors must be connected to cables using a punch down tool.
Latex gloves are natural material, made out of rubber.

They are a popular choice of protective glove for medical or industrial use.

The primary reason people would

choose an alternative to latex is because

e many people suffer from latex allergies.

                   

C.CLEANING TOOLS

Having the appropriate cleaning tools is essential when maintaining and


repairing computers. Using the appropriate cleaning tools helps ensure that
computer components are not damaged during cleaning. Cleaning tools include
the following:

Soft cloth: Used to clean different computer components without scratching or


leaving debris
Compressed air: Used to blow away dust and debris
from different computer parts without touching the components

Cable ties: Used to bundle cables neatly inside and outside of a computer

Parts organizer: Used to hold screws, jumpers, fasteners, and other small


parts and prevents them from getting mixed togethe      

D.DIAGNOSTIC TOOLS
Digital multimeter: is a device that can take many types of measurements. It
tests the integrity of circuits and the quality of electricity in computer
components. A digital multimeter displays the information on an LCD or LED.

Loopback adapter: is also called a loopback plug, tests the basic


functionality of computer ports. The adapter is specific to the port that you
want to test.
Toner probe:The toner part is connected to a cable at one end
using specific adapters, such as an RJ-45, coaxial, or metal clips. The toner
generates a tone that travels the length of the cable. The probe part traces the
cable. When the probe is in near proximity to the cable to which the toner is
attached, the tone can be heard through a speaker in the probe.

EQUIPMENT AND ACCESSORIES

LAN CARD
It is a network interface card. This is a computer
circuit board or card that is installed in a
computer so that it can be connected to a network.

SERVER
It is a part of a network.

It is a special computer that users

on the network can access

to carry out a particular job.

HUB / PORT
It is a connector on the back of

a computer or other device.

A port is either a serial port

or a parallel port.
MODEM
The modem is a device that allows

a given computer to share data

or otherwise a device which let

computers exchange information

SCANNER
It is an input device that read text

or illustration printed on paper,

translates the information

into a form that a computer can use

USB
Universal Serial Bus,

a hardware interface for

low-speed peripherals such as the

keyboard, mouse, joystick, scanner,

printer and telephony devices.


PRINTER
It is a piece of hardware that produces

a paper copy (also known as ‘hardcopy’)

of the information generated by the computer

RAM
Random Access Memory, is a primary memory.

This memory is used inside the computer

to hold programs and data while it is running.

BIOS
Basic Input / Output System,

chip that controls the

most basic functions of the computer

and performs a self-test every time you turn it on.

FLASH DRIVE
RAM that can retain data without electrical power.

It is widely used for BIOS chips

and for digital camera and digital music storage


USB WEB CAM device class that describes devices

capable of streaming video like

webcams, digital camcorders,

transcoders, analog video

converters and still-image cameras.

SOLDERING IRON
It is used to join two or

more metal conductors

with the support

of soldering lead melted around it.

LANTESTER
For RJ11,12,45 & BNC w/ Remote Unit
This ergonomic tester is designed to
test most network cable wiring.
You can either conduct an auto or manual test.

UTP
Unshielded Twisted Pair,
is a popular
type of cable used in computer
networking that consists
of two shielded wires twisted around each.
 
Multitester

is an instrument use to measure


voltage,currentandresistance.

RJ45

RJ45 is a type of connector commonly

used for Ethernet networking.

It looks similar to a telephone jack,

but is slightly wider.

Since Ethernet cables have

an RJ45 connector on each end,

Ethernet cables are sometimes also

called RJ45 cables.

MOTHERBOARD

motherboard serves as a single platform

to connect all of the

parts of a computer together.

It connects the CPU, memory,

hard drives, optical drives, video card,

sound card, and other ports

and expansion cards directly or via cables.


SELF-CHECK1.1-6

Directions.

A. Identify the following tools,and materials and give their


uses. Use a separate sheet of paper in answering.

1.

__________________________________________________

2. _____________________________________________________

3.

__________________________________________________________

4.

________________________________________________________
5.

__________________________________________________

B.Fill in the blanks with the correct answer.

________________1. It’s a RAM that can retain data without electrical power.

It is widely used for BIOS chips

and for digital camera and digital music storage.

_______________2. This ergonomic tester is designed to


test most network cable wiring. You can either conduct an auto or manual test.

_______________3. device class that describes devices capable of streaming video like

webcams, digital camcorders,transcoders, analog video converters and still-


image cameras

________________4. It is used to join two ormore metal conductors

with the support of soldering lead melted around it.

________________5. It is a piece of hardware that produces

a paper copy (also known as ‘hardcopy’)

of the information generated by the computer.


TASK SHEET 2.1-5

Use and Operation of Tools,Instrument

And Testing Devices


Performance Objective: given necessary tools,equipment and materials,

you should be able to Use and Operation of Tools, Instrument and Testing
Devices ff. Standard operating procedures within 1 half hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE, all


Tools,Instrument

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

PROPER TOOL MAINTENANCE

1.Clean, Inspect and Care for Tools


2.Store Tools Properly
3.Keep Power Tools Clean
4.Store Power Tools Correctly
5.Inspect for Wear or Damage
6.Lubricate Moving Parts
7.Keep Batteries in Shape
Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-5

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Clean, Inspect and Care for Tools

Store Tools Properly

Keep Power Tools Clean

Store Power Tools Correctly

Inspect for Wear or Damage

Lubricate Moving Parts

Keep Batteries in Shape


 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: Occupational health and safety policies

And procedures
ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 2.1-6

Occupational health and safety policies

And procedures

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Occupational health and safety policies And procedures

2. Determine the Occupational health and safety policies And procedures

Occupational Health and Safety Policy

Occupational Health and Safety Policies


Refers to the legislation, policies, procedures, and activities that aim to protect
the health, safety, and welfare of all people at the workplace.
An OHS Policy is simply a method of stating how you, your employees,
contractors and visitors are expected to behave when they are on Company
property or performing Company related activities. As an employer or
responsible contractor, you are required by law to provide a ‘safe system of
work’.

OCCUPATIONAL HEALTH AND SAFETY PROCEDURES BEFORE AND


DURING ASSEMBLING COMPUTER SYSTEM

Computer Precautions

15 OCCUPATIONAL HEALTH AND SAFETY PROCEDURE 

Reminders before you start disassembling your computer tower to keep both
your unit and yourself safe. And always remember on these “doesn’t fit doesn’t
belong”.

 Read and follow instruction on the manual carefully.


 Do not work alone so that there’s someone who can take care of you
in case of accident or emergency.
 Always power off and unplug the computer before working on it.
 Take off any metal objects on your arms or fingers such as
bracelets, rings or watches. Even if your unit is unplugged, there
may still be some remaining electric charge.
  Always ground or discharge yourself before touching any part of
the computer (such as the computer casing) and make sure your
hands are completely dry to avoid damaging any mechanical parts as
well as to avoid electrocution.
 Be careful with the tools that may cause short circuit (such as
screw drivers)
 Handle all parts with care. Place each piece you remove carefully
down onto a stable surface, if a component does not come out easily,
do not use excessive force if things don’t quite slip into place or when
you’re removing it. Instead, check if you are removing it correctly and
no wires still connected in the hardware.
 Always full the cable connector on the handle and not on the cable
itself
 Be sure you’re standing in a dry place and use only rubber shoes
when standing on the ground or in a concrete floor.
 Make sure that the pins are properly aligned when connecting a
cable connector.
 Take away any liquid such as mineral water or soft drinks near
your working area or near computers, the three of the most
damaging things to a computer are moisture (sweat, drinking water),
shock (electric or from being dropped) and dust (any debris from
household dust to bits of food).
 Personal protective equipment is correctly used in accordance with
organization OHS procedures and practice.
 Hazard/risks in the workplace and their corresponding indicators
are identified to minimize or eliminate risk to co-workers, workplace
and environment.
 Take necessary precautions to protect the component of the
computer from damaged cause by Electrostatic Discharge (ESD).
  Hold the components by edges and do not touch the IC’s.

Importance of occupational health and safety management


at workplace

Multidisciplinary field of occupational health and safety with the goal of


occupational safety and health programs is concerned to foster a safe and
healthy work environment. The main focus of occupational health include
promotion and maintenance of working capacity and employee health;
improvement of working environment; development of work cultures and
organizations to support health and safety; promotion of positive social climate
and smooth operation; enhanced productivity of the organization. Occupational
health and safety (OHS) standards mandate reduction, removal or replacement
of job site hazards. OHS programs also help minimize the effects of such
hazards. Occupational health and safety considerably benefits the company, as
healthy employees are guaranteed to be more productive. Company
management and employers are obliged to provide a safe working environment
for all of the employees. Working conditions at employment in the existing
economy need to embrace important determinants of working hours, salary,
maternity policies, provisions for health promotion and protection.

The employer or supervisors acting as the representatives are legally


responsible for the safety and health of the workforce at workplace. The
common goal remains to identify hazardous materials, conditions and practices
at workplace; assist employers and workers in reducing or eliminating the
risks. With the goal to ensure that employees work effectively, occupational
health and safety targets employers and employees. Occupational health and
safety cooperation experts promote workplace conditions. Occupational safety
professionals are concerned about all workplace hazards with emphasis on
prevention of workplace fatalities and traumatic injuries. Industrial hygienists
are a source of special expertise to identify and control hazards associated with
acute or chronic exposure to chemical, physical and biological agents.
Occupational medicine physicians and occupational health nurses are
distinguished by providing clinical care programs aimed at health protection
and promotion of disease prevention. The services provided include health
screening and surveillance programs; diagnosis, prevention and treatment of
work related injury and illness; pre-placement and periodic return-to-work
examinations; independent medical examinations; impairment evaluations;
disability and case management; drug testing; behavioural and emotional
counselling to avoid affect on job performance. Such simple improvements can
increase competitiveness, profitability and motivates the workforce.
Practice Occupational Health And Safety Procedures

1. Hazard and Risk Control

A hazard is any source of potential damage, harm or adverse health effects on


something or someone.

Risk is the chance or probability that a person will be harmed or experience an


adverse health effect if exposed to a hazard. It may also apply to situations with
property or equipment loss, or harmful effects on the environment.

2. Environments for Safety Regulations

A common factor in whether regulation is used is the seriousness of the


outcome being addressed in terms of human health. For this reason regulation
is more common in transportation and the workplace, where the potential for
fatal injury is perceived to be relatively great, and less common in the home
and in sports environments, where the potential for fatal injury is perceived to
be less. Regulations are often introduced in situations where the actions of one
person can injure other persons who do not have the ability or opportunity to
decide whether to accept the risks associated with those actions. The most
common examples relate to regulations protecting the safety of children and of
workers.

Using the Think Safe Steps

1. Spot the hazard

A hazard is anything that could hurt you or someone else.

Examples of workplace hazards include:

frayed electrical cords (could result in electrical shock)


boxes stacked precariously (they could fall on someone)
noisy machinery (could result in damage to your hearing)

2. Assess the risk

Assessing the risk means working out how likely it is that a hazard will harm
someone and how serious the harm could be.
For example:

ask your supervisor for instructions and training before using equipment
ask for help moving or lifting heavy objects
tell your supervisor if you think a work practice could be dangerous

3. Make the changes

It is your employer's responsibility to fix hazards. Sometimes you may be able


to fix simple hazards yourself, as long as you don't put yourself or others at
risk. For example, you can pick up things from the floor and put them away to
eliminate a trip hazard.

The best way to fix a hazard is to get rid of it altogether. This is not always
possible, but your employer should try to make hazards less dangerous by
looking at the following options (in order from most effective to least effective):

Elimination - Sometimes hazards - equipment, substances or work practices -


can be avoided entirely. (e.g. Clean high windows from the ground with an
extendable pole cleaner, rather than by climbing a ladder and risking a fall.)
Substitution - Sometimes a less hazardous thing, substance or work practice
can be used. (e.g. Use a non-toxic glue instead of a toxic glue.)
Isolation - Separate the hazard from people, by marking the hazardous area,
fitting screens or putting up safety barriers. (e.g. Welding screens can be used
to isolate welding operations from other workers. Barriers and/or boundary
lines can be used to separate areas where forklifts operate near pedestrians in
the workplace.)
Safeguards - Safeguards can be added by modifying tools or equipment, or
fitting guards to machinery. These must never be removed or disabled by
workers using the equipment.
Instructing workers in the safest way to do something - This means developing
and enforcing safe work procedures. Students on work experience must be
given information and instruction and must follow agreed procedures to ensure
their safety.
Using personal protective equipment and clothing (PPE) - If risks remain
after the options have been tried, it may be necessary to use equipment such
as safety glasses, gloves, helmets and ear muffs. PPE can protect you from
hazards associated with jobs such as handling chemicals or working in a noisy
environment.
SELF-CHECK 2.1-6
A. ENUMERATION: Write the 15 occupational health and safety procedure 

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12.

13.

14.

15.

B. List down practice occupational health And safety procedures


C. ESSAY: Why is Importance of occupational health and safety management
at workplace and explain it .

1. Hazard and Risk Control

2. Environments for Safety Regulations

3. Make the changes


TASK SHEET 2.1-6

Occupational Health and Safety Policies and Procedures

Performance Objective: given necessary tools,equipment and materials,

you should be able to Occupational Health and Safety Policies and Procedures ff.

Standard operating procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Steps to Control Workplace Hazards:


Step 1: Design or re-organise to eliminate hazards

Step 2: Substitute the hazard with something safer

Step 3: Isolate the hazard from people

Step 4: Use engineering controls

Step 5: Use administrative controls

Step 6: Use Personal Protective Equipment (PPE)

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-6

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Design or re-organise to eliminate hazards

Substitute the hazard with something safer

Isolate the hazard from people

Use engineering controls

Use administrative controls

Use Personal Protective Equipment (PPE)


 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: Procedures in Maintenance Scheduling

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 2.1-7

Procedures in Maintenance Scheduling

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Procedures in Maintenance Scheduling

2. Determine the Procedures in Maintenance Scheduling

A Computer Maintenance Schedule

Computers keep your business running, but your computer is like a car- it
needs regular computer maintenance to perform at its best. From the inside
and out, your computer is a machine that is capable of amazing things, but it
can’t do it alone. It needs your help, or the help of an IT solutions provider, to
stay running at full capacity.
Use this checklist to stay up-to-date with the tasks you should do daily,
weekly, monthly, quarterly, and yearly to keep your computer functioning at its
best.

DAILY

 Virus/Adware/Spyware Scans
 Delete internet temp files
 Delete Windows temp files

WEEKLY

 Windows Update
 Check for Other Software Updates
 Java
 Flash
 Antivirus/Adware Software
 Adobe
 Data backups
 Empty the desktop Recycle Bin
 Delete cookies

MONTHLY

 Run Disk Cleanup


 Run Disk Defragmenter
 Uninstall unused programs
 QUARTERLY
 Clean the keyboard
 Clean the mouse
 Dust the computer monitor

YEARLY

 Dust inside the computer


 Renew antivirus subscriptions

Why Keep Up with Regular Computer Maintenance?


In the same way that your car will break down if you do not change
its oil, check its fluids, and inspect the belts, your computer will
suffer from performance issues if you don’t keep some form of
routine maintenance schedule.

 Reduce security risks with properly updated applications.

 There are always new network threats- keep your antivirus


 updated.

 Free hard disk space from unnecessarily files.

 Improve your computer’s speed.

 Resolve internet browser problems.

 In other words, like any machine, a computer needs a little bit


of love to work the way it needs to.
Computer Maintenance Checklist
The following is a list of basic maintenance steps you can implement if you’d
like to try to improve your computer’s performance on your own (for Windows
only).  Don’t worry; if you don’t feel comfortable doing these maintenance steps
yourself, CONTACT US and we can do it for you!

Step 1: Anti-virus

Update your anti-virus software and run a


scan.
How you do a scan will depend on what
program you’re using but most have very
clear instructions right from the start.
Unless you know there’s a problem I
recommend doing the programs’ default
scan. You only need a full scan if you know
you’ve got a virus and the default hasn’t
found it. I also recommend plugging in any
external hard drives so they get checked at
the same time.

Step 2: Anti-spyware/anti-malware
most anti-virus programs do a basic
spyware check too, but do both to
make sure. There are many options for
spyware removal software, Malware
Bytes Pro, Super Antispyware and
Spybot: Search and Destroy are
recommended. Many also offer to
protect your browser(s) against future
incursions which I’d recommend as it
can save you a lot of time and trouble.
Like anti-virus programs how they
work will vary but it’s usually easy to
see what you need to do, often you just click a button and let it go.
Step 3: Empty your recycle bin (best done with CCleaner)

Just because you’ve deleted something


doesn’t mean it’s actually gone, if it’s
sitting in the recycle bin then it’s still on
your hard drive and still taking up
memory. Disc Cleanup (See Step 4) will
empty the recycle bin automatically, but
I like to do it manually just in case
anything important ended up in there by
accident.
There should be a recycle bin icon on
your desktop, but if not it’s on the start
menu. Just open the folder, check what’s in there and click ’empty recycle bin’.

Step 4: Disk and


Application/Software Cleanup
This is another easy step because it’s
built into Windows. You’ll find it by going
to Start>All
Programs>Accessories>System Tools. Pick
the drive you want to scan (your main
hard drive(s), any that are just used for
data storage won’t have problems) and let
it go.
It finds files that aren’t needed any more
and odd bits of data that got left behind.
Stuff like web pages that were archived
automatically, temporary files that never
got deleted, old service pack backups and
so on. It then presents you with a list of
what it’s found and how much memory
each item is taking up. You can pick and
choose which ones to delete but I like to
do the whole lot.
Also look in control panel for unwanted or unnecessary programs. Uninstall
anything that has leached on to the system over time such as Internet Browser
toolbars.
Remove any unwanted or unnecessary Internet Browser extensions, plug-ins or
add-ons
Expert level technicians may want to clean up the system registry (do not
attempt this unless you are absolutely sure you know what you are looking for)
Step 5: Defragment

Again this program comes with


Windows, it’s in the same place as the
Disk Cleanup tool. It’s a straightforward
process; pick a drive, ask for analysis
and if it says it needs defragmenting let
it do its thing.

Step 6: Configure your startup

This is a bit more complicated, but


extremely useful. First, you need to
open the Run program. Type
‘msconfig’ and click OK. When it
opens go into the ‘Startup’ tab. This is a
list of everything that runs
automatically when you switch your
computer on. If you’re not sure what
something is, it’s best left alone but
there should be some familiar names
there too like iTunes or MSN.
Ask yourself if these really need to be running in the background each and
every time you switch the computer on and uncheck any that don’t make the
cut. Then click apply, then OK. Next time you start up your computer those
programs won’t start with it. You can still open them manually and they’ll work
exactly the same way, but they won’t be hogging resources when you’re not
using them.

Step 7: Check Windows Updates, Update plugins and basic


applications

Check Microsoft Updates, including


weekly scheduled updates as well as
the latest Service Packs.
Some of the applications to look for to
update:
Browsers – Google Chrome, Safari, Opera and Firefox

Messaging – Skype, Windows Live Messenger, Pidgin, Digsby, Google Talk,


Thunderbird, Trillian, AIM and Yahoo IM

Media – iTunes, Songbird, Hulu, VLC, KMPlayer, AIMP, foobar2000, Winamp,


Audacity, K-Lite Codecs, GOM, Spotify, CCCP, MediaMonkey, Quicktime

Runtimes – Adobe Flash, Java, NET, Silverlight, Adobe Air, Shockwave


Imaging – Paint, NET, Picasa, GIMP, Infranview, XnView, Inkscape, FastStone

Documents – OpenOffice, Adobe Reader, SumatraPDF, Foxit Reader, CutePDF,


LibreOffice, PDF Creator

Security – Microsoft Security Essentials, Avast, AVG, Norton, McAfee, Malware


Bytes, Ad-Aware, Spybot, Super AntiSpyware etc.
Online Storage or Backup – Carbonite, Dropbox, Google Drive, Mozy, Microsoft
SkyDrive

Utilities – TeamViewer, ImgBurn, Auslogics Disk Defrag, RealVNC, TeraCopy,


CDBurnerXP, TrueCrypt, Revo, Launcy, WinDirStat, Glary, InfraRecorder

Compression – 7-Zup, PeaZIP, WinRAR

Step 8: Check file backup plan and create system recovery


disks if applicable

Make sure to have a file backup plan


and create system recovery disks if
available. System images are always a
good idea as well.
Step 9: Clean and dust internal computer parts and fan (check
fans and computer temp.)

SELF-CHECK 2.1-7
A. ENUMERATION: List down the Computer Maintenance Checklist
1.

2.

3.

4.

5.

6.

7.

8.

9.

B. ESSAY: What is the computer maintenance schedule and explain it?


TASK SHEET 2.1-7

Procedures in Maintenance Scheduling


Performance Objective: given necessary tools,equipment and materials,

you should be able to Occupational Health and Safety Policies and Procedures ff.

Standard operating procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Computer Maintenance Checklist


Step 1: Anti-virus
Step 2: Anti-spyware/anti-malware
Step 3: Empty your recycle bin (best done with CCleaner)
Step 4: Disk and Application/Software Cleanup
Step 5: Defragment
Step 6: Configure your startup
Step 7: Check Windows Updates, Update plugins and basic applications
Step 8: Check file backup plan and create system recovery disks if applicable
Step 9: Clean and dust internal computer parts and fan (check fans and
computer temp.)

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 2.1-7

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Anti-virus

Anti-spyware/anti-malware

Empty your recycle bin (best done with CCleaner)

Disk and Application/Software Cleanup

Defragment

Configure your startup

Check Windows Updates, Update plugins and basic applications

Check file backup plan and create system recovery disks if applicable

Clean and dust internal computer parts and fan (check fans and
computer temp.)

 LEARNING OUTCOME NO.2


 Maintain Computer Systems and Networks

LESSON CONTENT: Preventive Maintenance of Computer

System and Network

 Operating Systems Update


 Backup Scheduling
 Creating Restore Point
 Guarding Againts VIrus

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:
Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 2.1-8

Preventive Maintenance of Computer

System and Network


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Preventive Maintenance of Computer System and Network

2. Determine the Preventive Maintenance of Computer System and Network

PREVENTIVE MAINTENANCE

The primary goals of preventive maintenance include the following:

 reducing the likelihood of hardware failures


 extending the useful life of the system
 minimizing system crashes caused by outdated hardware and other
software problems,
 securing the system against viruses and other malware, and
 preventing data loss.
There are some general prevention tasks
that non-technical personnel can run on your system’s hardware. Refer to this
link: http://myitgenius.com/PDF/PMCheck-1.pdf.

TyMatt can provide you with preventive maintenance assistance either on-site
or via remote diagnostic support. Please contact us for a monthly maintenance
price quotation.

Data Backup

Data backup is the most critical aspect of preventive maintenance. Surprisingly


it is often overlooked, resulting in devastating losses for businesses of all types
and networks of all sizes. Data backup should be performed daily to ensure
that vital documents are protected.

Whether it’s on-site or off-site (or a combination of both), TyMatt will help you
find a solution that meets your needs for data protection and backup and
ensures the fastest recovery of your data in the event of a system crash.

Benefits of Off-Site Backup

Off-site backup protects against hardware failures and localized damage such
as fire, flooding, vandalism, and theft. Since data is stored off-site on
redundant and secure servers.  In the event of a failure, data can be restored
quickly to get your business back up and running.

Benefits of On-site

The benefit of having your data backed up on-site is allows you to restore lost
data very quickly. The on-site backup is a local, physical device directly
connected to your network. With off-site backup, data is restored over the
internet from the off-site servers; a reliable, but slower process.
Understanding The Importance Of Preventive Maintenance In
Computer Systems

Preventive maintenance is something that’s often overlooked in computers.


But, just like changing the oil and rotating the tires of your car, caring for your
computer properly will ensure a long lifespan – and top-notch performance.
Here are just a few of the reasons that preventive maintenance is so important
for computer systems.
 
Prevent Data Loss
 
If you don’t maintain your computer by checking the health of your hard disk
or making backups, you could risk sudden data loss of absolutely critical data.
Whether it’s a business document or a precious family photo album, regular
backups of data are critical for protecting your data.
 
Remember, as the old IT adage says. “There are only two types of hard drives.
Hard drives that already have failed, and hard are going to fail.” Back up your
data regularly, or you risk losing it forever!
 
Ensure Better Overall Performance
 
Doing basic things like checking what programs run on start-up, looking for
malware, and removing unused programs will help your computer function
more effectively, and keep it from slowing down. Think of this like a “tune-up”
on a car, that helps your computer perform more reliably.
 
Fix Security Vulnerabilities
 
One of the most important parts of computer maintenance is updating your
operating system, and the programs you use, like your web browser. This helps
fix security vulnerabilities, which could be exploited by hackers to place
malware or viruses on your computer. Malware and viruses can slow down
your system, and even steal your personal data, like banking information.
 
Get A Longer Lifespan From Your Computer
 
Keeping your system updated and backed up, protected from malware, and free
of unnecessary files, folders and programs helps you get better performance,
and a longer overall lifespan.
 
In addition, doing things like cleaning the keyboard and screen and spraying
dust out of the fan can help keep the physical components of the computer in
better shape, and prolong its lifespan – saving you money.
 
Free Up More Data Storage
 
Running out of storage is always a problem on computers, so consider doing
periodic backups, and removing unnecessary files from your computer. This
will free up more data storage, and give you more storage for your important
files and documents.
 
Need Help Maintaining Your Computer? Contact Us Now!
 
From backups to security patching, antivirus installation, cleaning and more,
we can do it all – and make your computer feel brand-new again. Need a
computer “tune-up?” Call us for an appointment, bring in your computer, and
let us take care of the rest.

What are Operating System Updates?


 

Operating System Updates contain new software that helps keep your
computer current.

Examples of updates include service packs, version upgrades, security


updates, drivers, or other types of updates.

Important and high-priority updates are critical to the security and reliability of
your computer. They offer the latest protection against malicious online
activities.

You need to update all of your programs, including Windows, Internet Explorer,
Microsoft Office, and others. Visit Microsoft Update to scan your computer and
see a list of updates, which you can then decide whether to download and
install.
NOTE: Microsoft offers security updates on the second Tuesday of the month.

It's important to install new security updates as soon as they become available.

The easiest way to do this is to turn on automatic updating and use the


recommended setting, which downloads recommended updates and installs
them on a schedule you set.

In Windows Vista, you control the automatic updating settings through the
Windows Update Control Panel. For more information, see Turn automatic
updating on or off. 

Three Reasons Why Upgrading Your Test Operating System


is a Priority

Is your test system still running on an old operating system? In order to take
full advantage of the gamut of improvements in audio and visual technology, it
is necessary to modernize your equipment beyond the stock capabilities of the
standard VHS player. Similarly, your test system – and any hardware or
software system – also needs upgrades to continue to function reliably and
avoid ever more costly downtime.
Three Reasons Why Upgrading Your Test Operating System is a Priority
Whether designed using off-the-shelf or proprietary technology, your test and
measurement system will be more secure and easier to maintain with an
updated operating system (OS). Three reasons upgrading is important: cyber
security, product obsolescence, and enhanced capability.

1. Cyber and System Security


Microsoft no longer supports security updates for Windows XP; this can make
your test system more vulnerable to attacks.

Also according to Microsoft:


• Over 300K new malware samples are being created and spread every day
• 87% of senior managers have leaked data accidentally
• 63% of breaches involve weak or stolen passwords
• $3.5 Mil is the average cost of data breach per incident

In order to comply with the latest Department of Defense (DoD) regulations


all government contractors must update their security guidelines; in turn, this
means many contractors upgraded or need to upgrade their operating systems.
If you are a government contractor, the DoD policy requires protection of
controlled unclassified information as required under the National Institute
of Science and Data security requirements known as NIST SP 800-171. NIST
Special Publication 800-171 breaks down the minimum cyber security
standards into 14 areas, listed here.
Upgrading your system’s OS may also help your business avoid becoming a
victim to increasingly common security threats. As you have seen – but
hopefully not experienced within your business – the hacking industry and
malware continue to evolve and pose greater and greater threats.

2. Product Obsolescence
The longer a test system is allowed to languish on old platforms, the more
obsolescence threatens the test system’s ability to remain online and well-
supported.

Aged systems are subject to support difficulties in many areas and may cause
the following:
• Increasing likelihood of failures
• Higher frequency downtimes
• Longer duration downtimes
• Difficulty finding replacement parts
• Difficulty finding supported drivers
• Elongated time on support calls (as staff are trained in latest technology)

Some common signs that your software is incompatible with a new operating
system include:
• Software fails to launch
• Software used to generate reports and no longer does
• Software displays permission errors
• Software can no longer save configuration data
• Software can no longer print
• Software no longer collects data or data is wrong

If your software exhibits any of these traits it is likely not compatible with
modern OS rules and requirements. 
3. Preserving Capability
Migrating test software to a newer operating system extends the overall lifespan
of the test system. Migration also allows the test system to take advantage of
faster, more reliable modern hardware and drivers and increases the overall
supportability of the system.
An experienced integrator can migrate your test system to a modern,
reliable platform
Migrating to a new OS is not as simple as installing the new OS. New OS
versions come with new rules and requirements, often rendering old software
unable to properly run. G Systems can update your test software to make it
compatible with the new environment.

For more than 25 years, G Systems has performed OS upgrades to maintain


test system functionality. Our experience includes working with prime
aerospace and defense contractors and many other markets. As part of an OS
upgrade, we will guide you through these topics and help ensure your system
continues to run reliably.

Download our Complete Guide to Managing Obsolescence to learn more


about how to identify obsolescence issues early and manage them once they
are identified.
With all the backup-focused products available on the market today, there is
no excuse not to back up systems and data. The key to making all of this work
is having a backup schedule.

It's important to know how to create a backup schedule and develop a


thorough scheduling strategy.

The principal goal of backup scheduling is to establish time frames to back up


an entire system, multiple systems, data and databases, network files, and
other critical systems and data.

Why is a backup schedule needed?


Backup schedules are essential IT activities, as they ensure several important
activities are performed and issues are addressed, such as:

Create your data backup strategy: A comprehensive guide

 Disaster recovery. Recovering and restarting critical systems, VMs, data


files and databases.

 Start times and completion times for all regular backups


defined. The schedule must include all data backup activities and include
testing activities as needed; in addition, the backup tool and network
resources being used can be specified.

 Restore files that are accidentally deleted. It's happened to all of us at


some time and it helps to have a safety net in case work files or other
critical data are erased.

 Effect of backup activities on production activities. A backup


schedule can help keep production systems operating at peak performance,
with backups occurring outside of production schedules.

 Satisfaction of compliance and audit requirements. If the


organization is required to comply with certain regulations and standards
regarding data protection, and is periodically audited for general IT controls,
schedules are important sources of evidence in these areas.

 Compliance with recovery time and recovery point objectives


(RTOs/RPOs). These important metrics are essential for managing data
backup and recovery; schedules can demonstrate that they are being
addressed.
Key issues in backup scheduling

Although scheduling backups might seem like a no-brainer, several


components of the process must be addressed within IT departments and
reviewed with business unit leaders and senior management.

Addressing these items will ensure a comprehensive, auditable schedule that is


easily understood and can be implemented by designated data backup team
members and others, if needed, in an emergency. Following is a list of key
concerns for planning and executing data backups.

1. What needs to be backed up?

Data and system owners should specify the frequency of their backups and
what should be backed up. Normally, data administrators should back up
everything -- or specific parts -- in the IT environment with a frequency
acceptable to business unit leaders and cost-effective operations.

Organizations should also consider the cost of backups and the effect of
backups on system -- and company -- performance. For example, it might
make sense to replicate the entire system or critical portions of the system and
specific individual files and databases to an alternate storage medium and
perform incremental backups to that environment.

2. Location of systems and files to be backed up

Identify if the working location will be an on-site server, storage device or


perhaps a cloud-based backup arrangement. This can be included in the
backup schedule and should also be specified in data backup policies and
procedures, especially from compliance and audit perspectives.

3. Who performs backups?

The data backup administrator's activities should be governed based on


discussions with system owners and data owners. Individual users might
also back up their own data files; this should be addressed by an IT policy for
data management. Other IT employees should be identified as potential backup
staff to the primary backup administrator(s). This might involve some internal
training from the data admins as well as vendors whose technology resources
are used for backups.

4. Time frames for backups

Points in time when data and system backups can occur should be defined
based on business requirements. For example, some systems and data files
might need to be backed immediately when they have been modified. This
reflects their criticality to the business. Full backups are often performed after
business hours weekdays and over weekends. More frequent backups are
governed by the business and their execution might depend on specific systems
and network resources.

Backup time frames are influenced by several variables:

 system or service that performs the backups;

 location of the backups -- for example, on site or remote;

 time of day for performing backups;

 use of mounted or unmounted file systems;

 RPO/RTO metrics to be satisfied; and

 requirements as specified by system/data owners and senior


management.
Backup administrators should periodically consult with system owners on
these criteria to ensure backup policies, procedures and schedules are
appropriate.

5. How frequently do systems and data files need to be backed


up?

Some files are updated often during a typical day, such as customer data files,
requiring admins to back up these files more frequently. They might consider
backing them up at the end of each day -- factoring in all incremental revisions
-- so that an up-to-date backup is saved.

Other situations might require the immediate backup of changes so files are
always current. Other files might not need to be backed up regularly and, as
such, could be candidates for alternative storage, such as tape.

RPO requirements might also influence the frequency of backups. For example,
if the RPO for certain critical files is 10 seconds or less, the backups will likely
be more frequent, and the technology used for those backups -- e.g., data
mirroring, data replication, high-speed low-latency networks -- will also need to
be considered.

System backups might need a different schedule than data files and databases.
Backups should occur any time one or more parameters in a system change in
the course of daily operations. This suggests a more ad hoc approach to system
backups; each organization will need to establish those requirements.

6. Restoration of data from backups

Backups are created to ensure that if the recovery or restoration of a system


and/or data is needed, those resources will be as current as possible. An
organization should consider the criticality of systems and files at this point so
it can establish the priority of backing up and the priority of restoration. These
items should be factored into backup scheduling.
7. Location of restored systems and data

In an emergency, it might be necessary to restore systems or data to an


alternate platform, as opposed to the original system. This is a key
consideration for disaster recovery. Cloud-based platforms are increasingly
popular approaches to this requirement. Managed service providers (MSPs)
that specialize in data backup and storage are also viable alternatives. The key
is to locate backed-up resources at a sufficient distance from the firm's primary
location so that the risk of loss at alternate storage locations is greatly reduced.

Types of backups and examples

The following are the typical types of backups:

 Day zero backups are performed when a new system is fully installed
and accepted by the system owner. It establishes the initial baseline for
future updates.

 Full backups store all the systems and files within the system, or they
store selected systems and files as defined by the system/data owner.
Companies should perform these on a regular basis, such as once a week,
and they should also consider backups when a major change to the IT
infrastructure occurs.

 Incremental backups create a copy of all the files that have changed
since a previous backup.

 Differential backups create a copy of all the files that have changed since
the last full backup.

Examples of frequently used systems and files for backup scheduling include:

 Individual user files

 Databases

 VMs
 Password and group files

 Accounting files

 Configuration files

 Terminal and port files

 Network files
Developing and implementing a backup schedule

Organizations might need to perform some incremental backups several times


each day, whereas others might need more infrequent updates. The increased
use of VMs makes efficient and timely backups even more important. In a
disaster, enterprises will need to recover and restore quickly to resume
operations with minimal downtime.

Setting up a schedule requires a detailed and accurate list of all systems to be


backed up, as well as all data files and databases to be backed up. The
schedule should be prepared on a platform that facilitates timely changes, as
data and system backup schedules can be very dynamic. Use RPO values to
assist with the creation of schedules, as satisfaction of the RPO values will be
affected by how frequently their backups are scheduled. Work with the
organization's backup software vendor to assist with schedule preparation. The
same is true of external resources, such as MSPs and cloud-based backup and
storage firms. Figure 1 is an example of a backup schedule.

How to Create a System Image Backup in Windows 7, 8, or 10


The built-in backup utilities in Windows are pretty solid. Let’s take a look at
how

Normal backup programs, like CrashPlan or Windows’ built-in File History


feature, essentially copy your files to another location. A system image backup,
on the other hand, is like a full snapshot of an entire hard drive. The advantage
of a system image is that if a hard drive crashes, you can replace it, restore the
image, and have your system right back to where it was when the image was
captured. No need to reinstall Windows or your apps.

The biggest disadvantage with system image backups—other than taking a bit
longer—is that you can’t restore the backup to a different PC. You’re creating
an image of your full Windows installation and, since Windows is set up
specifically for your hardware, it just won’t work as-is in another PC. It would
be like trying to plug your hard drive into another PC and expecting everything
to load well. With that in mind, though, image backups can still be really
handy.
Step One: Open System Image Backup

The process of finding the System Image Backup tool is different in Windows 7
than in Windows 8 and 10, so we’ll show you to find the tool in all versions,
and then explain how to create and use the system image.

Open System Image Backup in Windows 10

In Windows 10, hit Start, type “backup,” and then select the entry.

In the “Backup and Restore (Windows 7)” window, click the “Create a system
image” link.
Open System Image Backup in Windows 8

In Windows 8, hit Start, type “file history,” and then select the “File History”
entry.

In the “File History” window, click the “System Image Backup” link
Open System Image Backup in Windows 7

Hit Start, click the arrow to the right of the “Getting Started” item, and then
click “Back up your files.”

In the “Backup and Restore” window, click the “Create a system image” link.
Creating A Windows System Image

Here we’ll show you how to create Windows 7 backup system image, the steps
for Vista and Win 8 compatible versions are broadly the same. You can only do
this from within Windows itself. There are a few ways of running the Windows
Backup and Restore Tool which will also allow you to create a repair disc or
backup files and folders, choose 1 from any of the following:

 Click the Start orb and type backup into Search. You should see Backup
and Restore appear in Programs, press Enter.
 Click the Start orb -> All Programs -> Maintenance -> Backup and
Restore.
 Go to Control Panel and select Backup and Restore from an icon view, or
System and Security -> Back up your computer in Category view.
Now in the Backup and Restore tool, click Create a system image in the left
pane.

This will open up the Create a system image window. Alternatively, you can get
directly to this window from the desktop by using Win Key+R and typing the
following into the Run dialog box:

sdclt.exe /BLBBACKUPWIZARD
Now select where you’re going to backup the system image to, which can either
be to hard drive, multiple DVD discs or a network location if your Windows
version supports it. Removable USB devices such as flash drives will show
under hard disks. If you try to select another partition on the same physical
hard disk you’re backing up from, there will be a warning about it because that
hard drive failing will result in both operating system and the backup being
lost. If you place ANY value in your backups at all, it’s strongly recommended
to use a different physical device to save them to.
The next screen will offer to backup any other volumes you might want to
include in the process, the main system partition and the small 100MB boot
partition if present will be automatically selected and cannot be touched.

Note: Sometimes in a multiboot system, one of your other operating system


partitions will be auto selected and grayed out so you can’t turn it off. This is
usually the case when you install Windows 7 after another operating system
and the bootloader system files are located on that partition and not Windows
7’s. Apart from some tricky methods of manually moving all the boot files onto
the windows 7 partition and making it an Active / System volume, it is
recommended to either accept the included volume or use another backup
software.
At the final confirmation window, the Backup and Restore tool will tell you how
much space it could take to create the backup and clicking the Start backup
button will start the process. Depending on the amount of data to backup and
the speed of the hardware, this could obviously take from a few minutes to an
hour or more. If you receive an error at this point, you might like to read our
article on a possible cause for a system image backup failure.
After the backup process completes, you will be asked if you want to create a
system repair disc. This is highly recommended if you don’t have a
full Windows install DVD to hand and can also be created later on from the
Backup and Restore tool main window. If you would like to create a repair CD
on a USB stick, please follow the repair disc to USB instructions in our post
detailing how to do it.
On page 2 we’ll show you the various ways you can restore your system image.
Read More: https://www.raymond.cc/blog/create-windows-7-system-image-
for-full-backup-and-restoration/

Create system image in Windows Server 2008 with Windows Server


Backup

Windows Server Backup is a free tool in Server 2008, 2008 R2, 2012, 2016 etc,
which allows you to create a full server backup, system state backup, bare
metal backup, or backup selected volumes, specific files and folders.
However, this tool is not installed by default and you need to manually install it
using Server Manager. Just Open Server Manager, then go to Features > Add
Features > Windows Server Backup Features and click Install to start the
installation process.
Then, to create a system image backup in server 2008 with Windows Server
Backup, use the following steps. Please note that you must be a member of the
Backup Operators or Administrators group, or you must have been delegated
the appropriate authority. And this software only backs up volume formatted
with NTFS file system.

1. Open Windows Server Backup. Just click Start and type Window Server


Backup in the search box, then select it from the list result.
2. Click “Backup Once” at the right panel. If you want to create a schedule
backup, you can click “Backup Schedule”.
3. Tick “Different options” and click Next.

4. Check “Full Server” in the “Select backup configuration” page.


5. Click "Local drives" and Next. Then, in the new window, click the inverted
triangle and select a drive from drop-down menu as backup destination. You
can choose local disk or external drive as destination as long as it can be
recognized.
6. Select “VSS copy backup(recommended)” and click Next.
7. Confirm the backup items and click “Backup” to start this operation.
Now, you may successfully create a system image. It’s very luck. Also, you can
use Windows Server Backup command line to create a backup for your
computer.
But there are still some users who may not create a backup and run into
issues with error message like incorrect function, greater than 2TB, reading
data please wait, system writer is not found in the backup etc. To avoid these
issues, you could consider using a professional backup software as
replacement.

Create system image backup for Windows Server 2008 with AOMEI
Backupper Server

AOMEI Backupper Server is a trust and reliable backup software that is widely
used to create system image in Windows server 2008, 2012, 2016, 2019 etc.
This operation is very easy, just a few clicks. It supports full backup,
incremental backup and differential backup. It backs up system partition with
NTFS, FAT32, FAT, EXT2, EXT3 file system.
In addition, there are some useful feature you may use during the backup
process. They makes the task simple and efficient.

 Get backup result more easily. With “Email Notification”, you no longer


need to wait unless the backup task is 100% completed. Because it will inform
you the final result and any error message during the backup process.
 Save disk space. Don't want waste a lot of time and disk space when
create a server 2008 image backup? You could backup system
with incremental backup or differential backup feature.
 Support automatic backup. To keep the newly installed apps, added or
modified files, you can schedule backup at a regular basis, such as, daily,
weekly, monthly.
 Support off-peak hours backup. Its feature "Wake the computer to run
scheduled tasks" allows you to backup system at midnight or any other time
without human intervention.
 Manage backup disk space. Backup space not enough is a big headahe
for users who create schedule backup regularly. So, it’s recommended to
enable backup scheme to delete old backup.
Then, follow steps below to create Windows Server 2008 image backup with
AOMEI Backupper Server. If you want to backup Windows Server 2008 to
external hard drive, you need connect the device in advance.
Creating Restore Point

What is system restore point?

System Restore is a built-in feature in Windows that backs up computer state


(including system files, Windows Registry, local user profiles, and system
settings). When your system is running into issues, you can use System
Restore to recover system to earlier state.
There are many unexpected things that may lead to system crash like Virus
attacks, Ransomware, accidental deletion of system files, etc. Therefore, it is
essential to create system restore point in Windows 7.

System Restore was first introduced in Windows ME and it has been included
in all the following Windows operating systems.

How to create system restore point in Windows 7 with built-in tool?

By default, Windows will automatically create system restore point when new
software is installed, when new Windows updates installed, and when a driver
is installed. Besides, Windows 7 will create a system restore point
automatically if no other restore points exist in 7 days.

Of course, you can also manually create system restore point in Windows 7.
You can follow the steps below to ensure System Restore is enabled and
custom the settings.

1. Click Start > type “create a restore point” in the search box > click Create a
restore point to open the System Properties window.
2. Enable system restore: In Windows 7, C: drive protection is on by default.
If you also want to create restore point on other drives, you can turn the
protection on for the specific disk by clicking Configure.
You can specify what you like to protect and disk space used for system restore
points.

3. Create restore point: click the Create option.


4. A pop window will appear and you can type a description to help you identify
the restore point. Finally, click Create to confirm.

5. Once the process is completed, you will see the restore point was created
successfully message.

The restore points will be saved on the volume that you are protecting, so if the
volume is corrupted, the restore points will not work. If the disk free space on
the volume is too low for System Restore to operate, it will automatically
disable itself.

You can use Disk Cleanup to delete the previous restore points but the latest
one to free up some disk space.
How to create restore point in Windows 7 automatically?

If you are not content with the gap between restore points creation interval,
you can use Windows Task Scheduler to automatically create system restore
point on a scheduled time or event. For example, to create system restore point
in Windows 7 at startup:

1. Click Start > type Task Scheduler in the search box and hit Enter.


2. On the left panel, navigate to Task Scheduler
Library > Microsoft > Windows > SystemRestore.
3. Double click on the task named SR to edit it.

4. Under Triggers tab, you can click New to add a new trigger at Startup. Or


you can just click Edit to change the trigger.
5. Set the scheduled time to perform the task and click OK to confirm.
Now, a new system restore point will be created automatically at your preferred
schedule and intervals. If you ever need to change the frequency, you can just
modify this task in Task Scheduler.

How to restore Windows 7 to previous status with the restore point?

When your system gets corrupted or something else goes wrong, you can use
system restore point to restore the system to the previous good state. Two ways
are available. You can simply go to System Restore utility to make it. Or when
you cannot boot into Windows 7, you can go to Safe Mode to use restore
system.

Restore Windows 7 to previous status with System Restore utility:

1. Click Start > type “create a restore point” in the search box > click Create a
restore point to open the System Properties window. Click System
Restore option.
2. A window will appear and click Next to go to the next step.
3. It will list the recent restore points and the most recent restore point is
selected. You can click Show more restore points to see more. Choose the
restore point you need and click Next.
Note: If you are not sure whether the restore will cause some of your programs
to loss data, you can click Scan for affected programs to have a check.
4. Click Finish to start the restore.
Systerm restore in Safe mode:

1. At your computer startup (before showing the Windows logo), Press the F8
key repeatedly.

2. At Advanced Boot Options, select Safe Mode with Command Prompt.

3. Type:”rstrui.exe” without quotes and press Enter.

4. Then you can choose one of the available restore points to system restore
Windows 7 in Safe Mode.

If you cannot boot into Safe Mode, you can also use a system repair disc to
access System Restore to restore your computer.
Guarding Againts VIrus

What is a computer virus?

As defined by Malwarebytes Labs, a computer virus is “malware attached to


another program (such as a document), which can replicate and spread after
an initial execution on a target system where human interaction is required.
Many viruses are harmful and can destroy data, slow down system resources,
and log keystrokes.”

Most computer viruses target systems running Microsoft Windows. Macs, on


the other hand, enjoy a reputation as virus-proof super machines. In reality,
Macs are not inherently safer. There are more Windows users in the world than
Mac users and cybercriminals simply choose to write viruses for the operating
system (OS) with the largest amount of potential victims.
                       
Whatever OS you choose, Windows or Mac, don’t worry too much, because
viruses just aren’t a thing anymore. That may sound odd coming from a
cybersecurity company but hear us out.

Cybercriminals aren’t creating new viruses, instead they are focusing their
efforts on more sophisticated and lucrative threats. When people talk about
“getting a virus” on their computer, they usually mean some form of malware—
often a computer worm.

The terms “virus” and “malware” are often used interchangeably, but they’re
not the same thing. While a computer virus is a type of malware, not all
malware are computer viruses.

“Cybercriminals aren’t creating new viruses, instead they are focusing their
efforts on more sophisticated and lucrative threats. When people talk about
“getting a virus” on their computer, they usually mean some form of malware—
often a computer worm.”

The easiest way to differentiate computer viruses from other forms of malware
is to think about viruses in biological terms. Take the flu virus, for example.
The flu requires some kind of interaction between two people—like a hand
shake, a kiss, or touching something an infected person touched. Once the flu
virus gets inside a person’s system it attaches to healthy human cells, using
those cells to create more viral cells.
A computer virus works in much the same way:
1. A computer virus requires a host program.
2. A computer virus requires user action to transmit from one system to
another.
3. A computer virus attaches bits of its own malicious code to other files or
replaces files outright with copies of itself.

It’s that second virus trait that tends to confuse people. Viruses can’t spread
without some sort of action from a user, like opening up an infected Word
document. Worms, on the other hand, are able to spread across systems and
networks on their own, making them much more prevalent and dangerous.

Famously, the 2017 WannaCry ransomware worm spread around the world,


took down thousands of Windows systems, and raked in an appreciable
amount of untraceable Bitcoin ransom payments for the alleged North Korean
attackers.

Computer viruses don’t capture headlines like that—at least not anymore.

To recap, the bad guys aren’t focused on creating new viruses and most of the
really bad stuff is actually malware. Should we still take computer viruses
seriously? Definitely, yes.

Continuing the virus analogy, if a given population stops receiving vaccinations


for diseases thought to be eradicated, like the measles and polio, those
diseases can and do come back. Likewise, it’s important to be proactive about
cybersecurity and take some basic protective measures against computer
viruses. Otherwise, computer viruses could make a comeback.

With that said, let’s take a look at computer viruses under the microscope.

Computer virus examples

Sometimes to understand what something is, we have to examine what it isn’t.


Keeping that in mind, let’s play: Is It a Virus?

In the Is It a Virus game we’re going to take a look at examples of things people


on the Internet commonly believe to be a virus and explain why it is or isn’t.
What fun!

Is a Trojan a virus? Trojans can be viruses. A Trojan is a computer program


pretending to be something it’s not for the purposes of sneaking onto your
computer and delivering some sort of malware. To put it another way, if a virus
disguises itself then it’s a Trojan. A Trojan could be a seemingly benign file
downloaded off the web or a Word doc attached to an email. Think that movie
you downloaded from your favorite P2P sharing site is safe? What about that
“important” tax document from your accountant? Think twice, because they
could contain a virus.

Is a worm a virus? Worms are not viruses, though the terms are sometimes


used interchangeably. Even worse, the terms are sometimes used together in a
strange and contradictory word salad; i.e. a “worm virus malware.” It’s either a
worm or a virus, but it can’t be both, because worms and viruses refer to two
similar but different threats. As mentioned earlier, a virus needs a host system
to replicate and some sort of action from a user to spread from one system to
the next. A worm, conversely, doesn’t need a host system and is capable of
spreading across a network and any systems connected to the network without
user action. Once on a system, worms are known to drop malware (often
ransomware) or open a backdoor.

Is ransomware a virus? Ransomware can be a virus. Does the virus prevent


victims from accessing their system or personal files and demands ransom
payment in order to regain access à la ransomware? If so, then it’s a
ransomware virus. In fact, the very first ransomware was a virus (more on that
later). Nowadays, most ransomware comes as a result of computer worm,
capable of spreading from one system to the next and across networks without
user action (e.g. WannaCry).

Is a rootkit a virus? Rootkits are not viruses. A rootkit is a software package


designed to give attackers “root” access or admin access to a given system.
Crucially, rootkits cannot self-replicate and don’t spread across systems.

Is a software bug a virus? Software bugs are not viruses. Even though we


sometimes refer to a biological virus as a “bug” (e.g. “I caught a stomach bug”),
software bugs and viruses are not the same thing. A software bug refers to a
flaw or mistake in the computer code that a given software program is made up
of. Software bugs can cause programs to behave in ways the software
manufacturer never intended. The Y2K bug famously caused programs to
display the wrong date, because the programs could only manage dates
through the year 1999. After 1999 the year rolled over like the odometer on an
old car to 1900. While the Y2K bug was relatively harmless, some software
bugs can pose a serious threat to consumers. Cybercriminals can take
advantage of bugs in order to gain unauthorized access to a system for the
purposes of dropping malware, stealing private information, or opening up a
backdoor. This is known as an exploit.

Latest news on computer viruses

Scammers use old browser trick to create fake virus download


Our computers, ourselves: digital vs. biological security
What is the history of computer viruses?

Today’s malware authors owe a lot to the cybercriminals of yesteryear. All the
tactics and techniques employed by cybercriminals creating modern malware
were first seen in early viruses. Things like Trojans, ransomware, and
polymorphic code. These all came from early computer viruses. To understand
the threat landscape of today, we need to peer back through time and look at
the viruses of yesteryear.

1949, John von Neumann and “self-reproducing machines”


It was in those salad days of computing that mathematician, engineer, and
polymath John von Neumann delivered a lecture on the Theory and
Organization of Complicated Automata in which he first argued that computer
programs could “self-reproduce.” In an era where computers were the size of
houses, and programs were stored on mile-long punch tapes, Neumann’s ideas
must’ve sounded like something from a sci-fi pulp novel.

1982, The proto computer-virus


In 1982 a fifteen-year-old boy pranking his friends proved Neumann’s theory a
reality. Rich Skrenta’s Elk Cloner is widely regarded as the first proto-
computer virus (the term “computer virus” didn’t exist just yet). Elk Cloner
targeted Apple II computers, causing infected machines to display a poem from
Skrenta:

Elk Cloner: The program with a personality


It will get on all your disks
It will infiltrate your chips
Yes, it’s Cloner!

It will stick to you like glue


It will modify RAM too
Send in the Cloner!

Other notable firsts—Elk Cloner was the first virus to spread via detachable
storage media (it wrote itself to any floppy disk inserted into the computer). For
many years to come, that’s how viruses travelled across systems—via infected
floppy disk passed from user to user.

1984, Computer virus, defined


In 1984 computer scientist Fred Cohen handed in his graduate thesis
paper, Computer Viruses – Theory and Experiments in which he coined the term
“computer virus,” which is great because “complicated self-reproducing
automata” is a real mouthful. In the same paper, Cohen also gave us our first
definition of “computer virus” as “a program that can ‘infect’ other programs by
modifying them to include a possibly evolved copy of itself.”
1984, Core War
Up to this point, most talk about computer viruses happened only in the
rarified air of college campuses and research labs. But a 1984 Scientific
American article let the virus out of the lab. In the piece, author and computer
scientist A.K. Dewdney shared the details of an exciting new computer game of
his creation called Core War. In the game, computer programs vie for control of
a virtual computer. The game was essentially a battle arena where computer
programmers could pit their viral creations against each other. For two dollars
Dewdney would send detailed instructions for setting up your own Core War
battles within the confines of a virtual computer. What would happen if a battle
program was taken out of the virtual computer and placed on a real computer
system? In a follow-up article for Scientific American, Dewdney shared a letter
from two Italian readers who were inspired by their experience with Core War
to create a real virus on the Apple II. It’s not a stretch to think other readers
were similarly inspired.

1986, the first PC virus


The Brain virus was the first to target Microsoft’s text-based Windows
precursor, MS-DOS. The brainchild of Pakistani brothers and software
engineers, Basit and Amjad Farooq, Brain acted like an early form of copyright
protection, stopping people from pirating their heart monitoring software. If the
target system contained a pirated version of the brother’s software, the “victim”
would receive the on-screen message, “WELCOME TO THE DUNGEON . . .
CONTACT US FOR VACCINATION” along with the brothers’ names, phone
number, and business address in Pakistan. Other than guilt tripping victims in
to paying for their pirated software, Brain had no harmful effects.

Speaking with F-Secure, Basit called Brain a “very friendly virus.” Amjad added
that today’s viruses, the descendants of Brain, are “a purely criminal act.”

1986, Viruses go into stealth mode


Also in 1986, the BHP virus was the first to target the Commodore 64
computer. Infected computers displayed a text message with the names of the
multiple hackers who created the virus—the digital equivalent of scrawling
“(your name) was here” on the side of a building. BHP also has the distinction
of being the first stealth virus; that is, a virus that avoids detection by hiding
the changes it makes to a target system and its files.

1988, Computer virus of the year


1988, one could argue, was the year computer viruses went mainstream. In
September of that year, a story on computer viruses appeared on the cover
of TIME magazine. The cover image depicted viruses as cute, googly eyed
cartoon insects crawling all over a desktop computer. Up to this point,
computer viruses were relatively harmless. Yes, they were annoying, but not
destructive. So how did computer viruses go from nuisance threat to system
destroying plague?
“Viruses were all about peace and love—until they started crashing people’s
computers.”

1988, A message of peace goes haywire


Viruses were all about peace and love—until they started crashing people’s
computers. The MacMag virus caused infected Macs to display an onscreen
message on March 2, 1988:

How do I prevent computer viruses?

Preventing computer viruses from infecting your computer starts with


situational awareness.
“Situational awareness is something law enforcement and militaries have
practiced for decades. It refers to a police officer or a soldier’s ability to perceive
threats and make the best decision possible in a potentially stressful
situation,” said Malwarebytes Head of Security, John Donovan.

“As it applies to cybersecurity, situational awareness is your first line of


defense against cyberthreats. By staying on the lookout for phishing attacks
and avoiding suspicious links and attachments, consumers can largely avoid
most malware threats.”

Regarding email attachments and embedded links, even if the sender is


someone you know: viruses have been known to hijack Outlook contact lists on
infected computers and send virus laden attachments to friends, family and
coworkers, the Melissa virus being a perfect example.

If an email reads oddly, it’s probably a phishing scam or malspam. When in


doubt about the authenticity of an email, don’t be afraid to reach out to the
sender. A simple call or text message can save you a lot of trouble.

Next, invest in good cybersecurity software. We’ve made a distinction between


computer viruses and malware, which now begs the question, “Do I need
antivirus software or anti-malware software?” We’ve covered this topic before in
great detail so checkout our article on antivirus vs. anti-malware. For now,
though, here’s a quick gloss on the subject.

Antivirus (AV) refers to early forms of cybersecurity software focused on


stopping computer viruses. Just viruses. Anti-malware refers to all-
encompassing threat protection designed to stop old-fashioned viruses as well
as today’s malware threats. Given a choice between traditional AV with limited
threat detection technology and modern anti-malware with all the bells and
whistles, invest in anti-malware and rest easy at night.

As mentioned previously in this piece, traditional AV solutions rely on


signature-based detection. AV scans your computer and compares each and
every file against a database of known viruses that functions a lot like a
criminal database. If there’s a signature match, the malicious file is thrown
into virus jail before it can cause any damage.

The problem with signature-based detection is that it can’t stop what’s known
as a zero-day virus; that is, a virus that cybersecurity researchers have never
seen before and for which there is no criminal profile. Until the zero-day virus
is added to the database, traditional AV can’t detect it.

Malwarebytes’ Multi-Vector Protection, conversely, combines several forms of


threat detection technology into one malware crushing machine. Amongst
these many layers of protection, Malwarebytes uses what’s called heuristic
analysis to look for telltale malicious behavior from any given program. If it
looks like a virus and behaves like a virus, then it’s probably a virus.

How do I remove computer viruses?

Going back to our virus analogy one final time—removing a virus from your
body requires a healthy immune system. Same for your computer. A good anti-
malware program is like having a healthy immune system. As your immune
system moves through your body looking for and killing off invading viral cells,
anti-malware scans for files and malicious code that don’t belong on your
system and gets rid of them.

The free version of Malwarebytes is a good place to start if you know or suspect
your computer has a virus. Available for Windows and Mac, the free version of
Malwarebytes will scan for malware infections and clean them up after the fact.
Get a free premium trial of Malwarebytes for Windows or Malwarebytes for
Mac to stop infections before they start.
SELF-CHECK 2.1-8
A. ENUMERATION: List down the Create your data backup strategy: A
comprehensive guide

1.

2.

3.

4.

5.

6.

B. ESSAY: Write the answer brief it.

1. What are operating Upadates?

2. What needs to be backed up?

3. What is a computer virus?


TASK SHEET 2.1-8
Preventive Maintenance of Computer

System and Network


Performance Objective: given necessary tools,equipment and materials,

you should be able to Preventive Maintenance of Computer System and


Network ff. Standard operating procedures within 1 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Steps to create a backup system image


1. Open the Control Panel (easiest way is to search for it or ask Cortana).
2. Click System and Security
3. Click Backup and Restore (Windows 7 & Window 2008 R2
4. Click Create a system image in the left panel
5. You have options for where you want to save the backup image: external
hard drive or DVDs. I suggest the former, even if your computer has a DVD-RW
drive, so connect your external drive to your PC, select On a hard disk and
click Next.
6. Click the Start backup button.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-8

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Open the Control Panel (easiest way is to search for it or ask Cortana).

Click System and Security

Click Backup and Restore (Windows 7 & Window 2008 R2)

Click Create a system image in the left panel

You have options for where you want to save the backup image:
external hard drive or DVDs. I suggest the former, even if your
computer has a DVD-RW drive, so connect your external drive to your
PC, select On a hard disk and click Next.

Click the Start backup button.


 LEARNING OUTCOME NO.2

 Maintain Computer Systems and Networks

LESSON CONTENT: Cleaning Computer Systems and Networks

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line


with standard procedures.
2. Normal function of computer systems and networks are
checked in accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance
with manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in
accordance with established procedures.
5. Unplanned events or conditions are responded to in
accordance with established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 2.1-9

Cleaning Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Cleaning Computer Systems and Networks

2. Determine the Cleaning Computer Systems and Networks

How to Clean Common Computer Parts and Devices

From dusty computer fans to fingerprints on compact discs, computer


parts and devices can get awfully dirty. Here are some tips to help keep
things clean.
From dusty computer fans to fingerprints on compact discs, computer parts
and devices can get awfully dirty from normal everyday use or when left sitting
unused. The best way to have any  computer component cleaned is to have it
professionally serviced, but if you no longer have a service warranty, or if you
picked up a second-hand item and want to clean it to see if it even works, here
are some tips on how to clean some common items.
General Precautions
When working around electronics there are some precautions you should
always take when cleaning:
 The best way to clean any computer component or device is to follow the
manufacturer's instructions in your user manual.
 Always power off the system first
 Always use anti-static wristband or other professional grounding devices
 Never work on carpeted surfaces
 Never spray cleaning fluids directly onto computer components. Always
spray the cleaner onto a cloth then wipe
 Do not allow any cleaner to run or drip near circuit boards, or near
seams on device casings.
 Never allow circuits or electronics to become damp or wet.
 Some cleaning solvents can damage components. In most cases, water
will work just as well.
 Cleaning electronics and circuit boards requires experience, knowledge
and special electronics cleaners. This type of cleaning is best left to
professionals.
General Cleaning Tricks & Tips
 If compressed air is too strong for little dust jobs, try using a plastic
liquid medicine plunger style dispenser. Pull the plunger all the way back to fill
it with air and then push it forward quickly for a quick output of air to blow
away dust in small places such as USB ports or SD memory card slots. The
small ends of these dispensers enable you to reach a more concentrated area
with the air then you could get with just blowing our air yourself (from your
mouth).
 When using compressed air, always release in short blasts. Longer blasts
can actually result in condensation.
 Anti-static cloths are great for attracting dust and are safe to use around
computer equipment.
 The cleaner you keep your work space, the cleaner your equipment will
be
 Be sure to hang on to your user manuals as they provide you with the
best cleaning methods for that particular device.

Why clean your computer?


Cleaning your computer’s hardware and software is important for a lot of
reasons.
Clean hardware can help your computer run more smoothly and extend your
computer’s lifespan, which can save time and money. Regular cleaning protects
your investment and your data. When you wipe off the screen and empty
crumbs from your keyboard, you’re helping your equipment perform better and
you reduce the risk it will break down.
Dust and other unwanted dirt can build up and suffocate your PC’s hardware.
By regularly cleaning dust out of the fan vents and case, you can help protect
the system from overheating and causing permanent damage to the internal
parts of your computer and the information you store on it.
How often does it need to be done? If you don’t want to hurt your PC’s
performance and lifespan with the added stress and heat, give it a good
cleaning at least every six month to a year.
While the average user’s computer lasts several years, true cleaning of
hardware and software could extend your PC’s useful life by a few more years.
Clean software helps protect your data. Antivirus software and regular program
updates help ensure viruses, malware, and cybercriminals stay out of your
system.
When you back up your files, delete unused programs, and perform
maintenance tasks like defragmenting the hard drive, you help to ensure your
computer can save your files without accidentally corrupting them.
You probably like a tidy home. It’s a good idea to keep your computer tidy, too.
For instance, using an external hard drive or cloud-based storage can declutter
your computer while helping to keep valuable data safe and secure.

Cleaning the keyboard

Dust, food, liquid, and other particles can get stuck underneath the keys on
your keyboard, which can prevent it from working properly. The basic cleaning
tips below can help keep your keyboard clean.

1. Unplug the keyboard from the USB or PS/2 port. If the keyboard


is plugged into the PS/2 port, you will need to shut down the
computer before unplugging it.
2. Turn the keyboard upside down and gently shake it to remove dirt
and dust.
3. Use a can of compressed air to clean between the keys.

4. Moisten a cotton cloth or paper towel with rubbing alcohol and


use it to clean the tops of the keys. Do not pour alcohol or any
other liquid directly onto the keys.
5. Reconnect the keyboard to the computer once it is dry. If you are
connecting it to a PS/2 port, you will need to connect
it before turning on the computer.

Dealing with liquids

If you spill liquid on the keyboard, quickly shut down the computer and
disconnect the keyboard. Then turn the keyboard upside down and allow the
liquid to drain.

If the liquid is sticky, you will need to hold the keyboard on its side under
running water to rinse away the sticky liquid. Then turn the keyboard upside
down to drain for two days before reconnecting it. Please note that keyboard
may not be fixable at this point, but the method above is probably the best
option.

To prevent this situation altogether, we recommend keeping drinks away from


the computer area.

Cleaning the mouse

There are two main mouse types: optical and mechanical. Each is cleaned in


basically the same way, although the mechanical mouse requires a bit more
work.

 Optical mice require no internal cleaning because they do not


contain any rotating parts; however, they can get sticky over time
as dust collects near the light emitter. This can cause erratic
cursor movement or prevent the mouse from working properly.
 Mechanical mice are especially susceptible
to dust and particles that can accumulate inside the mouse,
which can make it difficult to track—or move—properly. If the
mouse pointer does not move smoothly, the mouse may need to be
cleaned.

The basic cleaning tips below will help keep your mouse clean:

1. Unplug the mouse from the USB or PS/2 port. If the mouse is


plugged into the PS/2 port, you will need to shut down the
computer before unplugging it.
2. Moisten a cotton cloth with rubbing alcohol, and use it to clean
the top and bottom of the mouse.
3. If you have a mechanical mouse, remove the tracking ball by
turning the ball-cover ring counter-clockwise. Then clean the
tracking ball and the inside of the mouse with a cotton
cloth moistened with rubbing alcohol.
4. Allow all of the parts to dry before reassembling and
reconnecting the mouse. If you are connecting it to a PS/2 port,
you will need to connect it before turning on the computer.

If you just want to give the mouse a quick cleaning, place it on a clean sheet
of paper and move the mouse back and forth. Some of the dust and particles
should rub off onto the paper.

Cleaning the monitor

Dirt, fingerprints, and dust can make your computer screen difficult to read;
however, it's easy to clean your screen when needed. There are monitor-
cleaning kits you can buy, but they may damage your monitor if they're
designed for a different type of monitor. For example, a monitor cleaner that is
designed for glass screens may not work with some non-glass LCD screens.
The safest method is simply to use a soft clean cloth moistened with water.

Do not use glass cleaner to clean a monitor. Many screens have anti-glare
coatings that can be damaged by glass cleaner.

1. Turn off the computer.


2. Unplug the monitor from the power. If you are using a laptop,
unplug the laptop.
3. Use a soft clean cloth moistened with water to wipe the screen
clean.
Do not spray any liquids directly onto the screen. The liquid could leak into the
monitor and damage the internal components.

Tips for cleaning other computer surfaces

From time to time, you should clean your computer case and the sides and
back of the monitor to avoid a buildup of dust and dirt. Here are a few tips you
can use when cleaning these surfaces.

1. Dust is your computer's main enemy. Use an anti-


static cloth to lightly dust your computer casing. Do not use
furniture cleaners or strong solvents.

2. Use a can of compressed air to blow out debris from the air
intake slots.
3. Ammonia diluted with water—or glass cleaner comprised
mostly of ammonia and water—is a safe cleaning solution
for computer surfaces. The milder the solution, the better.
4. Clean the monitor housing and case (but not the monitor
screen) by spraying a safe cleaning solution onto a paper towel or
anti-static cloth and wiping in a downward motion.
Keep it cool

Don't restrict airflow around your computer. A computer can generate a lot of


heat, so the casing has fans that keep it from overheating. Avoid stacking
papers, books, and other items around your computer.

Many computer desks have an enclosed compartment for the computer case.


If you have this type of desk, you may want to position the case so it is not
against the back side of the desk. If the compartment has a door, you may
want to leave it open to improve airflow.

Protecting your computer

Your computer faces many potential threats, including viruses, malware,


and hard drive failure. This is why it's important to do everything you can to
protect your computer and your files.

Safeguarding against malware

Malware is any type of software that is designed to damage your computer or


gain unauthorized access to your personal information. It
includes viruses, worms, Trojan horses, and spyware. Most malware is
distributed over the Internet and is often bundled with other software.

The best way to guard against malware is to install antivirus software, such


as Bitdefender, Norton, or Kaspersky. Antivirus software helps
to prevent malware from being installed, and it can also remove malware from
your computer.
It's also important to stay smart when you're browsing the Web or using email.
If a website or email attachment looks suspicious, trust your instincts. Keep in
mind that your antivirus program may not catch everything, so it's best to
avoid downloading anything that might contain malware.

Backing up your computer

Imagine what would happen if your computer suddenly stopped working.


Would you lose any important documents, photos, or other files? It may be
possible to repair your computer, but your files may be lost forever. Luckily,
you can prevent this by creating backup copies of all of your files (or just the
important ones) on an external hard drive or an online backup service.
External hard drives

You can purchase an external hard drive and copy the contents of your
computer to it. The initial backup could take several hours, so you will need
to select a period of time when you do not need access to your computer.
Running the backup overnight usually works best. Follow-up backups should
be conducted on a regular basis, but they should not take as long.

One drawback is that an external hard drive can be lost, damaged, or stolen—
just as your computer might be. This is why it's important to keep your drive in
a secure location when not in use.

Online backup services

You can also back up your files to an online backup


service like Mozy, Carbonite, or Box. These services will back up your your
files in the cloud, which means you'll be able to recover them from any
computer with an Internet connection. The amount of storage provided by
these sites varies, and you will probably need to pay a fee for adequate storage
space.

One drawback to online backup services is that the initial backup can be


slow and may even take days to upload if you have a lot of files. However,
subsequent backups should not take as long.

Other maintenance techniques


To keep your computer running smoothly, it's important to keep files and
folders uncluttered. Cluttered or unorganized folders make it more difficult to
find the files you need. Additionally, unwanted files can eventually fill up
your hard drive, which will make your computer slower and more difficult to
use. Here are a few things you can do to delete unwanted files and improve
your computer's performance.

 Delete files: If you have any unwanted files, you can delete them
manually. To do this, drag them to the Recycle Bin or Trash,
then empty it to permanently delete the files.
 Run the Disk Defragmenter: Windows includes a Disk
Defragmenter program in the Control Panel. If your computer is
running slowly, running Disk Defragmenter can help to speed it
up.

 Run a Disk Cleanup: Windows also includes a Disk


Cleanup program in the Control Panel. It scans your computer
for temporary files and other files that can be deleted. You can
then delete the files to free up space on your hard drive.
Creating a safe workspace

In addition to keeping your computer healthy, it's important to think


about your own health. Using a computer involves a lot of repetitive motions
such as typing and using the mouse. Over time, these motions can begin to
negatively impact your body, especially your wrists, neck, and back. Staring at
a monitor for long periods of time can also cause eye strain. To minimize these
risks, you should take a few moments to make sure your workspace is
arranged in a comfortable and healthy way.

Avoiding Strain and Injury

Computer ergonomics is the science of equipment design and how specific


equipment usage and placement can reduce a user's discomfort and increase
productivity. Some equipment is designed with special attention to ergonomics,
like ergonomic keyboards and ergonomic chairs.

Here are a few tips to help you avoid injury in your workspace.
 Adjust your chair: Make sure your chair is adjusted to allow you
to sit in a natural, comfortable position. Many office chairs are
specially designed to support the lower back and promote good
posture.
 Keep the keyboard at a comfortable height: Try to place the
keyboard in a position that allows you to keep your wrists straight
and relaxed to avoid wrist strain. Many desks have a keyboard
tray that can keep the keyboard at a better height. You can also
buy an ergonomic keyboard that is designed to minimize wrist
strain.

 Keep the mouse close to the keyboard: If possible, place the


mouse right next to the keyboard. If the mouse is too far away, it
may be uncomfortable or awkward to reach for it.
 Place the monitor at a comfortable distance: The ideal position
for a monitor is 20 to 40 inches away from your eyes. It should
also be at eye level or slightly lower.
 Avoid clutter: The computer area can quickly
become cluttered with paper, computer accessories, and other
items. By keeping this area as uncluttered as possible, you can
improve your productivity and prevent strain and injury.
 Take frequent breaks: It's important to take breaks while you're
working at your computer. To avoid eye strain, you should look
away from the monitor every once in a while. You can also stand
up and walk around to avoid sitting in the same position for long
periods of time. Programs such as Workrave can automatically
remind you to take breaks.
SELF-CHECK 2.1-9

A. ENUMERATION: Write the tips for cleaning other computer surfaces

1.

2.

3.

4.

5.

6.

B. ESSAY: Write the answer brief it.


1. How to Clean Common Computer Parts and Devices?

2. Why clean your computer?

3. What is the basic cleaning tips below can help keep your keyboard clean?

4. What is the basic cleaning tips below will help keep your mouse clean

5.What is a cleaning the monitor?


TASK SHEET 2.1-9
Cleaning Computer Systems and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to Cleaning Computer Systems and Networks and Network
ff. Standard operating procedures within 3 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

How to clean your computer, Step 1: Hardware

1. Wipe down your computer.


2. Clean Your keyboard.
3. Blow dust buildup out of computer vents, fans and accessories.
4. Run check disk tool.
5. Check surge protector.
6. Keep PC ventilated.
7. Back up your hard drives.
8. Get antivirus software to protect from malware.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 2.1-9

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Wipe down your computer

Clean Your keyboard

Blow dust buildup out of computer vents, fans and accessories

Run check disk tool


Check surge protector

Keep PC ventilated

Back up your hard drives

Get antivirus software to protect from malware

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO.3

 Diagnose Faults of Computer Systems and Networks


LESSON CONTENT: Diagnostic Procedures

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in accordance
with established procedures.
5. Unplanned events or conditions are responded to in accordance with
established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 3.1-1

Diagnostic Procedures
LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. IDentify the Diagnostic Procedures

2. Determine the Diagnostic Procedures

A Diagnostic Program (also known as a Test Mode) is an automatic computer


program sequence that determines the operational status within the software,
hardware, or any combination thereof in a component, a system, or a network
of systems. Diagnostic programs ideally provide the user with guidance
regarding any issues or problems found during its operation.
Diagnostics programs may be simple or complex, operating unknowingly within
everyday devices or awaiting their invocation to make more complex
performance assessments. Everyday examples are a microwave oven that
displays code F6 to warn of a shorted temperature probe[1] or a garage door
opener that flashes its control board's LED four times warning of critically
misaligned safety sensors and impending shutdown.[2]
Diagnostic programs are also inserted into consumer electronic products
and electronic games. Sometimes if the owner of an electronic device asks the
manufacturer how to access the hidden diagnostic program, they may reply to
the consumer saying that the information is considered to be "proprietary" and
cannot be shared.

Taking a systematic approach to troubleshooting PC issues will save you


time and frustration and get your clients back to work more quickly.

It's a given: PCs go south and do so often. Whether it's hardware, software, or
user error, there will always be something in the way of that PC running
smoothly. Problem is, there are so many things that can go wrong, it's often
difficult to know where to start to simply discover the problem.

I do a lot of remote support, so I've had to learn many ways to troubleshoot a


sick PC without the luxury of being in front of the patient. Of course, there are
countless routes to take with this process, but I thought I'd share the steps I
like to follow. These are not your standard "Run your antivirus" or "Defrag the
drive" approaches, either. This is the method I follow from the beginning of the
phone call to the client.

1: Describe the problem


The first thing I have the client do is describe the problem. Before jumping onto
the PC, I gather as much information as possible. This means having the client
describe what is happening, when it started happening, and whether there was
any particular incident that coincided with the problem starting. Many times,
this information gathering will lead you directly to the solution. Sometimes, the
information gathering will lead you to realize a reboot is all that is necessary to
solve the problem.

2: Define the affected subsystem


There are instances when a problem is isolated to a specific subsystem of a
machine -- such as printing. Although you might think this a no-brainer, many
end users will call saying, "My computer isn't working," when in reality what
they mean is, "My printer isn't printing." In some cases, multiple subsystems
might be affected, such as printing and mapped network drives... you can see
where this is leading. If multiple subsystems are having issues, the
combination of those will often lead you directly to a solution.

3: Is it hardware or software?
If a client describes an issue such as a slow PC, one of the first things I do is
check out the hardware. Is there enough RAM? Is there enough free space on
the C drive? And if the problem is network related, are the lights on the
network card blinking, on, or dark? If these don't highlight an issue, don't
immediately assume the issue is software related --there could be hard drive
issues. But before you dig deeper into hardware issues, this would be a good
jumping point for software. If nothing becomes apparent after you've
investigated software issues, come back to hardware and do a drive test or
defrag.

4: Diagnose printing woes


Printers can be tricky. But there are ways to make this troubleshooting job a
bit easier. First, find out what type of printer you are dealing with. If the printer
is a networked printer, make sure the network is actually up. If it is, ask
whether other machines can print to the printer in question. If they can, check
to see whether any jobs are stuck in the machine's printer queue. If you open
up the Printers And Devices window and the printer is not listed, find out if it
just recently disappeared. If it did, the driver most likely is corrupt and will
need to removed from within Regedit. If the printer is still listed and no jobs are
in the queue, have the client restart the machine and then try to print. A good
restart will cure a host of woes in Windows.

5: Deal with networking trauma


Can the client see the internal servers? If not, can they open their browser and
see google.com? If not, this becomes a challenge, as you can't do remote
troubleshooting. But never fear, help is near. I start by walking the client
through rebooting the machine and starting in safe mode. Usually, if there isn't
an actual hardware issue, safe mode will circumvent the nasties that are
keeping the machine from getting online. Once in safe mode, let the fun begin!

Of course, if no one can get online, the first thing to be done is power cycling
the router/modem/switch hardware. If that fails, there is always DNS to
troubleshoot. But that gets beyond standard triage (as it will often lead you
away from the client machine and to a DNS server issue).

6: Resolve login issues


How often do you get this one: "Where's my password?" A client calls in to say
they can't log into their computer. Have they forgotten their password? Is the
machine on a domain? If it's on a domain, is the machine online? There are so
many problems with this one, it's hard to know where to start. But here's the
first thing you should do: If the client is on a domain and you have access to
their Active Directory server, try to log onto that server with their credentials. If
you can do that, the issue has been narrowed down to either their network
connection or the manner in which they are logging in. If they are to be logging
in to a domain, make sure they are doing so at their computer and not logging
in to the local machine.

7: Troubleshoot specific software


Sometimes, it will boil down to a single piece of software that's giving the user
fits. This, in turn, can give the support technician fits (especially if it's a niche
piece of software). The first thing I would do is double-check to make sure the
issue is, in fact, isolated to one particular piece of software. If the problem is
network related and all other applications can get online, the issue is most
likely isolated to that one piece of software. If so, and the software depends
upon a network connection, make sure neither the firewall or the antivirus
software has started blocking the software from getting packets in or out. When
I discover the problem is isolated to a single piece of software, often a repair
install will solve the issue.
8: Look for virus issues
I find that 50 percent of support calls wind up being viruses. Since viruses
cause all sorts of differing behavior, how can you quickly determine whether
the issue is a virus? I know support techs who have spent hours trying to track
down a virus on a machine that wasn't actually infected. There are a few
questions I like to ask. The first is "What behavior is your computer displaying
that makes you believe it has a virus?" The answer to that question will dictate
where you go from there. Other questions to ask are:

 Did your computer recently show signs of drastic slowdown?


 Are strange or unwanted popup windows appearing at random times?
 Were you recently on a Web site you don't normally visit?
 Did someone else use your machine?
 Did you recently open an email attachment?
 Has a strange security window recently started popping up?
The above questions will help guide you in the right direction to help cure a
possibly infected PC.

9: Ask for a demonstration


If a discussion about the issue brings up nothing and you can remote into the
user's PC, it will do you a world of good to see the problem in action. This is
especially true when the issue is unique to a client's PC, network, or software.
Although the majority of issues can be figured out from description, some
issues simply need to be viewed in action. Have the client reproduce the error
for you. Make sure the error happens in the same way every time. With this
visual reproduction, you will have confirmation that there is an issue, and
you'll have a definitive place with which to start your troubleshooting.

10: Use your tools


When all else fails, you have that outstanding collection of tools you can use to
throw at a machine. When this is the case, I tend to start with the most
innocuous software, such as Malwarebytes, and then go up from there. This is
a good time to run those hard drive diagnostic tools (should the issue possibly
point toward a faulty or degraded drive). This is the kitchen sink approach and
can sometimes lead to more issues. But when you've gone down every rabbit
hole you can think of, it might be your best shot.

Diagnostic Tools for Computers


POST

Your computer completes a Power On Self Test, or POST, every time you turn
on your computer. POST performs basic diagnostics on your computer’s
memory and hard drives, checks for the presence of a keyboard and mouse,
and tests the clock and other system settings. POST resides in a small,
permanent memory area called BIOS, which stands for Basic Input Output
System; this contains compact, simple programs the computer uses when you
first turn it on. If a problem exists with the computer’s hardware, POST
signals this through coded audio beeps. Though hardware makers have
produced different versions of POST over the years, they all ensure that the
computer works correctly before it starts the operating system.

Check Disk

The program “CHKDSK,” or Check Disk, is part of Microsoft’s Windows


software. It tests and repairs the file system information on hard drives. For
example, if you work on your computer during a storm, a sudden power
failure may shut your computer down immediately. Electrical noise from the
power line may write random data into hard drive files that were open as you
worked. This random data can corrupt the Windows file system, making files
unreadable. If Windows senses a problem with the file system, it runs Check
Disk automatically when you restart your computer; you can run it manually
from Windows Explorer or a command prompt. Check Disk scans the file
structure, looking for and reporting on problems. If you run it in “fix” mode --
“chkdsk /f” -- the program attempts to repair any damage it finds. Check
Disk is sophisticated and fixes file system problems for the vast majority of
cases.

Task Manager

The Windows operating system runs dozens of programs on your computer


and you will seldom notice them unless problems arise. These programs
monitor the state of your printer, network, mobile devices and other
hardware. If your computer becomes unusually sluggish, the cause may be
one of these programs running excessively. The Windows Task Manager
displays a list of all the programs running on your computer, along with the
amount of memory they consume and how active they are. To see the Task
Manager, press "Ctrl-Shift-Esc.” If a program in the Task Manager window
uses more than 20 percent of the computer’s CPU time for a prolonged period,
the program may be caught in an error state. To solve this problem, try
restarting the computer.
Windows Defender

If your PC has a malware infection, your computer’s performance suffers.


Malware may cause your Web browser to display unwanted pop-up ads and
you may experience other annoyances. The Windows operating system
includes a program called Windows Defender, which scans your hard drives
for viruses, spyware and other malicious programs. Windows Defender
reports on the problems it finds, isolates the malware and removes it.
Windows Defender uses a database of known malware, and the database is
continually updated by Microsoft so that the program catches even the newest
viruses.

Drivers

Your PC uses a variety of devices for data storage, communications, input and
display. Each of these has a program called a driver that carries data between
the hardware and Windows. Frequently, drivers have a diagnostic capability
that checks the device’s operation and troubleshoots problems. Windows
organizes these drivers in its Device Manager, which you can see by clicking
the Windows "Start" button, right-clicking “Computer,” selecting “Properties”
and clicking the “Device Manager.”

Techniques for Diagnosing Computer Systems

Computer Diagnosis
Sometimes when the
problem with a system is
not totally apparent and
the problem may be
intermittent, using a
basic common diagnostic
procedure may help
determine what is wrong.
This procedure has a
number of steps that, if followed each time, can be of help.

Rules in Diagnosing Computer Systems


1. Know the
facts
Educate oneself on all aspects and operation of
computer parts. Continuous learning on
computer technology.
2.Use your common sense

3.Focus on Field Replaceable Units


Identify the different types of FRU that can be used for
replacement or sub assembly.

4.Proper assembly and disassembly

5.Problem Isolation
Problem isolation is a detective work in which you need to determine
what is out of the ordinary by making detailed observation of what is
not working normally and record any information as you proceed. The
information you will be able to gather will help diagnose your
computer. You need to observe wisely. Look for any abnormalities in the
unit, any change in smell or foreign smell, listen to all the sounds, and
error codes.

6.Component Isolation
This section will aid in determining components in your system which
are failing. First, most systems have 3 major components; monitor,
system unit, and printers. Some have multiple external devices. To
troubleshoot, you need to isolate major components which are failing to
operate.

Factors Causing Computer

Failures and Defects People

ware
Untrained personnel would probably damage programs in PC.
Firmware
Programs or software burnt in chips may be corrupted.

Software
Corrupted operating systems would cause the system to fail.

Hardware
Defective hardware components would lead to
computer malfunction. Hardware conflicts and
viruses can hinder your computers performance.

ESD (Electro Static Discharge)


Electro static discharge can easily damage sensitive components in your
computer.

Electricity
Incoming supply from AC outlet must be regulated; power surges can
damage computer units

Things to Consider

There are many devices, parts, cords, and connections on a


computer, which means that there are many possible problems that
could arise. In addition, your computer uses a variety of software,
which can also cause problems. However, no matter what the
problem is, you can use the following tips to help you find a solution:
Always check the cables: Many computer problems are related to
an issue in the cables and connections. The easiest first step you can
take to troubleshoot most problems is to check all related cables and
connections.
Isolate the problem: If possible, try to isolate the problem. For
example, if you can't get the cursor to move on the screen, try to
determine if the issue is with the mouse. If you have an extra mouse,
you can alternate devices to see if the one plugged in is the issue, or
use the arrow keys on the keyboard to help determine if the mouse is
the source of the problem. When trying to isolate the problem, only
make one change at a time.

Take notes about error messages: If your computer gives you error
messages, be sure to write down as much information as possible. If
the basic troubleshooting steps don't work, you may need the
information.
Remember the steps you've taken, or write them down: Once you
start troubleshooting, you will want to remember what you have done,
so you don't repeat yourself. If you can't remember it, then write it
down. If you end up asking someone for help, it will be much easier if
they know exactly which steps you've taken.

Simple Solutions to Common Problems


Most of the time, problems can be fixed by using simple
troubleshooting techniques, such asclosing and re-opening the
program. It's important to try these simple solutions before
resorting to more extreme measures. If the problem still isn't
fixed, you can then try other troubleshooting techniques, such as
reinstalling the software.

Program Runs Slowly or Isn't Working Right


If a program is running slowly or otherwise isn't working right, the f irst
thing you should try is
closing the program and re-opening it.
You can also shut down your computer, wait a few seconds, and
boot it up again. Some minor problems will work themselves out
when you do this.
Check with the company for any known problems or updates to the
software.

Program is Completely Unresponsive


If a program has become completely unresponsive, you can press
(and hold) Control+Alt+Delete on your keyboard to open the Task
Manager . You can then select the program that isn't working and click
End Task. If you are using a Mac, you can press
Option+Command+Esc to open a similar dialog box.

Problems Starting or
Shutting Down the
Computer Power Button
Will Not Start Computer

If your computer does not start, begin by checking the power cord to
confirm that it is plugged securely into the back of the computer case
and the power outlet.
If it is plugged into an outlet, make sure it is a working outlet. Often,
this will require you to plug a lamp or other electrical device into the
outlet to make sure it is receiving power.
If the computer is plugged into a surge protector , verify that it is
turned on. You may have to it's possible that you could make the
situation worse, so it's best to consult a professional if you think a
drastic solution is needed

SELF-CHECK 3.1-1
A. ENUMERATION: Write a systematic approach to troubleshooting PC
issues will save you time and frustration and get your clients back to work
more quickly.

1. 6.

2. 7.

3. 8.

4. 9.

5. 10.
B. List down the rules in diagnosing computer systems

1. 4.

2. 5.

3. 6.

C. ESSAY: Write the answer brief it.

1. What is the diagnostic computer?

2.What is a problems starting


or shutting down the
computer power button will
not start computer?

TASK SHEET 3.1-1

Diagnostic Procedures
Performance Objective: given necessary tools,equipment and materials,

you should be able to diagnostic procedures ff. standard operating procedures


within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack


Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Steps to Diagnosis

1. Taking an appropriate history of symptoms and collecting relevant data.


2. Physical examination.
3. Generating a provisional and differential diagnosis.
4. Testing (ordering, reviewing, and acting on test results)
5. Reaching a final diagnosis.
6. Consultation (referral to seek clarification if indicated)

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-1

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation


Gather the necessary materrials and equipment

Taking an appropriate history of symptoms and collecting relevant data

Physical examination

Generating a provisional and differential diagnosis

Testing (ordering, reviewing, and acting on test results)

Reaching a final diagnosis

Consultation (referral to seek clarification if indicated)

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO.3

 Diagnose Faults of Computer Systems and Networks


 LESSON CONTENT: Identifying and Isolating
Faults/Problems
o Diagnostic Software Utilities
o Gathering of Information

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Normal function of computer systems and networks are checked in
accordance with manufacturer’s instructions.
3. Scheduled/periodic maintenance is performed in accordance with
manufacturer’s requirements.
4. Where necessary, needed repairs/replacements are made in accordance
with established procedures.
5. Unplanned events or conditions are responded to in accordance with
established procedures

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 3.1-2

Identifying and Isolating Faults/Problems


 Diagnostic Software Utilities
 Gathering of Information accomplish form
 Diagnostic Report
 Proposal Report

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Identifying and Isolating Faults/Problems

2. Determine the Identifying and Isolating Faults/Problems

Fault-Isolation Definitions
Filters

Determining the cause of a problem. Also known as "fault diagnosis," the term
may refer to hardware or software, but always deals with methods that can
isolate the component, device or software module causing the error. Fault
isolation may be part of hardware design at the circuit level all the way up to
the complete system. It is accomplished by building in test circuits and/or by
dividing operations into multiple regions or components that can be monitored
separately. After fault isolation is accomplished, parts can be replaced
manually or automatically (see fault tolerant).Fault Isolation vs. Fault
DetectionAlthough the terms "fault isolation" and "fault detection" are
sometimes used synonymously, fault detection means determining that a
problem has occurred, whereas fault isolation pinpoints the exact cause and
location.Built Into Normal OperationSoftware can also be created and run with
fault isolation in mind. Many techniques can be used. For example, program
modules can be run in different address spaces to achieve separation. In
addition, generating intermediate output that can be examined as well as
recording operational steps in a log are ways to assist the troubleshooter to
manually determine which routine caused the application to stop working or
stop working properly.In a network, intelligent agents can be placed in various
nodes that continuously collect traffic statistics that are analyzed in real time
to detect and pinpoint the fault. See fault detection.
Problem Isolation

Troubleshooting requires that you find the root cause of the problem and then
fix it. The process to find the root cause begins with problem isolation. Problem
isolation moves you from the general ideas about a problem, to a specific idea
of what the problem is, as follows:

Before problem isolation: I have no idea, except for some general symptoms.
After problem isolation: I have an idea of what is not working, a comparison
to how it should be working, and I know on which devices it should be working
differently.
Isolate Computer Problems

The following are the fundamental rules in isolating computer problems.

• Approach the problem systematically: start at the beginning and walk


through the situation in a careful way. Remember it and apply it every time.

• Divide and conquer: This rue is the most powerful. Isolate the problem. In the
overall system, remove one software or hardware component after another,
until the problem is isolated to a small part of the whole system.

• Don’t overlook the obvious: ask simple questions. Is the computer plugged
in? Is it turned on? Is the monitor plugged in? Most problems are so simple
that we overlook them because we expect the problem to be difficult.

• Check the simple things first: it is more effective to first check the
components that are easiest to replace.

• Make no assumptions

• Write things down: keep noting down the symptoms. They will help you think
more clearly.

• Reboot and start over: This is an important rule. Fresh starts are good for us
and uncover events or steps that might have been overlooked.

• Keep your cool: In an emergency, protect the data and software by carefully
considering your options before acting, by not assuming data is lost even when
hard drive and floppy drive errors occur, and by taking practical precautions to
protect software and OS files.

• Don’t assume the worst:


• Know the starting point.

• A careful visual inspection should catch the following types of

Faults

 -Loose wires

- Broken wires

- Blown fuses

- Wrong switch settings

- Missing jumpers

- Loose connectors

- Burnt PCB track

- PCB track cut

- PCB track short

- Wrong insertion of connector/cable

- Cold solder joints

- Solder bridges

- Broken IC leads

When solving a computer problem, apply above rules and, prepare course of
action. The course of action involves the, following:

• Interact with the user.

• Isolate the problem by eliminating the unnecessary.

• Then follow established guidelines towards a solution

Utility Software is system software designed to help analyze, configure,


optimize or maintain a computer.
Utility software usually focuses on how the computer infrastructure (including
the computer hardware, operating system, software and data storage) operates.
Utility software, along with operating system software, is a type of system
software, distinguishing it from application software.
Utility Software

 Anti-virus utilities scan for computer viruses.


 Archivers output a stream or a single file when provided with a directory
or a set of files. Archive utilities, unlike archive suites, usually do not
include compression or encryption capabilities. Some archive utilities may
even have a separate un-archive utility for the reverse operation.
 Backup software can make copies of all information stored on a disk
and restore either the entire disk (e.g. in an event of disk failure) or
selected files (e.g. in an event of accidental deletion).
 Clipboard managers expand the clipboard functionality of an operating
system .
 Cryptographic utilities encrypt and decrypt streams and files.
 Data compression utilities output a shorter stream or a smaller file
when provided with a stream or file.
 Data synchronization utilities establish consistency among data from a
source to a target data storage and vice versa. There are several branches
of this type of utility:
o File synchronization utilities maintain consistency between two
sources. They may be used to create redundancy or backup copies
but are also used to help users carry their digital music, photos and
video in their mobile devices.
o Revision control utilities are intended to deal with situations
where more than one user attempts to simultaneously modify the
same file.
 Debuggers are used to test and “debug” other programs, mainly to solve
programming errors. Also utilized for reverse engineering of software or
systems.
 Disk checkers can scan operating hard drive.
 Disk cleaners can find files that are unnecessary to computer operation,
or take up considerable amounts of space. Disk cleaner helps the user to
decide what to delete when their hard disk is full.
 Disk compression utilities can transparently compress/uncompress the
contents of a disk, increasing the capacity of the disk.
 Disk defragmenters can detect computer files whose contents are
scattered across several locations on the hard disk, and move the
fragments to one location to increase efficiency.
 Disk partitions can divide an individual drive into multiple logical
drives, each with its own file system which can be mounted by the
operating system and treated as an individual drive.
 Disk space analyzers for the visualization of disk space usage by getting
the size for each folder (including sub folders) & files in folder or drive.
showing the distribution of the used space.
 Disk storage utilities
 File managers provide a convenient method of performing routine data
management tasks, such as deleting, renaming, cataloging, uncataloging,
moving, copying, merging, generating and modifying data sets.
 Hex editors directly modify the text or data of a file. These files could be
data or an actual program.
 Memory testers check for memory failures.
 Network utilities analyze the computer’s network connectivity,
configure network settings, check data transfer or log events.
 Package managers are used to configure, install or keep up to date other
software on a computer.
 Registry cleaners clean and optimize the Windows Registry by removing
old registry keys that are no longer in use.
 Screensavers were desired to prevent phosphor burn-in on CRT and
plasma computer monitors by blanking the screen or filling it with moving
images or patterns when the computer is not in use. Contemporary
screensavers are used primarily for entertainment or security.
 System monitors for monitoring resources and performance in a
computer system.
 System profilers provide detailed information about the software
installed and hardware attached to the computer.

Gathering Information about Your Computers

 One of the most valuable benefits of conducting an asset discovery project is


the large amount of data that is obtained about the client and server
computers on the network. When you start designing and planning your
isolation zones, you must make decisions that require accurate information
about the state of all hosts to ensure that they can use IPsec as planned.

Capture the following Information from each Computer

 Computer name. This name is the computer's NetBIOS or DNS name


that identifies the computer on the network. Because a computer can have
more than one media access control (MAC) or IP address, the computer's
name is one of the criteria that can be used to determine uniqueness on
the network. Because computer names can be duplicated under some
circumstances, the uniqueness should not be considered absolute.
 IP address for each network adapter. The IP address is the address
that is used with the subnet mask to identify a host on the network. An IP
address is not an effective way to identify an asset because it is often
subject to change.

 Operating system, service pack, and hotfix versions. The operating


system version is a key factor in determining the ability of a host to
communicate by using IPsec. It is also important to track the current state
of service packs and updates that might be installed, because these are
often used to determine that minimum security standards have been met.

 Domain membership. This information is used to determine whether a


computer can obtain IPsec policy from Active Directory or whether it must
use a local IPsec policy.

 Physical location. This information is just the location of the device in


your organization. It can be used to determine whether a device can
participate in a specific isolation group based on its location or the
location of the devices that it communicates with regularly.

 Hardware type or role. Some tools that perform host discovery can
provide this information by querying the hardware information and
running applications to determine its type, such as server, workstation, or
portable computer. You can use this information to determine the
appropriate IPsec policy to assign, whether a specific computer can
participate in isolation, and in which isolation group to include the
computer.

After collecting all this information and consolidating it into a database,


perform regular discovery efforts periodically to keep the information current.
You need the most complete and up-to-date picture of the managed hosts on
their networks to create a design that matches your organization's
requirements.

You can use various methods to gather data from the hosts on the network.
These methods range from high-end, fully automated systems to completely
manual data collection. Generally, the use of automated methods to gather
data is preferred over manual methods for reasons of speed and accuracy.

Automated Discovery

Using an automated auditing network management system such as Microsoft


System Center Configuration Manager (formerly known as Systems
Management Server) provides valuable information about the current state of
the IT infrastructure.
For more information about how System Center Configuration Manager 2007
can help perform automated information gathering,
see https://go.microsoft.com/fwlink/?linkid=110412.

Manual Discovery

The biggest difference between manual discovery methods and automated


methods is time.

You can use the Windows Script Host (WSH), VBScript, and Windows
Management Instrumentation (WMI) to create a script file that can collect the
system configuration information. VBScript and WMI are built-in to Windows
8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008,
and Windows Server 2008 R2. Starting with Windows Server 2008, Windows
PowerShell is included with the operating system. For more information, see
“Scripting with Windows PowerShell” (https://go.microsoft.com/fwlink/?
linkid=110413).

Whether you use an automatic, manual, or hybrid option to gather the


information, one of the biggest issues that can cause problems to the design is
capturing the changes between the original inventory scan and the point at
which the implementation is ready to start. After the first scan has been
completed, make support staff aware that all additional changes must be
recorded and the updates noted in the inventory.

This inventory will be critical for planning and implementing your Windows
Firewall with Advanced Security design.

How To Create A System Diagnostics Report In Windows 7

Your PC with Windows 7 is not running as it should? Or are you experiencing


slow downs or other errors regularly? Then it may be time to run a System
Diagnostics report in Windows 7 to find out why.

Windows 7 comes with several internal tools that can be used to diagnose the
computer system. One of them is the System Diagnostics Report which is part
of the Windows Control Panel.
Microsoft has hidden the tool deep inside the Control Panel which is why the
majority of users has probably never heard of the option before.

To run the system diagnostics report users need to open the Windows Control
Panel first. They can do that by clicking on the Start Orb and selected Control
Panel from the start menu. They then need to click on Performance Information
and Tools, and there on Advanced Tools in the left sidebar.

This opens a listing of tools to get additional performance and system


information. Locate the Generate a system health report link near the bottom
of the listing and click on it.
Windows will automatically start collecting data for 60 seconds to analyze the
data afterwards.
The report lists warnings at the top of the results window and test information
below that. Warnings can for instance remind the user that no antivirus
software is installed.

The Basic system checks group lists checks that have been performed by the
system diagnostics tool and how the system fared in the tests. Results are
shown for each test which should read passed for successful tests.
Users find here information about the system's average load, network
utilization or computer memory usage. Since this data is collected in the 60
seconds period it should be clear that users need to work normally on the
system during the test.

Lastly, there are loads and loads of in depth information about system
processes, services and other data that has been collected during the test
period. Some of the interesting information include files causing most disk IOs,
the processes that were using the most RAM memory or the IPs with the most
inbound or outbound traffic.

The System Diagnostics Report (or System Health Report) can help users find
problems quickly. It should be used as one of the first tools to analyze the
operating system.
NETWORK DESIGN PROPOSAL

FEASIBILITY STUDY
 

Situation in which the Project Exists: This proposal is for a data


communication network to serve the Maryland public education system.
The Maryland legislature recently approved funding sufficient to pay for the
development of this proposal. Pending proposal acceptance by the Maryland
State Public Education Office of Technology (a department within the state
Office of Education), funding will be sought to implement the proposal.

Network Scope: The proposed network is designed to serve the state Office of
Education and two of its school district offices. The state office, located
in Kenzington, contains five departments to be served by this network. Each
district office contains four departments to be served. The North School
District is located in Ricksville, 25 miles from the state office. The South School
District is located in Albanton, about 40 miles from the state office. Note that
this network does not serve instructional needs of students; other resources
have been allocated for that purpose. This network is for administrative
purposes and is specifically designed to be independent of student computing
facilities.

Objectives of the Network. The network is designed to achieve several specific


business/operational objectives:

1.      Secure Service: The main objective of this network is to provide secure


administrative computing service to the State Office and two districts. It is
designed to be functionally and physically isolated from access by people
not employed by the Maryland public education system so as to minimize
the risk of unauthorized use.

2.      Integration and Update: Presently there are many LANs in


the Maryland public education system, but much of the equipment is out of
date, many of the LANs are incompatible with each other, and not
connected in a system-wide network. This proposal describes a WAN that
integrates and updates these LANs to support productive collaboration
across the system.

3.      Versatile Information Processing: The network will enable users to


retrieve, process, and store ASCII and non-ASCII text, still graphics, audio,
and video from any connected computer.

4.      Collaboration: The network will combine the power and capabilities of


diverse equipment across the state to provide a collaborative medium that
helps users combine their skills regardless of their physical location.  A
network for this educational community will enable people to share
information and ideas easily so they can work more efficiently and
productively.

5.      Scalability: The design is scaleable so that more district offices can be


added as funding becomes available without having to redo the installed
network.

Intended Users. The primary users of the network at the state level will be the
three administrators, three secretaries, ten members of the Curriculum
Department, eight members of the Human Resource Department, six members
of the Finance/Accounting Department, and three members of the Computer
Services Department.  At the district level the primary users will be four
administrators, four secretaries, four members of the Computer Services
Department, sixteen members of the Human Resource Department, and two
members of the Finance/Accounting Department.  Parents, pre-service
teachers, teachers, and the public are secondary users of the network in that
they will receive information produced on the network, but they will not directly
use the network.

Design Assumptions. This design assumes the following:

1.      The State Education Network has a firewall that protects all information
coming and going from the network.

2.      Internet service is provided by the State Education Network, which is


subsidized by the state government.

 
 

NETWORK NEEDS ANALYSIS


 

Data Types. The types of data served by the network will be reports, bulletins,
accounting information, personnel profiles, and web pages. The majority of the
data will be text (ASCII and non-ASCII), but there will be some still graphics
and possibly a small amount of voice and video (primarily for PC-based
teleconferencing).

Data Sources. Data will be created and used at all end stations on the
network. The data will be produced by software applications in Windows 2000,
primarily Dream Weaver and Office 2000 Professional (Word, Excel, Access,
PowerPoint, and Outlook). Other data sources to be supported on at least a
limited basis will Windows 2000 Accessories (Paint, Notepad, etc.), NetMeeting,
Media Player, and PhotoShop. Note that the network will be not be accessible
from outside…

Numbers of Users and Priority Levels. At the state level, the users will be
administrators, secretaries, and members of four departments.  At the district
levels, the users will be administrators, secretaries, and members of three
departments. The maximum estimated number of users on the network at any
given time is 100: 33 regular users in the State Office, 30 regular users in the
North District Office, 30 regular users in the South District Office, and seven
otherwise unanticipated users.

Three priority levels will be supported: management (top priority), user


(medium priority), and background (low priority). Note that these designations
do not correspond to administrative levels in the Maryland public education
system; rather, they are network service levels. Network management
processes will receive top-priority service; most network processes will receive
medium-priority service; a few processes (e.g., e-mail transfers, backup, etc.)
will be given low-priority service. It should be noted that network management
will usually consume a small amount of the available bandwidth; this means
that management and user processes will usually enjoy identical support.
Background processes will also usually receive more than adequate service,
but they will be delayed as needed to maintain support for management and
user services.

Transmission Speed Requirements. The network is to be transparent to the


users. Thus, remotely executed applications, file transfers, and so forth should
ideally appear to operate as quickly as processes executed within an end-
station. Interviews with users to ascertain their needs and expectations
indicate that an average throughput of 20 mbps per user within each LAN and
10 mbps per user between LANs will more than support the needed
performance in most cases (teleconferencing being the possible exception).

Load Variation Estimates. Interviews with users and observation of LAN use
at the three locations yielded data on hourly average and peak loads from
January to March, 2001. The data are tabulated in the appendix. The data
indicate that the highest average traffic volume will occur from 8:00
a.m. to 6:00 p.m., Monday through Friday.  The peak network traffic volume is
expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00 p.m.
to 5:00 p.m.  At night and on weekends the network traffic is minimal except
for the daily backups of the PCs to the LAN servers in the districts and several
batch data transfers anticipated from the districts to the State Office. The data
indicate the following network design parameters:
 
·        The average required throughput on any LAN during work hours (7:00
a.m. to 6:00 p.m.) will be only about 0.2 mbps.
·        The average required throughput on the WAN during work hours (7:00
a.m. to 6:00 p.m.) will be only 0.04 mbps.
·        The peak expected traffic load on any LAN will be about 10.4 mbps.
·        The peak expected traffic load on the WAN will be about 6.4 mbps.
 
Of course, to avoid user complaints, the network is designed for the peak traffic
loads, not the average throughput.
 

Storage Requirements. Storage requirements need to be large enough to store


all student, teacher, and state data (note: student data are data about
students, not data generated by students). Interviews and observations of
users’ present and anticipated storage requirements indicate that each user
will need an average of 100 MB of server space (in addition to secondary
storage on local PCs); the maximum estimated server-side storage requirement
per user is about 1 GB. Additionally, the network operating system will occupy
about 500 MB on each LAN server. Taking price-performance issues into
account, each PC will have a minimum storage capacity of 10 GB, each LAN
server will have a minimum storage capacity of 20 GB. A main data server in
the State Office will have a 36 GB capacity.

Reliability Requirements. In keeping with user expectations and industry


standards, both the LANs and the WAN are expected to operate at 99.9%
uptime and an undiscovered error rate of .001%.

Security Requirements. A firewall will be used so unauthorized users will be


restricted.  Part of the security will be Users accounts and passwords that will
give limited access.  There will be different access capabilities for network
managers and users.

Existing Network. There is no existing network.

 
HIGH-LEVEL NETWORK DESIGN

Top-Level Network Diagram


 

State Office Network Diagram


(LAN cabling is 100BaseT CAT5)

 
 
State Office Network Sub-Diagram
Administration LAN

 
State Office Network Sub-Diagram
Finance/Accounting LAN

State Office Network Sub-Diagram


Curriculum LAN

 
State Office Network Sub-Diagram
Human Resources LAN

State
Office
Network
Sub-
Diagram
Computer
Services
LAN

 
North District Network Diagram
(LAN cabling is 100BaseT CAT5)

North District Network Sub-


Diagram
Administration LAN

 
North District Network Sub-Diagram
Finance/Accounting & Computer
Services LAN

North District Network Sub-Diagram


Human Resources LAN

 
South District Network Diagram
(LAN cabling is 100BaseT CAT5)

South District Network Sub-


Diagram
Administration LAN

 
South District Network Sub-Diagram
Finance/Accounting & Computer
Services LAN

South District Network Sub-Diagram


Human Resources LAN

SELF-CHECK 3.1-1

A. ENUMERATION: Write a capture the following Information from each


computer
1.

2.

3.

4.

5.

6.

B. List down the NETWORK NEEDS ANALYSIS

1. 5.

2. 6.

3. 7.

4. 8.

C. List down Utilities Software

1. 6.

2. 7.
3. 8.

4. 9.

5. 10.

TASK SHEET 3.1-2

Identifying and Isolating Faults/Problems


Performance Objective: given necessary tools,equipment and materials,

you should be able to Identifying and Isolating Faults/Problems ff. standard


operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe


2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

1. Collect the Evidence. All the evidence collected must be


relevant to the problem in hand.
2. Analyse the Evidence.
3. Locate the Fault.
4. Determination and Removal of the Cause.
5. Rectification of the Fault.
6. Check the System.

Assessment Method:
Demonstration

PERFORMANCE CRITERIA CHECKLIST 3.1-2

CRITERIA YES NO

Did you……
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Collect the Evidence. All the evidence collected must be relevant to


the problem in hand
Analyse the Evidence

Locate the Fault
Determination and Removal of the Cause

Rectification of the Fault

Check the System

UNIT OF COMPETENCY: SET UP COMPUTER SERVERS

MODULE TITLE : SETTING UP COMPUTER SERVERS

MODULE DESCRIPTOR: This unit covers the knowledge, skills and


attitudes needed to set-up computer servers for LANs and SOHO systems. It
consists of competencies to set-up user access and configures network
services as well as to perform testing, documentation and pre-deployment
procedures.

 LEARNING OUTCOME NO.4

 Rectify/Correct Defects in Computer Systems and


Networks

LESSON CONTENT: Defects in Computer Systems and


Networks
ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Defective components or parts are replaced or corrected without damage to
the surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 4.1-1

Defects in Computer Systems and Networks


LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. IDentify the Defects in Computer Systems and Networks

2. Determine the Defects in Computer Systems and Networks

What are the Most Common Computer Network Problems ?

 Getting to grips with problems relating to your computer network can be a


frustrating affair, but it’s one which is likely to happen on a daily basis.

Computer networks are, after all, highly complex systems that comprise
various components and are in use by multiple users. These structures may
bring many benefits, but they can also be a recipe for disaster. And, if your
network fails or experiences any issues, then your organization’s productivity is
going to be affected.
Your main objective, with your computer network, should be to keep it online
and functioning correctly. But you can only do this if you know what the most
common computer network problems are, so let’s take a look:

 Slow Connectivity: If there’s one thing that frustrates an employee


then it’s slow connectivity over a network. PCs can grind to a halt and even
the simplest task can take an age to complete. It’s often caused by large file
transfers, so a limit should be put in place on the size that is permitted e.g.
no email attachments that total more than 20mb as a standard rule.
Sometimes this lag can also be caused by faulty network cards, so it’s
important to investigate this possibility. 
 IP Conflicts: Each PC on your network should have a unique IP
address such as 209.85.255.255, but sometimes two PCs can be assigned
the same IP address. And this can create major connectivity issues for both
parties. Sometimes these conflicts will work themselves out, but you can
help speed up the process. Restarting the router is the simplest approach as
it should assign new IP addresses to every PC on the network. 
 Unable to Connect to Local Printer: Printers on a network tend
to be shared by multiple users, but occasionally an error can arise that
leaves people unable to access the printer. This problem is often caused by
a sharing issue whereby different security settings between PCs and the
printers fail to agree with each other. When this occurs it’s recommended
that you check firewall settings and that your Windows network adapters
have printer sharing enabled. 

 Faulty Cables: A computer network relies on cables to facilitate its


connectivity. And when just one cable fails it can have massive
implications for your network. However, it’s easy to overlook cables as the
source of network issues. People tend to concentrate on software and
hardware troubleshooting first. Nonetheless, investigating the condition of
cables in the affected network area is vital. Cables can easily become
dislodged or damaged, so sometimes the fix can be as simple as plugging
them back in or replacing. 
 Weak Wi-Fi Signal: If you rely on wireless connections in your
organization then you will be well aware of the issues caused a weak signal.
This can often be caused by environmental issues such as the presence of a
microwave or even the layout of an office. It’s important to eliminate these
factors to identify the cause of the fault. Alternatively the connection issues
could be caused by out-dated firmware, so make sure all updates are
installed. 

Most Common Computer Problems


Although most complex computer issues at work can often be solved by the
business IT support team, there are many other small, but common, issues
that occur on a regular basis on a personal computer. The good news is that
many problems with computers have simple solutions, and learning to
recognise a problem and fix it yourself will save you a lot of time and money.
The following are the top 10 common computer problems that you shouldn’t
panic over.

1. The Computer Won’t Start


A computer that suddenly shuts off or has difficulty starting up could have a
failing power supply. Check that the computer is plugged into the power point
properly and, if that doesn’t work, test the power point with another working
device to confirm whether or not there is adequate power.

2. The Screen is Blank


If the computer is on but the screen is blank, there may be an issue with the
connection between the computer and the screen. First, check to see if the
monitor is plugged into a power point and that the connection between the
monitor and computer hard drive is secure. If the problem is on a laptop, then
you may need to get a professional to fix it as some of the internal wires may be
worn.

3. Abnormally Functioning Operating System or Software


If the operating system or other software is either unresponsive or is acting up,
then try restarting your computer and run a virus scan. To avoid having this
happen, install reliable anti-virus software.

4. Windows Won’t Boot


If you are having troubles booting Windows, then you may have to reinstall it
with the Windows recovery disk.

5. The Screen is Frozen


When you computer freezes, you may have no other option than to reboot and
risk losing any unsaved work. Freezes can be a sign of insufficient ram,
registry conflicts, corrupt or missing files, or spyware. Press and hold the
power button until the computer turns off, then restart it and get to work
cleaning up the system so that it doesn’t freeze again.

6. Computer is Slow
If your computer is slower than normal, you can often fix the problem simply
by cleaning the hard disk of unwanted files. You can also install a
firewall, anti-virus and anti-spyware tools, and schedule regular registry
scans. External hard drives are great storage solutions for overtaxed CPU’s,
and will help your computer run faster.
7. Strange Noises
A lot of noise coming from your computer is generally a sign of either hardware
malfunction or a noisy fan. Hard drives often make noise just before they fail,
so you may want to back up information just in case, and fans are very easy to
replace.

8. Slow Internet
To improve your Internet browser performance, you need to clear cookies and
Internet temporary files frequently. In the Windows search bar, type ‘%temp%’
and hit enter to open the temporary files folder.

9. Overheating
If a computer case lacks a sufficient cooling system, then the computer’s
components may start to generate excess heat during operation. To avoid your
computer burning itself out, turn it off and let it rest if it’s getting hot.
Additionally, you can check the fan to make sure it’s working properly.

10. Dropped Internet Connections


Dropped Internet connections can be very frustrating. Often the problem is
simple and may be caused by a bad cable or phone line, which is easy to fix.
More serious problems include viruses, a bad network card or modem, or a
problem with the driver.

Common Network Issues & Solutions : Solved


1.Computer Viruses

The Problem: Help! I think I have a virus on my network!

Network viruses can completely disable a computer network, so this is the first
issue we’re going to tackle. There can be a number of causes of computer
viruses. Viruses can come from a wide range of sources, such as e-mail
attachments, malicious software, online advertisements, and yes, even social
media. 

What are some signs of computer viruses? While remediating an infection on a


single computer can be daunting, removing a virus from an infected network is
a real challenge since it can hide on any computer. So, here’s how you can fix
it:

The Solution:

Step 1: Check the severity of the infection by running a complete network scan
to find malicious files or programs. Make sure that your antivirus and anti-
malware programs are up to date and able to scan hidden files, the root
directory, and all running programs. Also, try to have your antivirus/anti-
malware software scan your e-mail inbox for any malicious materials.

Step 2: Back up all of your system files using the necessary tools. Running a
complete system backup will ensure that your data isn’t lost and that the
network will remain stable. The Windows’ “System Restore” option will allow
you to set up a restoration that can often be useful in an emergency.

 Step 3: Confine all suspicious, irregular files. Isolating them will prevent their
exchanging with other files or your network system. Then, disinfect or
completely wipe all quarantined files.  Manually delete any emails that were
identified by your antivirus software.

2. Unable to Connect to the Internet

The Problem: The wireless network shows a signal, but my


device won’t connect

Using a wireless network is great for mobility, but can hinder your productivity
when it decides to malfunction. There are a few different reasons why your
wireless network is having connectivity issues, such as the wireless router or
the network card itself. This issue will require a bit of network troubleshooting
to find a solution, so let’s get to work:

The Solution:

Step 1: If your router won't connect to the internet, try putting your computer
or device right next to the router. If this causes your equipment to connect,
then the system hardware may have been the issue. If this didn’t fix the
problem, proceed to Step 2.

Step 2: Update the network card. Sometimes, your network card will receive a
strong signal, but won’t be able to transmit it quickly and effectively resulting
in the need for network troubleshooting. Updating the driver might solve the
problem entirely, but if it doesn’t, you might need to contact your IT
department or provider and consider replacing the hardware altogether.

3.Duplicated IP Address
The Problem: I got an error message that says that the IP
address is already in use.

A small error window just popped up on your screen saying that your IP
address is already in use. How is this even possible and what causes this IP
address conflict? Well, there are a few reasons why this can happen:

 Your system administrator could have assigned two computers on a local


area network (LAN) the same static IP address.
  Your internet service provider accidentally assigned two people the same
IP address.
 The network’s Dynamic Host Configuration Protocol (DHCP) server has
allowed the same dynamic address to be assigned to multiple computers
automatically.
 Your system administrator has assigned a static IP address to a
computer within the local network’s DHCP range, and the same address
is automatically given by the local DHCP server

These are just a few of the plethora of reasons why IP address conflicts take
place. Here are some ways to fix this issue:

The Solution:

Windows - If you have a dynamic IP address:

Step 1: Click the “Start” button and click “Run”. Enter “cmd” into the text box
and click “OK”. The Windows command prompt will open.

Step 2: Type “ipconfig/renew” into the command prompt and press “Enter”.
This will refresh your dynamic IP address.

Step 3: Check your network connection. Your computer will receive an


available IP address that isn’t already taken.

Windows – if you have a static IP address:

Step 1: Right click “Network Neighborhood” on your desktop. On Windows 7 or


Windows Vista, this will be labeled “Network”. Next, click “Properties”.

Step 2: Rick click onto your network card and click “Properties”. In most cases,
your network card will be labeled “Local area LAN Connection.”
Step 3: Select “TCP/IP” in the list and then, click the “Properties” button under
the list of options. Enter in a new IP address in the opened window. Click “OK”
to confirm the changes you’ve made.

Mac

Step 1: Click on “System Preferences” in your dock. Then, click on “Network”.

Step 2: Select “Wi-Fi” on the left side of the window. Then, click “Advanced”,
which is located on the bottom right.

Step 3: On the next page, select the “TCP/IP” tab and then click “Renew DHCP
Lease” on the right side of the window.

4. Slow Performance

Problem: My applications are responding very slowly.

Why is my computer so slow? Slow-running applications can put a damper on


your productivity in the workplace. One of the most common network issues
that business networks fight with is slow applications. This happens especially
when a computer first turns on or connects to a network. In most cases, this is
caused by heavy bandwidth usage. In other instances, it can be caused by lack
of hard drive space, running too many applications at once, having too many
browser tabs open at one time, or even just a dusty room! The solution for this
issue depends on the root of the problem.

Once you’ve gotten rid of some of your browser’s extensions, eliminated


applications you aren’t using, or identified the application that’s eating up all of
your processing power, you should be able to see a huge difference in your
computer’s processing speed. (You can do this by using the Task Manager for
Windows or the Activity Monitor for Mac to see which applications are slowing
you down).

If this solution didn’t work for you, here’s what you can do:

The Solution:

Note: Be sure to enforce proper network use by making sure that users aren’t
viewing too much digital content via streaming or continuously downloading
large files. Doing so will help you keep your bandwidth use under control.
However, if you find that your employees are utilizing the network correctly, it
might be time to upgrade your network to meet your business needs.
If you feel that the sluggishness of your applications is due to another issue,
proceed to Step 1.

Step 1: Try restarting your PC. Sometimes, a quick reset will fix any and all
issues right away. Doing so will clear your system memory (RAM). If this works,
remember to shut down your PC when it’s not in use. If this doesn’t help,
proceed to Step 2. 

Step 2: Now, it’s time to check on your hard drive and make sure that it’s not
approaching the end of its lifespan. So, let’s run a hard drive check:

Windows

Right click on “Drive”. Then, click “Properties” and then click “Tools”. Click
“Check Now”. Select “Scan for and attempt recovery of bad sectors”. Doing this
will stop your computer from tapping into any malfunctioning areas of the hard
drive.

Mac

Click “Applications” from the “Finder”, then “Utilities”, and then “Disk Utility”.
Highlight the hard drive that’s giving you trouble and then select “First Aid”.

If your hard drive is healthy, but you think it’s becoming too full with data,
proceed to Step 3.

 Step 3: Get rid of unnecessary files from programs that have gone unused.
System backups and restore points can eat up a lot of space, so don’t hang
onto more versions of this software than you need. You might also consider
uploading your data onto the cloud to save your hard drive.

Step 4: If you’ve completely deep-cleaned your computer and checked all of the
possible issues above, but your computer is still running slowly, it might be
time to upgrade your RAM so that your computer has more memory. Certain
programs take more RAM to run properly than others and if you don’t have
enough RAM ready, your computer will not be able to handle it. Look into RAM
upgrade options.

5. IP Address Exhaustion

The Problem: I can’t get an IP address.


So, your network seems to have gone down. Your operating system has sent
you an alert stating that the address was not received from the DHCP server.
You’ve just checked the network adapter status and noticed that there’s
actually no IP address to be found. What now?

There are a few different reasons why this could happen. It could be that the
DHCP server is out of addresses, the device might be set to use a static address
rather than a DHCP address, or maybe the DHCP request from the device never
made it to the server. Either way, here’s what we need to do:

The Solution:

Step 1: Check the network interface card (NIC). You can find this by opening
the control panel, then the device manager. Then, select “Hardware and
Sound” and then select “Device Manager”. Expand the Network Adapters item
to view all network adapters, although you will most likely only have one. Verify
that your system is configured to utilize DHCP.

 Step 2: Check the switch to see which virtual LAN (VLAN) the port is set as a
member. Verify that other devices on this particular VLAN are able to get an IP
address. If they can’t, the issue is that the network is not sending DHCP
requests to the server.

 If this issue is taking place with more than one device, then the issue is likely
the server itself.

6. VPN Errors

The Problem: I got an error message saying that my device was


“unable to establish the VPN connection” or error 800.

Your virtual private network (VPN) works to provide a safe connection between
a local client and a remote server. When you can’t connect to a VPN, you’ll
receive an error message that usually states something along the lines of “VPN
error 800 – Unable to establish the VPN connection”. This can happen if the
client device disconnected from the local network, the network’s firewall is
blocking the VPN traffic, or if the name/address specified for the VPN server
was incorrect.

 Here’s how you can fix this issue:

The Solution:
Step 1: Check the connection between the client and server. Attempt to
connect to the server from a different client device to verify whether the
network issue is a widespread issue or if it is affecting only one client.

Step 2: Verify that the name entered on the client side matches the server
name given by the VPN administrator. In some instances, users can specify an
IP address rather than a name, while it’s more typical for users to mistype the
address than the name. VPN servers can also change their IP addresses in
some instances, especially DHCP networks.

Step 3: If the first two steps didn’t clear up the issue, now it’s time to make
sure that the firewall isn’t blocking your connection with the VPN. Do so by
temporarily disabling it to retry the connection. If this solves the problem, you
need to update the firewall settings specific to the port numbers that the VPN
on the network is using to prevent this issue from happening again.

If none of this troubleshooting solved the issue, it could be possible that the
server is overloaded with clients or that it is offline. Check with your IT
department to see what can be done.

7.Connection Errors and Network Connectivity  

The Problem: My network has limited connectivity or no


connectivity at all.

Connection issues are some of the most annoying, frustrating network issues
of all. These issues can be a result of all types of glitches and issues within the
computer and/or the network itself. So, if your computer has handed you a
lovely “Limited or no connectivity” error message, here’s what you can do to fix
it:

The Solution:

Step 1: Restart your computer. A quick reboot can often be a life-saver. If


you’ve already tried this or restarting the computer didn’t fix anything, proceed
to Step 2.

Step 2: Restart your router or modem. DO NOT reset the router or modem or
restore its settings back to factory default. Simply turn the router or modem off
and back on. If this doesn’t work or only works for a moment, keep going to
Step 3.

Step 3: If you are connected to your network via Ethernet cable, unplug the
cable and then reattach it. If needed, replace your network cable with a new or
different cable to see if this was the cause of the issue.
Step 4: If you’re connected via Wi-Fi when you see this error, it’s a possibility
that the network adapter is attempting to conserve power. Stop this by finding
the Network and Sharing Center in the Control Panel. Right click “Wi-Fi
Connection”, select “Properties”, click “Configure” and find the “Power
Management” tab. Click and uncheck the option that allows your computer to
turn off device to conserve power.

Step 5: If you’ve tried all of this and there’s still no connection, unplug your
router and connect your computer directly to your modem. If this solves the
issue, then your router is likely to be malfunctioning. If not, contact the router
manufacturer for support.

If the error remains and the network is still down, reach out to your internet
service provider for help.

SELF-CHECK 4.1-1

A. ENUMERATION: Write the most common computer problems

1. 6.

2. 7.

3. 8.

4. 9.

5. 10.

B. List down the Common Network Issues & Solutions : Solved


1. 5.

2. 6.

3. 7.

4.

TASK SHEET 4.1-1

Defects in Computer Systems and Networks


Performance Objective: given necessary tools,equipment and materials,

you should be able to defects in computer systems and networks ff. standard
operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Steps to Troubleshoot a Network

1. Check the hardware. 


2. Use ipconfig. 
3. Use ping and tracert.
4. Perform a DNS check. 
5. Contact the ISP.
6. Check on virus and malware protection. 
7. Review database logs.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 4.1-1

CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Check the hardware

Use ipconfig

Use ping and tracert

Perform a DNS check

Contact the ISP

Check on virus and malware protection

Review database logs


 LEARNING OUTCOME NO.4

 Rectify/Correct Defects in Computer Systems and


Networks

LESSON CONTENT: Troubleshooting and Repair Techniques

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Defective components or parts are replaced or corrected without damage to
the surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities


METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 4.1-2

Troubleshooting and Repair Techniques

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Troubleshooting and Repair Techniques

2. Determine the Troubleshooting and Repair Techniques

Troubleshooting is a form of problem solving, often applied to repair failed


products or processes on a machine or a system. It is a logical, systematic
search for the source of a problem in order to solve it, and make the product or
process operational again. Troubleshooting is needed to identify the symptoms.
Determining the most likely cause is a process of elimination—eliminating
potential causes of a problem. Finally, troubleshooting requires confirmation
that the solution restores the product or process to its working state.
In general, troubleshooting is the identification or diagnosis of "trouble" in the
management flow of a system caused by a failure of some kind. The problem is
initially described as symptoms of malfunction, and troubleshooting is the
process of determining and remedying the causes of these symptoms.
A system can be described in terms of its expected, desired or intended
behavior (usually, for artificial systems, its purpose). Events or inputs to the
system are expected to generate specific results or outputs. (For example,
selecting the "print" option from various computer applications is intended to
result in a hardcopy emerging from some specific device). Any unexpected or
undesirable behavior is a symptom. Troubleshooting is the process of isolating
the specific cause or causes of the symptom. Frequently the symptom is a
failure of the product or process to produce any results. (Nothing was printed,
for example). Corrective action can then be taken to prevent further failures of
a similar kind.

Troubleshooting and Repair Techniques

Do you know what to do if your screen goes blank? What if you can't seem to
close an application, or can't hear any sound from your speakers? Whenever
you have a problem with your computer, don't panic! There are many basic
troubleshooting techniques you can use to fix issues like this. In this lesson,
we'll show you some simple things to try when troubleshooting, as well as how
to solve common problems you may encounter.

General tips to keep in mind

There are many different things that could cause a problem with your
computer. No matter what's causing the issue, troubleshooting will always be a
process of trial and error—in some cases, you may need to use several
different approaches before you can find a solution; other problems may be
easy to fix. We recommend starting by using the following tips.

 Write down your steps: Once you start troubleshooting, you may
want to write down each step you take. This way, you'll be able to
remember exactly what you've done and can avoid repeating the
same mistakes. If you end up asking other people for help, it will
be much easier if they know exactly what you've tried already.
 Take notes about error messages: If your computer gives you
an error message, be sure to write down as much information as
possible. You may be able to use this information later to find out
if other people are having the same error.
 Always check the cables: If you're having trouble with a specific
piece of computer hardware, such as your monitor or keyboard,
an easy first step is to check all related cables to make sure
they're properly connected.
 Restart the computer: When all else fails, restarting the
computer is a good thing to try. This can solve a lot of basic
issues you may experience with your computer.

Using the process of elimination

If you're having an issue with your computer, you may be able to find out
what's wrong using the process of elimination. This means you'll make a list
of things that could be causing the problem and then test them out one by one
to eliminate them. Once you've identified the source of your computer issue, it
will be easier to find a solution.

Scenario:

Let's say you're trying to print out invitations for a birthday party, but the
printer won't print. You have some ideas about what could be causing this, so
you go through them one by one to see if you can eliminate any possible
causes.

First, you check the printer to see that it's turned on and plugged in to
the surge protector. It is, so that's not the issue. Next, you check to make
sure the printer's ink cartridge still has ink and that there is paper loaded in
the paper tray. Things look good in both cases, so you know the issue has
nothing to do with ink or paper.

Now you want to make sure the printer and computer are communicating
correctly. If you recently downloaded an update to your operating system, it
might interfere with the printer. But you know there haven't been any recent
updates and the printer was working yesterday, so you'll have to look
elsewhere.

You check the printer's USB cord and find that it's not plugged in. You must
have unplugged it accidentally when you plugged something else into the
computer earlier. Once you plug in the USB cord, the printer starts working
again. It looks like this printer issue is solved!

This is just one example of an issue you might encounter while using a
computer. In the rest of this lesson, we'll talk about other common computer
problems and some ways to solve them.

Simple solutions to common problems

Most of the time, problems can be fixed using simple troubleshooting


techniques, like closing and reopening the program. It's important to try these
simple solutions before resorting to more extreme measures. If the problem still
isn't fixed, you can try other troubleshooting techniques.

1. Problem: Power button will not start computer

 Solution 1: If your computer does not start, begin by checking


the power cord to confirm that it is plugged securely into the back
of the computer case and the power outlet.
 Solution 2: If it is plugged into an outlet, make sure it is
a working outlet. To check your outlet, you can plug in
another electrical device, such as a lamp.
 Solution 3: If the computer is plugged in to a surge protector,
verify that it is turned on. You may have to reset the surge
protector by turning it off and then back on. You can also plug a
lamp or other device into the surge protector to verify that it's
working correctly.
 Solution 4: If you are using a laptop, the battery may not be
charged. Plug the AC adapter into the wall, then try to turn on the
laptop. If it still doesn't start up, you may need to wait a few
minutes and try again.

2. Problem: An application is running slowly

 Solution 1: Close and reopen the application.


 Solution 2: Update the application. To do this, click
the Help menu and look for an option to check for Updates. If you
don't find this option, another idea is to run an online search for
application updates.
3. Problem: An application is frozen

Sometimes an application may become stuck, or frozen. When this happens,


you won't be able to close the window or click any buttons within the
application.

 Solution 1: Force quit the application. On a PC, you can press


(and hold) Ctrl+Alt+Delete (the Control, Alt, and Delete keys) on
your keyboard to open the Task Manager. On a Mac, press and
hold Command+Option+Esc. You can then select the
unresponsive application and click End task (or Force Quit on a
Mac) to close it.

 Solution 2: Restart the computer. If you are unable to force quit


an application, restarting your computer will close all open apps.

4. Problem: All programs on the computer run slowly

 Solution 1: Run a virus scanner. You may have malware running


in the background that is slowing things down.
 Solution 2: Your computer may be running out of hard drive
space. Try deleting any files or programs you don't need.
 Solution 3: If you're using a PC, you can run Disk Defragmenter.
To learn more about Disk Defragmenter, check out our lesson
on Protecting Your Computer.

5. Problem: The computer is frozen

Sometimes your computer may become completely unresponsive, or frozen.


When this happens, you won't be able to click anywhere on the screen, open or
close applications, or access shut-down options.

 Solution 1 (Windows only): Restart Windows Explorer. To do this,


press and hold Ctrl+Alt+Delete on your keyboard to open
the Task Manager. Next, locate and select Windows
Explorer from the Processes tab and click Restart. You may need
to click More Details at the bottom of the window to see the
Processes tab.


 Solution 2 (Mac only): Restart Finder. To do this, press and
hold Command+Option+Esc on your keyboard to open the Force
Quit Applications dialog box. Next, locate and select Finder, then
click Relaunch.

 Solution 3: Press and hold the Power button. The Power button is
usually located on the front or side of the computer, typically
indicated by the power symbol. Press and hold the Power button
for 5 to 10 seconds to force the computer to shut down.
 Solution 4: If the computer still won't shut down, you can unplug
the power cable from the electrical outlet. If you're using a laptop,
you may be able to remove the battery to force the computer to
turn off. Note: This solution should be your last resort after
trying the other suggestions above.

6. Problem: The mouse or keyboard has stopped working

 Solution 1: If you're using a wired mouse or keyboard, make sure


it's correctly plugged into the computer.
 Solution 2: If you're using a wireless mouse or keyboard, make
sure it's turned on and that its batteries are charged.

7. Problem: The sound isn't working

 Solution 1: Check the volume level. Click the audio button in the
top-right or bottom-right corner of the screen to make sure the
sound is turned on and that the volume is up.
 Solution 2: Check the audio player controls. Many audio and
video players will have their own separate audio controls. Make
sure the sound is turned on and that the volume is turned up in
the player.

 Solution 3: Check the cables. Make sure external speakers are


plugged in, turned on, and connected to the correct audio port or
a USB port. If your computer has color-coded ports, the audio
output port will usually be green.
 Solution 4: Connect headphones to the computer to find out if
you can hear sound through the headphones.

8. Problem: The screen is blank

 Solution 1: The computer may be in Sleep mode. Click the mouse


or press any key on the keyboard to wake it.
 Solution 2: Make sure the monitor is plugged in and turned on.
 Solution 3: Make sure the computer is plugged in and turned
on.
 Solution 4: If you're using a desktop, make sure the monitor cable
is properly connected to the computer tower and the monitor.

Solving more difficult problems

If you still haven't found a solution to your problem, you may need to ask
someone else for help. As an easy starting point, we'd recommend searching
the Web. It's possible that other users have had similar problems, and
solutions to these problems are often posted online. Also, if you have a friend
or family member who knows a lot about computers, they may be able to help
you.
Keep in mind that most computer problems have simple solutions, although it
may take some time to find them. For difficult problems, a more drastic
solution may be required, like reformatting your hard drive or reinstalling your
operating system. If you think you might need a solution like this, we
recommend consulting a professional first. If you're not a computer expert,
it's possible that attempting these solutions could make the situation worse.

SELF-CHECK 4.1-2

A. ENUMERATION: Write the general tips to keep in mind of the


troubleshooting and repair techniques

1.

2.

3.

4.

B.ESSAY: List down the simple solutions to common problems of the


troubleshooting and repair techniques and solution it

1. 2.
5. 3.

6. 7.

4. 8.
TASK SHEET 4.1-2

Troubleshooting and Repair Techniques


Performance Objective: given necessary tools,equipment and materials,

you should be able to troubleshooting and repair techniques

ff. standard operating procedures within 4 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Fixing your own computer


1. Run a thorough virus scan

2. Update your software

3. Cut down on the bloat

4. Test your Wi-Fi connection

5. Reinstall the operating system


Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 4.1-2

CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Run a thorough virus scan

Update your software

Cut down on the bloat

Test your Wi-Fi connection

Reinstall the operating system


 LEARNING OUTCOME NO.4

 Rectify/Correct Defects in Computer Systems and


Networks

LESSON CONTENT: Problem Solving in Emergency Situation

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Defective components or parts are replaced or corrected without damage to
the surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 4.1-3

Problem Solving in Emergency Situation

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the Problem Solving in Emergency Situation

2. Determine the Problem Solving in Emergency Situation

Common Computer Emergencies And How To Fix Them

There is no doubt that smartphone technology is quickly catching up with


computers. There are many smartphone and tablet manufacturers that now try
to match the functions that you would be able to utilize when using a
computer – whether a desktop or a laptop computer.
Still, there are some things that only a computer can do – or perhaps a
computer continues to do better compared to a smartphone.
Unfortunately, computers are not perfect. There are many problems that you
may run into when you constantly rely on a computer or laptop. Some
problems are not major and may simply require a restart of the device. On the
other hand, there are also a few computer-related problems that can be more
serious.
No doubt, there is our emergency number that you can call in the middle of the
night which runs 24 hours a day and 7 days a week 1300723628 if you run
into computer troubles. The good news is, many computer problems can be
diagnosed and treated without the need for a professional right away. Many of
these issues can be fixed by yourself – but knowing when a pro is needed
should be important too.
1.The Accidental Deletion Of An Important File
We will start with one of the most common problems that people tend to face –
one that often happens accidentally. That moment you realize you have
accidentally deleted a file on your computer that may be important.
When it comes to the deletion of an important file –
note that an important file can mean one of two things:
1. You may have deleted a file that is personally important to you. In such a
case, this may be a video, photograph, or perhaps a document that you need.
2. In other cases, you may have deleted a file that helps your operating system
run properly.
Both cases can be quite disastrous.
The first step would be to see if the file might have been added to the recycling
bin. Head over to your recycling bin and see if the file is present there.
If the file is not in your recycling bin, you should consider using a software
application to help you recover those files. If the file is not there our data
recovery experts can assist you in recovering the files we can assist over the
phone and internet or attend to you in person at your home or office.

2. Water Or Liquid Damage


Drinking a cup of coffee while checking your emails early in the morning is
surely a convenience. Unfortunately, when that cup of coffee tips over and
covers your laptop – this could put you in quite a panic. Liquid damage is very
common.
If you have a desktop computer, you can simply plug the keyboard or mouse
out, depending on where the liquid spilled. Wait for the peripheral to dry and
plug it back in. Unfortunately, you may not be as lucky if you have a laptop.
The first step to preventing serious damage when you spill something on your
laptop is to switch it off as fast as you possibly can. Hold down the power
button for a while until all the lights on the laptop are off.
Remove the battery from the laptop if possible. Turn the laptop upside down –
with the keyboard and screen facing a downward position. Make sure your
laptop is opened up when you put it down this way.
Get a lint-free cloth and wipe your laptop off. Try to use the cloth to absorb as
much of the liquid as possible.
You should now allow adequate time to pass before you decide to turn the
laptop on again. You need to make sure that the liquid has effectively drained
from the laptop. Turning on your computer before all liquid has escaped can
cause a short circuit – which may lead to permanent hardware damage. We
have a dedicated team specially dedicated to rescuing your computer liquid
damage. We can assist in recovering your important files and get you up and
running with a new computer and also can get your liquid damaged laptop
running like new again.
3. Internet NBN Access Failed
Another common problem that you may run into with either a desktop
computer or a laptop would be an internet connection that fails, runs slow or
drops out intermittently.
The first step is obvious – check the router. This is often where the issue lies
when your internet simply won’t open up web pages. See that all lights on your
router light up. Make sure that you are connected to the router on your laptop
or desktop computer.
If you have a wireless connection, then switch the Wi-Fi off on your computer
and restart the modem. Reconnect and see if the problem resolves.
If this does not help, open up the network settings for the internet connection
on your computer. Look for a “status” tab. If there is a problem noted with your
internet connection on this tab, then the problem may lie with your internet
service provider. If no problem is detected here, launch the troubleshoot tool on
your operating system and follow the appropriate prompts.
If these steps fail, connect the router directly to your computer with an RJ45
network cable. If the internet problem still persists, it might be a good idea to
contact your internet service provider for troubleshooting. If that doesn’t get
you a resolution your local pc doctor technician can come out and diagnose the
root cause of the problem and also help liaise with your internet service
provider if needed. We can also advise you on the latest and greatest NBN
modem routers on the market that will specifically suit your requirements.

4. Infected With A Virus


Millions of computers are infected with viruses every year. When your
computer is infected with a virus, it could put your personal and confidential
data at risk. You are also facing other issues that may interfere with your
ability to effectively use your computer – such as a computer that becomes
simply too slow to use.
Prevention is a key factor when it comes to viruses. You should always have an
antivirus program installed on your computer to protect you against virus
attacks. Some software can also help to fight off malware and spyware. This
adds more protection for your computer and the data on your laptop that is
confidential.
Sometimes, however, virus attacks still happen. In these cases, you need to
take action.
Downloading an effective virus scanning software is a useful step to take. Even
if your computer is slow at the moment, try to be patient. Download the
software and run it on the affected computer. In some cases, the program will
be able to detect and remove the virus. A restart after this procedure may help
to solve the issue. If this doesn’t help, we have our remote support team that
can dial into your computer anywhere in Australia and remove the virus and
also tune up your machine to have it running like new again.

5. Device Doesn’t Work Suddenly


We all use devices connected to our computers. Think about the peripherals
you use, for example. You rely on a mouse to move the cursor on the screen.
Sometimes you may prefer a touchpad instead. You rely on the keyboard to
type. Some people connect their computers to a printer – this is a convenient
way of printing photographs and documents.
There are cases where these devices just suddenly stop working. Perhaps you
are trying to print an important document, and your computer simply fails to
send the print command to the printer.
In these cases, there is a good chance that the problem may lie with the drivers
of these devices. Drivers can become problematic in some cases – sometimes,
the driver would be deleted accidentally, or maybe the driver was updated, and
the update no longer supports the specific hardware you use. Two drivers may
also clash.
First of all, visit the device manager on your computer. See if any devices have
a yellow exclamation mark next to them. If this is the case, then the driver has
a problem. Right-click on the device and choose the “uninstall” option. Once
the driver has been uninstalled, remove the device from your computer and
restart your laptop.
After restarting, reconnect the device to your computer. The driver will be re-
installed. See if this solves the issue. If you still run into the same problem,
however, consider plugging the device into a different USB port. You should
also consider looking for updated drivers for that particular device (including
its model) on Google. Sometimes, manually installing the device driver can help
to solve the issue. Once again our remote support technicians can assist you
should neither of the tips above work.

6. Laptop Screen Won’t Come On


When a laptop’s screen doesn’t turn on, it can mean quite a few things. The
screen might be broken. The fault may also lie with the RAM, CPU processor,
the graphics processor, or another part of the laptop.
Diagnosing the problem definitely starts by plugging the laptop into an external
monitor. This can be the monitor you use with your desktop computer. You
can also connect an HDMI cable to the laptop and hook it up to your television.
If you are able to see your laptop working on the external monitor, then there is
likely a fault with your laptop’s built-in display. You can easily continue using
the laptop with the external monitor – it will be similar to using a desktop
computer, after all.
If the laptop doesn’t display anything on the external monitor, however, then
you are likely facing a hardware problem. Once again we have a dedicated team
that can assist with this, that specializes with what we call chip level repairs to
call our office and they can explain pricing and how it all works.

7. Computer Takes Ages To Load


There are a few reasons why a computer may suddenly become slow. As we did
mention previously, sometimes a virus infects a computer. This can cause the
computer to work slower than it usually does. Downloading a virus scanner is
a good way of determining if this might be the cause.
Another thing that you should do is take a look at the startup services, as well
as the currently active programs on your computer.
Open up the task manager of your computer. Now, navigate to the “Startup
Tab” to see what programs will start when your operating system loads. If you
find anything on the list that you do not rely on every time you use your
computer, turn it off.
Also, consider looking at the “processes” tab. This tab tells you what programs
and applications are running at the moment. See if there are any processes you
do not use – turn these off and see if it resolves the problem.

When Should You Call A Professional?


We considered some of the most common problems that you may run into
when you use a computer on a regular basis. These problems are experienced
on a daily basis by millions of people.
What many do not realize is that quite a large number of these common
computer problems can be effectively solved by themselves. When you do not
realize that you are capable of solving some of these problems, you may end up
paying hundreds of dollars to get a professional out.
At the same time, you should take note that there are cases where calling a
professional may be a better option. This is generally the case when you run
into a problem caused by hardware-related issues. When your computer runs
into a hardware problem, then you will likely need a computer specialist to
take a closer look at the device. A replacement or repair will generally be
needed to ensure you can continue using your computer without the current
issue getting in your way.
Some signs of hardware problems that may require a professional include:
· When the computer is performing slowly due to an old processor, then steps
taken to improve the performance at a software level may not yield effective
results. The same goes for inadequate RAM on your computer.
· There are some cases where a computer is failing to recognize USB devices
have a faulty port, instead of the issue being linked to a driver issue.
· When all applications on a computer fail to start or work correctly.
· The feared Blue Screen of Death is sometimes also linked to hardware-related
problems.
· Exceptional delays when trying to read the information contained in files.
· When the computer continuously shuts off suddenly without any warning or
notifications. This may happen a few minutes after the computer has been
running. In some cases, the computer will shut down while it is still booting
up.
· When there are unusual noises that come from the computer, then it will
often be a sign of a hardware problem too.
Conclusion
There are a few problems that many people tend to run into while they are
using a computer. Whether you rely on a desktop computer or a laptop, there
are several potential issues that you may run into. Understanding what has
happened to your computer and what actions to take is important. At the same
time, you should know when your local pc doctor technician will be needed.

Problem Solving in Emergency Situation

Information Technology Consulting


We are your local IT Consulting / Computer Consulting experts who can assist
in all aspects of software implementation, as well as repairing your network
and server, whether they run on Windows or Linux.  Like most small business,
you may not have the luxury of having your own Information Technology
department to take on new projects or tackle complex challenges.  You may be
just barely hanging on to what you currently have and praying that your
systems do not break down. We are here to come in with our knowledge,
expertise, and experience to do the job of the Information Technology
Department you wish you had.

IT Consulting

911 Emergency Service


We understand that downtime is expensive to your business and disruptive to
your operation.  Give us a call so that we may get started right away and
evaluate what is needed to get you back up and running.  We have the
technical skills and experience to think on our feet and decide what resources
we can pull together in order to get you operational as quickly as possible.
Emergency IT Service

Help Desk Technical Support


In the ever changing world of technology, users are expected to be more and
more self sufficient in adapting to and using new technology.  The problem is
that your business may rely on employees who are more creative in nature or
managerial and technology does not come naturally to them.  A question or
technical issue can stop a user's  productivity and lead to frustration, unless
they have somewhere to turn for assistance from Help Desk Technical Support
and Problem Solving.  In larger corporations, this is called the Help Desk,
where an entry-level IT person would answer questions and solve problems on
technical issues.  Unfortunately it is rare, especially for a small or medium
sized business, to have their own Help Desk.  We can fill this void by serving
the role of Help Desk Technical Support and provide assistance with problem
solving.

Help Desk Tech Support

Your computer network is the most used, most relied upon, most critical
asset for running your business..... but it is probably the least appreciated.
There are two types of computer networks in business today. Those that were
designed and installed well by competent professionals, and those that were
not.  Most likely your network falls into the second category because you are
looking for help and reading this!  Most networks that we encounter are a
product of evolution.  When you first set up a network, it was a simple matter
of running some wire around from computer to computer until the lights
started blinking.  You either installed your first network yourself, or gave a
deserving kid an opportunity to earn some money and gain experience while on
summer vacation.  Maybe it was your own kid or relative and nobody wants to
criticize their work.  It all seemed simple enough, but then you started adding
more computers and eventually a server to share files.  You added Internet and
maybe some multi-user software, printers, and other devices.  At some point,
you added a wireless router so that your employees could use their laptops,
smartphones, and tablets.  Somehow it all magically worked,,,, until it didn't! 
This was all great until things started slowing down.  Strange error messages
started appearing on your screens, and some computers could not get reliably
connected.  Data got corrupted and you started having some real problems. 
You can see from the variety of types and colors of network cable lying around
that different people have come through and expanded or repaired your
network, spendng no more than what it takes to get by.   You lost track of what
goes where and what is actually being used. Employees come and go and
nobody today really knows exactly what you have or understands how it all
works, nor do they care. Eventually something breaks and you find out that
the company, or individual who installed your network is out of business, or
grew up and moved on.  Now you have a mess and you want someone to come
in and straighten it all out.  Yes, we have seen it all before.  It is time for a new
network, this time professionally installed!

Networking

Problems in your computing environment can drag down your entire


business.
Your business relies heavily on technology.  Technical problem solving is key to
keeping your business running smoothly.  When there is a technical problem
with your network hardware, server, or software, it can effect employee morale,
as well as productivity and ultimately profitability.  Are your employees
complaining about the technology they use?  How many times do you have to
stop and think about issues with your network server, software or computer
hardware?  Are your computing resources being abused or used for personal
entertainment rather than business use?  Have you had to shut your business
down, cancel appointments, or change your plans because of technical
problems or limitations?  Do you have an employee that you cannot fire or are
afraid will quit because they are the only ones with the knowledge to keep your
systems running?  These are not the type of problems that some technology
whiz kid can solve.  You need a team of trustworthy, experienced business IT
Consultants, who can be the problem solver to help make management
decisions and implement a solution.  We will be happy to meet with you,
privately if necessary, and see what we can do to help solve your technology
problems.

Problem Solving

Specializing in Business and Medical Computing


For over 30 years, CMI has been installing, upgrading, and maintaining
business computer systems all over Indianapolis and central Indiana.  We
enjoy working with small and medium sized businesses and medical practices,
helping them grow, and run smoothly.  We help you take the advantage with
the best of available technology.  Our customers include Medical and Dental
Practices, Retail Stores, and just about everything else from Accounting to
Manufacturing. Installing successful systems and establishing long
relationships with our customers, by maintaining those systems, is what we do
best.

Home

There are times when you need to call in Experienced Technical Problem
Solvers
Our extensive experience is our biggest asset.  We take the time to listen to
users, analyze customer's needs, and recommend solutions that work. 
Whenever we install something, we make sure we do the job right, according to
well established industry standards and best practices.  We will only use the
best available computer hardware and software that will assure success.  We
are used to solving problems that nobody else can.

With experience in the field, implementing and maintaining mission critical


computer systems, networking, and servers, we are in a position to recommend
solutions that we have used before.  There is "No need to recreate the wheel"
every time you need a solution.  We use our experience to your advantage. 
While we know what works and what to recommend, we also will keep you from
making the mistake of investing in a system that does not meet your needs.

Home

Problem Solving

CMI can serve as your your Outsourced IT Department.


As a result of downsizing, cost reduction, or employee turnover, you may no
longer have anyone around to take care of your computer systems.  Our
services cost a lot less than employing a full time IT person.  We pride
ourselves in saving our customers much more money than our services cost. 
We help you make the right decisions on how to invest your IT Budget wisely in
order to keep your computing environment running smoothly.  We help you
keep up with the ever changing technology, IT modernization and computing
demands, while at the same time recommending practical, cost effective
solutions.  Give us a call.  Tell us what you are trying to accomplish.

Home

IT Consulting

Training is a great opportunity to receive user feedback.


Successful computer system administrators address the concerns of users. 
Users have a unique perspective that can only come from real life experience
using the system everyday.  They will be the first to notice problems or come
up with ideas to make the system better. They care about their jobs.  They will
let you know what should be done to make their job easier, more efficient, and
help them meet expectations.  Users ideas and suggestions need to be fully
appreciated and used to make improvements.

User Training

Some emergencies can be solved remotely.


Sometimes, what may seem like a big problem can be solved either over the
telephone, or, if you have Internet available, through a remote connection. 
Unless there is a physical problem, involving smoke, or fried electronics that
require replacement, we can solve most problems remotely, either by doing
some simple troubleshooting over the phone, or using a remote access solution
like terminal services, or remotely controlling a workstation.

Problem Solving

Emergency IT Service

Companies need someone who is familiar with their entire computing


environment. Computer systems need Administration.
We provide guidance to help navigate your business through a sea of
technology.  We can perform a management, decision making role as a member
of your team.

Decisions need to be made, and right or wrong decisions can make or break a
business.  Without consistant administration, your computer system will be
adrift and eventually show the signs of neglect.  Your system needs someone to
keep a watchful eye on changing technology and innovations in Windows,
Linux, network security issues, as well as all the hardware and software in
use.  Someone needs to make practical recommendations on how to utilize new
technology to your best advantage.  Someone needs to be looking down the
road at emerging technology and the future of your company.

Many companies no longer have the luxury of their own IT Departments to, or
even dedicated, qualified, IT Personnel as a result of downsizing or recent
economic hardship.  Your computing environment is unique and it is wasteful
to have different technicians come in from time to time and try to fix or
maintain a system they are not familiar with. By performing regular
maintenance and IT Technical support, we build a level of familiarity that will
allow us to diagnose problems and implement solutions much more quickly,
thus saving you a lot of money over time.

Maintenance Plans

Help Desk Remote Telephone Technical support is a service we provide


for our customers who are on a maintenance program.
We only provide technical support to customers with whom we have an ongoing
relationship or who are willing to pay for our srvice.  We see Technical Support
as a value that we add to our overall IT Consulting Services and will allow for a
certain amount of Technical Support to be included in our Systems
Maintenance Plans.  We can not provide free technical support to random
callers looking to leach information from us.  We receive calls from desperate
people who find us on the Internet every day and we are willing to help if they
are willing to pay our $150/hour base fee and our priorities allow for it.
Help Desk Tech Support

There is no such thing as a dumb question.


We treat users with the respect they deserve.  We understand that users have
other things to do besides keep up with the latest technology and they are not
interested in what makes their computers work.  We try to provide assistance
and explain answers thoroughly.  When possible we try to go a step beyond
answering the question to make sure the user becomes a little more technically
proficient from the experience. There will always be people who are "Technically
Challenged," but by using our skills and patience, we try our best to be helpful.
It is the end users, after all, who we depend on to make a computer system
successful.

Help Desk Tech Support

The tools we use to provide help have advanced greatly.


It is rare, these days, that we need to travel to your location in order to provide
technical support.  With just a few keystrokes, you can allow us to access your
computer and provide remote support so that we may see and control your
computer as if we were sitting next to you.  This eliminates most of the
challenge of a user trying to describe a problem sufficiently for a technician to
understand what is going on and find the solution.  Questions can be answered
quickly over the telephone and maintenance or repairs can be performed on
your computer software remotely using a Remote Support program.  We also
have the ability to access and monitor servers and routers remotely so being
on-site may not be required.

Help Desk Tech Support

Your technology problem may not be all that unique.


Chances are other companies we work with have been through a problem
similar to yours and we already know the solution.  This is where our
experience comes in handy. Many companies face similar problems in growth,
changing technology, data recovery, or disaster management.  We have the
battle scars that come from solving a lot of problems over many years and we
have yet to see a challenge we can not meet.

We keep ourselves up to date on all the latest security patches, varnings, and
various bugs that are known problems.  We know how to track down error
codes and search for solutions based on other peoples experiences with the
same problem.  There is often no need to invent a solution.  By keeping up and
reading about problems, vulnerabilities and their solutions, we can often
prevent a problem on your system before it ever happens.
 

Problem Solving

Users need to know that they are supported.


The most frustrating thing for a user is not having someone to go to when they
have a question or concern.  Leaving users to figure out a system on their own,
or handing them a stack of manuals is not the right approach.  Proper training
and ongoing support will lead to a comfort level that will assure success.  Users
need to know that they are not alone, that help is available, and they should
know where to go and be encouraged to seek that help.  Sometimes we need to
come in and assist in working with the technical support services of your
software vendor.  By allowing us, your technical people, to work with their
technical people, we can work together to find a solution that we can bring
back and implement in a non technical way.  In other words, we can fight the
technical support challenges for you.

Help Desk Tech Support

Software Implementation

User Training

We know how to deal with Security Related Emergencies.


Has your system been hacked?  Is your Internet connection under attack?  Are
your computers infected with a fast spreading virus?  Has someone taken over
your server?  Do you need your system secured after an employee change? 
These are all issues that we have dealt with in the past and know how to get
under control.  We have the tools and experience necessary to figure out what
is going on and find a solution.  We will repair the damages, find the source of
the problem, and implement preventions to secure your systems.

Problem Solving

Emergency IT Service

We are not afraid to ruffle feathers in order to bring about positive


change.
Some of the most difficult problems may be caused by your own employees. 
Users generally do not like and are resistant to change or restrictions.  End
users may be too used to having the freedom to do anything they want with
company computers, regardless of the problems they may cause.  Many viruses
and security problems are a result of employees using their work computers
the same way the do their personal computers at home. Acceptable Use Policies
need to be developed, implemented, and enforced with backing from top levels
of management.  We can help by installing tools to keep your employees and
their computer use under control.  We are not interested in corporate drama,
politics, or winning popularity contests.  We are here to solve problems.

Problem Solving

The technology we deal with is not just limited to computers and


networks.
We understand how to integrate different technoloies so that they work
together.  We are versitle enough to work with practically any technology and
interface multiple technologies together for an overall solution.

Any kind of technology can be intimidating.  We are also capable and have
experience installing medical equipment, phone systems, security systems,
cash register point of sale systems, and sometimes become involved in the
technical design of customer products.  We can work with your vendors and
their technical specifications to make sure their products will interface with
your computing environment and make any adjustments necessary.

We are used to reading manuals, working with technical specifications, and


applying technology to any type of business application.  Bring us in and let us
look at what you are trying to accomplish.  We can help with the research and
evaluation of the next piece of equipment you are wanting to buy.  We may
know of another customer who is facing the same challenge or using the same
technology.

IT Consulting

Problem Solving

IT System Modernization

We are not afraid to take on new technology.


All technology starts out as new technology.  Every project and solution is
unique.  We are not afraid to try something that nobody has done before in
order to give your business a competitive edge.  We are constantly absorbing
new technology as technology itself evolves with time.  There are several
companies around Indianapolis where we installed their first personal
computers.  We installed the first PC Network in Indianapolis.  We were
pioneers when the Internet first started by setting up one of the first Internet
Service Providers in the area.  Doctor and Dentist offices are constantly having
us integrate new medical equipment with their practice management software
and servers. Just because something has not been done before, does not mean
that it can't be done and we can't do it.  We are also available to help you
evaluate new technology to see if it is necessary and will actually improve your
business.  We can help in the decision and evaluational process to help decide
which new technology to take on.

IT Consulting

IT System Modernization

Once the problem is identified, we can quickly get the resources you
need.
We consider all the resources available to us whether it be placing a temporary
server, offloading services to our own network, or knowing where to quickly
obtain a critical replacement part.   We do whatever it takes to get you
operational as quickly as possible.  An example of this is a customer who runs
QuickBooks Enterprise on their server that crashed.  In order to buy time to
build a new server, we installed their QuickBooks on one of our servers for the
customer to access remotely.  Once the new server is up and running, the
QuickBooks and Data were transferred to the new or repaired server.

We have loaner Servers, Switches, Routers, Hard Drives, and pretty much
anything else to get your system back up and running so your business will
not suffer.

Emergency IT Service

Many companies have downsized and no longer have their own IT


Technical Support staff to go to help.
Unfortunately, many companies do not realize until. after they have let their IT
People go, how critical they actually were.  We do not advocate downsizing IT
Staff, but we are available to fill in the void that they leave behind.  Help Desk
Technical Support is critical to the ongoing operation of your business.  We can
provide Help Desk Technical Support so that your employees have someone to
turn to for help their occasional questions and technical problem solving
needs.

IT Consulting

Problem Solving

Help Desk Tech Support

We have the skills and tools to find and correct problems on your
network.
We have the ability to perform a full analysis of your network and find out what
is going on. We can find and correct connection problems due to bad cable,
connectors, or electrical interfearance.  We analyze your network traffic to
abnormalities, traffic restrictions, or signs of virus activity.  We make sure your
network is secure from attackers and hackers and that your corporate and
customer data is protected.  We often implement QOS or Quality of Service
Policies to make sure that your Internet connection is shared in a way that
nobody can hog all the Internet bandwidth.  We monitor your network remotely
and are alerted whenever a problem arises.

Problem Solving

Networking

We are accustomed to dealing with the unknown.


The solutions to many problems are yet to be invented.  You may be on the
"bleeding edge" of technology with new equipment or software that still needs
some bugs worked out.  We often work directly with companies like Dell,
Microsoft, and Intuit in order to bring a problem to their attention and work on
a solution as a team.

Problem Solving

Priority Service goes to our existing customers on Maintenance Programs.


This is one big advantage of being on a Maintenance Program with us. Not only
do we provide you with Priority Service, but we would also be familiar with your
overall computing environment.  This is like a firefighter being familiar with a
building before fighting a fire there.  If you are not one of our regular
customers, give us a call anyway.  We charge on an hourly basis at the rate of
$150/hour with a minimum of three hours per incident.

Help Desk Tech Support

Maintenance Plans

Emergency IT Service

Once a server is set up and installed on your network, it must be secured.


Server Security, especially for servers accessible through the Internet must
have the proper security to keep them from getting hacked.  We take server
security very seriously because we realize just how dangerous the world is.  It
is a given fact that there will be attempts to hack into your server every hour of
every day.  This is just the nature of the Internet and a properly setup and
secure server will be prepared and protected from such attacks.  We utilize
firewall security, user and file security, as well as intrusion detection to keep
your servers secure.  Servers, and the software they run, must be constantly
maintained and updated to protect against the latest security threat.  Server
Security is something that should be set up and maintained by competent
professionals like us.  We can set up your server and monitor and maintain it
remotely keeping an ever watchful eye for problems.

Windows & Linux Servers

There is a silver lining in every cloud.


Emergencies are unfortunate, but usually our customers are better off once the
problem is solved.  You may wind up with a better system than you had
before.  You may learn and take corrective actions that will make your system
more reliable.  When we fix something, we fix it right and leave our customers
in better shape as a result of the experience.

Emergency IT Service

Give us a call so we may meet and discuss your unique situation and Help
Desk Technical Support Needs.
We can come up with a Technical Support plan that works for you and is
within your budget.  We will start supporting your users right away to take
care of their immediate needs and get an idea of what is required to provide
ongoing support.

Help Desk Tech Support

Maintenance Plans

Give us a call so we may meet and discuss your networking needs. We are
professionals who understand what it takes to build and maintain reliable
networks.
We have experience building and maintaining reliable networks. We
understand that nothing is more critical to the operation of your business so
we do not compromise on quality.  When we are finished, you can concentrate
on running your business rather than fighting computer and network
problems.

Networking

Give us a call so we may meet and discuss your problem and help find a
solution.
We have a lot of experience and resources that we can utilize to solve your
problem.  We will work with you as a part of your management team with the
common goal of solving the problem.  We have turned many problems into
solutions and turned bad situations around.  We are often the Big Guns that
come in and solve problems where others have failed because we are
experienced and know how to solve problems.

Problem Solving

Give us a call so we may meet and discuss your needs. We will give you a
fast and honest answer whether or not we can help.
We do not pretend to do anything and everything.  The things we know best are
computers and computer networking.  Chances are that your problem is not all
that unique and we have worked on something similar before.  Most of the time
our the solutions we recommend are based on real life experiences or things we
know we can handle.  Just as importantly, we are also honest enough to let
you know our limitations and avoid the disaster of taking on something we are
not ready to handle.

SELF-CHECK 4.1-3
A. ENUMERATION: Write the common computer emergencies and how To
fix them.
1.
2.

3.

4.

5.

6.

7.

B. List down the in problem solving in emergency situation

atleast gives 1-10.

TASK SHEET 4.1-3

Problem Solving in Emergency Situation


Performance Objective: given necessary tools,equipment and materials,

you should be able to problem solving in emergency situation

ff. standard operating procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

Four Main Problem Solving Steps

1. Understand the Problem. Solving the right problem is the most


important part of problem solving.
2. Design a Solution. Formulate an algorithm to solve your problem.
3. Implement your Solution. Write the code to solve your problem.
4. Check your Solution.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 4.1-3

CRITERIA YES NO
Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Understand the Problem. Solving the right problem is the most


important part of problem solving
Design a Solution. Formulate an algorithm to solve your problem

Implement your Solution. Write the code to solve your problem

Check your Solution

 LEARNING OUTCOME NO.4


 Rectify/Correct Defects in Computer Systems and
Networks

LESSON CONTENT: Corrective Action

Hardware Configuration

Software Configuration

ASSESSMENT CRITERIA:

1. Appropriate personal protective equipment is used in line with standard


procedures.
2. Defective components or parts are replaced or corrected without damage to
the surrounding environment or services
3. Adjustments, if necessary are made in accordance with established
procedures
4. Unplanned events or conditions are responded to in accordance with
established procedures.

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 4.1-4

Corrective Action
 Hardware Configuration
 Software Configuration

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the corrective action

2. Determine the corrective action

What Is Corrective Action?

Corrective action is an aspect of quality management that aims to rectify a


task, process, product, or even a person’s behavior when any of these factors
produce errors or have deviated from an intended plan. Corrective actions can
be thought of as improvements to an organization to eliminate undesirable
effects. Corrective actions can apply to an entire project when the deliverables,
whether tangible or service, deviate from the required output. In HR for higher
education institutions in particular, corrective action also applies to individual
employees and functions to communicate to the individual what aspects of
attendance, unacceptable behavior, or performance require improvement

Hardware Configuration

What does Hardware Configuration mean?

Hardware configuration references the details and system resource settings


allotted for a specific device. Many computer specialists improve hardware
performance by adjusting configurations, which may also include settings for
the motherboard and the BIOS, as well as the bus speeds.
With newer technology, most computers have plug-and-play (PnP) allowing the
OS to detect and configure external and internal peripherals, as well as most
adaptors. PnP has the ability to locate and configure hardware components
without needing to reset jumpers and dual in-line package (DIP) switches.
Techopedia explains Hardware Configuration

Each device has a hardware configuration setting, which may include the
following:

 Interrupt Request (IRQ) Lines: These are hardware interrupt lines, which
signal the CPU when a peripheral event has stopped or started.
 Direct Memory Access (DMA) Channels: This is a method for transferring
data from the main memory to a device without going through the CPU.
 Input/Output Port: This connects the input and output devices to the
computer. There is a memory address for each port.
 Memory Address: There is a unique identifier used for each memory
location. The memory address is typically a binary number, which is
numbered sequentially.

All hardware devices have configuration settings that can affect performance
and system function. Hardware configuration information may include:

 Available memory
 Power management features
 Devices that are connected such as modems, disc drives and serial ports

During power-on-self-test (POST), basic input/output system (BIOS) searches


system configurations to determine what devices are present and how they
interface with the CPU. After POST, when the computer and system
configurations are found, the CPU uses the information to process instructions
and data. Configuration information is stored in several ways using DIP
switches, jumpers and complementary metal oxide semiconductors (CMOS).
Today most peripheral devices use PnP, which will auto-configure the DMA,
IRQ and I/O address. Older systems that do not have PnP require a new device
to be set by using jumpers or DIP switches.

Hardware Configuration For Different Types Of Computers - You can build


your own computer in the way you want and with the accessories you desire.
Different brands and various types of hardware components flood the market.
So, choosing the correct components for the computer is an important task
and it will save you the money. 

First decide on for what purpose you are buying the computer and fix the
budget you have to spend for it. Then choose the hardware components
carefully according to your needs. This article briefs the hardware
configuration needed for different types of computers.

Hardware Configuration For Different Types Of Computers

1. Office computers

The office computers need common or cheap configuration. A dual core


processor with 2 GHz speed and 2 GB RAM will do well for this type of
computers. A 19’’ monitor of LCD type may be enough. 

The graphics card that comes with the motherboard alone is enough, so no
need for separate graphics card. A 500 GB HDD can be affordable since the
prices of hard disk drives are going down.

Read Too: Parts Of a Motherboard

2. Multimedia/graphics computer

More importance should be given to the graphics card in this type of computer
since they have to work with high quality graphics. Get a graphics card from a
branded company and of high quality. There should be PCI-E slots in addition
to PCI slots. 

The size of RAM also should be quite big. Something in the range of 4 to 6 GB
is okay. Considering the processor as triple or quad processor is good for this
type of computers.

3. Gaming computer

This type of computer should be more rigid and tough since they have to come
across all the bumps and pats of the frustrated user who loses the game.
Definitely a HD LCD monitor of at least 21’’ should be provided for more
attraction towards games. 
Dual core processors are enough but dual processors could be advantageous
for several games. Motherboard with PCI-E slots, a graphic card which provides
at least 30 frames per second, a good cabinet with airflow, quality speakers,
multimedia keyboard and a durable mouse are other important things for a
gaming PC. RAM size of 4 GB will be perfect for this type of computer.

Read Too: Upgrading Your Computer Memory

These three are the most different types of computers we come across. You
might wonder why there is no information on personal home computer. But the
fact is, it is good enough to buy computers which are sold with pre-assembled
configuration for home use, according to your financial plans.

Software Configuration Management?

Software configuration management is


referred to as source control, change
management, and version control.
Software configuration management
systems are commonly used in software
development groups in which several
developers are concurrently working on a
common set of files. If two developers
change the same file, that file might be
overwritten and critical code changes
lost. Software configuration
management systems are designed to
avoid this inherent problem with
sharing files in a multiuser
environment.
Any software configuration management system creates a central repository to
facilitate file sharing. Each file to be shared must be added to the central
repository to create the first version of the file. After a file is part of the central
repository, users can access and update it, creating new versions.
Benefits of software configuration management
If you have not used a software configuration management system or are not
that familiar with the concept, you might wonder whether it is appropriate to
use software configuration management on your project. Test automation is a
software development effort. Every time a test script is created, whether
through recording or coding, a file is generated that contains code. When
created, developed, or edited, that code is a valuable test asset.
A team environment presents the risk of losing functioning code or breaking
test scripts by overwriting files. A software configuration management system
offers a way to overcome this risk. Every time a file changes, a new version is
created and the original file is preserved.
For the team that is new to software configuration management, all of the
essential features for versioning test scripts are available through the Rational
Functional Tester interface. This integration simplifies the use and adoption of
software configuration management.
NoteUse a software configuration management like ClearCase or Rational
Team Concert if multiple users must access functional test assets in a test
team environment.

Software configuration management products


The ClearCase or Rational Team Concert integration for versioning test assets
is specialized and cannot be duplicated with other tools. For this reason, some
ClearCase operations cannot be performed outside Rational Functional Tester.
When you use Rational Functional Tester, the ClearCase or Rational Team
Concert operations appear to be very simple. But a lot is going on behind the
scenes. A Functional Test script is a collection of files. The complexity of
treating several files as a single entity is hidden because all actions in the
product user interface are performed on the script. You do not see the related
files anywhere in the user interface. In addition, some software configuration
management operations, such as merging, are very complex. There is built-in
logic to determine the order in which files are merged, and then different
utilities are employed as needed to complete the merge.
ClearCase:
The built-in Rational Functional Tester integration with ClearCase provides all
the basic software configuration management features and hides the
complexity of the Rational Functional Tester test asset structure.
Also, if a user attempts to perform file operations on Rational Functional
Tester files outside the product user interface, scripts may become out of sync
with their related files and become corrupt or unusable.
Rational Functional Tester works in a ClearCase view enabled for Unified
Change Management (UCM) if the view was created as part of a single-stream
UCM project. Rational Functional Tester does not work in views that are part of
multistream UCM projects.
NoteRational Functional Tester uses its own integrated Team provider. It does
not support using the SCM integration adapter directly with Functional Test
projects.

In ClearCase, a checkout operation creates a local copy of the file in which you
can make changes. When you are satisfied with your work, you check in the
file to create a new version. The original file version always exists.
One fact of life in a multiuser environment is that many users can check out
the same file at the same time. When this happens, a special feature of the
software configuration management system called "merge" is available to
combine multiple changes to a single file. The first user to check in the file
creates the new version. The second user to check in the file must merge her
changes into that version. If the software configuration management system
can combine the changes, they are merged into a new version of the file. If the
changes conflict or cannot be resolved by the software configuration
management system, the conflicts must be resolved manually.
Rational Team Concert:
You can use Jazz source control to manage source code, documents, and other
artifacts that you want to place under version control and share with a team.
Jazz source control is closely integrated with the other application development
lifecycle tools included in Rational Team Concert.
 You can create a project in your workspace, share the project to place
the project under Jazz source control.
 Check-in your changes to the repository workspace.
 Deliver the changes to the stream from the repository workspace so that
the changes are available to all members of the team.
 You can accept a team invitation, or create a new repository workspace
from one of the streams of the team.
Functional test assets
A typical Rational Functional Tester test script object includes these files:
 Script file ( scriptname.java for Rational Functional Tester, Eclipse
Integration, or scriptname.vb for Rational Functional Tester, Microsoft Visual
Studio .NET Integration)
This file is created through recording.
 Script helper file ( scriptname ScriptHelper.java for Rational
Functional Tester, Java Scripting, or scriptname ScriptHelper.vb
for Rational Functional Tester, VB.NET Scripting)
Each script has a script helper file that is generated after recording.
 Shared test object map file ( kadov_tag{{<ignored>}}filename.rftmap
kadov_tag{{</ignored>}}) or private test object map file (scriptname.rftxmap )
Each script has a map file. The map file can be associated with only one script
(*. rftxmap ) or shared among many scripts (*. rftmap ). To prevent users from
accidentally selecting a private map name as a shared map, the suffixes are
different.
 Verification Point file ( verificationpointname .rftvp )
Each script may also contain one or more verification point files. Verification
point files are not shared among scripts.
 Script Definition file (scriptname.rftdef )
Each script contains a script definition file. The script definition file contains
the name of the map file, script name, the names of all of the recognized
objects, and other file linkage information.
 Public Test Datapool ( filename.rftdp ) or Private Test Datapool
( scriptname.rftxdp )
You can associate a public or private test datapool with a test script. You can
associate a public test datapool with one or several test scripts.
This topic shows example hardware/software configurations for different
LabKey Server installations. These are intended as guidelines only -- your own
configuration should be adjusted to suit your particular requirements.

Small Laboratory Installation


The following configuration is appropriate for 10-20 users with small file and
table sizes. We assume that the server and database are located on the same
machine.

CPUs 2+ CPUs or Virtual CPUs

RAM 4GB (minimum) - 16GB (recommended)

Disk
164GB (64GB for File Storage, 100GB for database storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both


Operating Systems. Select the operating system which is best
supported by your organization)
Software • Java
• Tomcat
• DB software (PostgreSQL or MS SQL Server)
• See Supported Technologies for the specific versions to use.

As usage increases, increase the amount of RAM memory to 8GB at a


minimum (and also increase the memory used by Tomcat and the database
accordingly).

Large Multi-project Installation


The following configuration is appropriate for a 100s of users working on
multiple projects with large files and data tables.

We recommend placing the web server and the database server on different
machines in order to optimize maintenance, update, and backup cadences.

Machine #1: Web Server

CPUs 4+ CPUs or Virtual CPUs


RAM 8GB (minimum) - 16GB (recommended)

Disk
64GB (for OS and LabKey binaries), 512GB (for file storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both


Operating Systems. Select the operating system which is best
supported by your organization)
Software
• Java
• Tomcat
• See Supported Technologies for the specific versions to use.

Network 1 GB/s

Machine #2: Database Server

CPUs 4+ CPUs or Virtual CPUs

RAM 8GB (minimum) - 16GB (recommended)

Disk
100GB (for database storage)
Storage

• OS: Linux or Windows (LabKey Server is supported on both


Operating Systems. Select the operating system which is best
Software supported by your organization)
• DB software (PostgreSQL or MS SQL Server)
• See Supported Technologies for the specific versions to use.

Network 1 GB/s

SELF-CHECK 4.1-4

A. ENUMERATION: Write the hardware configuration for different types of


computers and then explain brief it.

1.
2.

3.

B. ESSAY:

1. What is software configuration management?

TASK SHEET 4.1-4

Corrective Action
 Hardware Configuration
 Software Configuration

Performance Objective: given necessary tools,equipment and materials,


you should be able to corrective action ff. standard operating procedures
within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

1. Annalyze the systems requirements.

2. Provides details about the Hardware and Software used in our testing.

3. Client Hardware and Software setup that was used the tests.

4. Configures the Hardware and Software.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 4.1-4

CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation


Annalyze the systems requirements

Provides details about the Hardware and Software used in our testing

Client Hardware and Software setup that was used the tests

Configures the Hardware and Software

 LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks

LESSON CONTENT: Testing Methods and Procedures

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the testing conducted


on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning

INFORMATION SHEET 5.1-1

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:


1. Identify the Inspect and Test the Computer Systems and Networks

2. Determine the Inspect and Test the Computer Systems and Networks

What is System Testing ?


System Testing means testing the system as a whole. All the
modules/components are integrated in order to verify if the system works as
expected or not.
System Testing is done after Integration Testing. This plays an important role
in delivering a high-quality product.

List of Tutorials:
 What is System Testing
 System vs end to end testing
The process of testing an integrated hardware and software system to verify
that the system meets its specified requirements.

A computer technician needs a good understanding of the health and safety


regulations to understand the good practices demanded by law. In particular,
you need to:

 report any accidents;


 take reasonable care of your own health and safety when moving heavy
components;
 not cause any electrical hazards;
 make sure that workstations meet safety requirements.

Technicians need to adhere to health and safety regulations as they will help to
protect everyone and to avoid any unnecessary legal action for reckless and
unsafe working practices. Any health and safety problems, the line manager or
the health and safety representative must be informed immediately.
The most basic test is to switch the system on to check it starts without errors.
ICT professionals are also likely to use tools and utilities to check that all is
well with the system after installation.
Diagnostic Tools in testing installed components
Diagnostic tools are used to test and diagnose equipment. Diagnostic tools
include the following:

 Digital multimeter is a device that can take many types of


measurements. It tests the integrity of circuits and the quality of electricity
in computer components. A digital multimeter displays the information on
an LCD or LED.
 A loopback adapter, also called a loopback plug, tests the basic
functionality of computer ports. The adapter is specific to the port that you
want to test.
 A toner probe is a two-part tool. The toner part is connected to a cable
at one end using specific adapters, such as an RJ-45, coaxial, or metal
clips. The toner generates a tone that travels the length of the cable. The
probe part traces the cable. When the probe is in near proximity to the
cable to which the toner is attached, the tone can be heard through a
speaker in the probe.

Software Tools
Like hardware tools, there are a variety of software tools that can be used to
help technicians pinpoint and troubleshoot problems. Many of these tools are
free and several come with the Windows operating system.

Disk Management Tools


Software tools help diagnose computer and network problems and determine
which computer device is not functioning correctly. A technician must be able
to use a range of software tools to diagnose problems, maintain hardware, and
protect the data stored on a computer.
You must be able to identify which software to use in different situations. Disk
management tools help detect and correct disk errors, prepare a disk for data
storage, and remove unwanted files.
The following are some disk management tools:

 FDISK: A command-line tool that creates and deletes partitions on a


hard drive. The FDISK tool is not available in Windows XP, Vista, or 7. It
has been replaced with the Disk Management tool.
 Disk Management Tool: Initializes disks, creates partitions, and formats
partitions.
 Format: Prepares a hard drive to store information.
 ScanDisk or CHKDSK: Checks the integrity of files and folders on a
hard drive by scanning the file system. These tools might also check the
disk surface for physical errors.
 Defragmentation: Optimizes space on a hard drive to allow faster access
to programs and data.
 Disk Cleanup: Clears space on a hard drive by searching for files that
can be safely deleted.
 System File Checker (SFC):  A command-line tool that scans the
operating system critical files and replaces files that are corrupted.

TEST PROCEDURES
A test procedure is a set of steps to guide you through what needs to be done
to thoroughly test the installation. It is designed to help you work more
effectively and to make sure you test everything that needs testing.

1. Gathering test information. The first step is to run the tests required


by the procedure and find out what happens. You should record all the
results of your tests in a log so that you know which pass and which fail,
thereby requiring further action.
2. Validating the test information.  The next step is to check the data you
gathered from the tests to make sure it is correct. This is usually done by
running the tests again.
3. Responding to test information.  This step is important because you
need to be able to recognize when a test shows problems or is successful.
For example, if ping is used to test a network connection then ‘Request
timed out’ shows the test was not successful.
4. Checking specification. The final step is an important end to testing.
You need to check the specification for the installation to make sure that it
has been met. For example, if a user requested an upgrade to make their
display run at 1920 x 1200, then the ICT professional should check that the
graphics card and screen can do this.

EXTERNAL VISUAL INSPECTION


The external visual inspection consists of a quick inspection of the exterior of
the computer, the monitor, the keyboard, any peripherals, and cables. While
performing the visual inspection, make any necessary corrections. To perform
the external visual inspection, perform the following steps:

1. Turn off the computer, the monitor, and all peripherals.


2. Verify that all power cables are properly connected to the computer, the
monitor and peripherals, and their power sources.
3. Verify that the keyboard and mouse interface cables are firmly attached
to the proper connectors on the back of the computer.
 For a PS/2-compatible mouse, the keyboard and mouse interface
cable connectors are identical except for their labels.
 For a serial mouse, the mouse interface cable must be firmly
attached to one of the serial port connectors, and its captive screws must
be secure enough to ensure a firm connection.
4. Verify that network cables (if present) are properly attached.
5. Verify that any devices attached to the serial and parallel port connectors
are properly connected.
 Each of the serial and parallel port interface cables must be firmly
attached to an appropriate connector on the back of the computer as well
as to the interface connector on the device. The captive screws that secure
these connectors at each end of the interface cable must be secure enough
to ensure a firm connection.
6. Verify that the video interface cable is firmly attached to the video
connector on the back panel or to a video expansion card, and also to the
connector on the back of the monitor. For proper connection of the video
monitor, check the documentation for the monitor.
7. Inspect all external monitor controls for any obvious damage or improper
settings.
8. Inspect the keyboard to ensure that no keys are sticking. If one or more
keys are sticking, it may be necessary to replace the keyboard.
9. Inspect the exterior of the computer, including all controls and
indicators, and all user-accessible data storage devices for any signs of
physical damage.

OBSERVING THE BOOT ROUTINE


After you have performed an external visual inspection, you should boot the
system and, while the boot routine is running, observe the system for any
indications of problems.
NOTE: Most of the steps in this procedure require observation of system
functions and indications, some of which can occur simultaneously. It may be
necessary to reboot the system several times to complete all of these steps.

1. If the system is off, turn on all peripherals and the computer.


2. Check the power supply fan. Does the fan run normally?
 Yes. Proceed to step 3.
 No. Troubleshoot the system power supply.
3. Watch the <Num Lock>, <Caps Lock>, and <Scroll Lock> indicators on
the upper-right corner of the keyboard. After all three indicators flash
momentarily, and following a long pause (approximately 30 seconds), the
Num Lock indicator should light up and remain on (unless the Num Lock
option is set to Off in the System Setup program). Do these indicators flash
on and off within approximately 10 seconds after the boot routine starts?
 Yes. Proceed to step 4.
 No. Troubleshoot the system power supply. If the troubleshooting
procedure indicates that the system power supply is operational,
troubleshoot the memory.
4. During the boot routine, observe the system for any of the following
indications:
 Beep codes — A beep code is a series of beeps that indicates an
error condition.
 System error messages — these messages can indicate problems or
provide status information.
 Diskette-drive and hard-disk drive access indicators  — These
indicators light up in response to data being transferred to or from the
drives. If either of these indicators fails to light up during the boot routine,
troubleshoot the diskette drive or hard-disk drive subsystem, as
appropriate.
5. Observe the monitor screen for the Diagnostics menu.

NOTICE: Before you proceed with the internal visual inspection, ensure
that all open files are saved and exited all open application programs if
possible.

INTERNAL VISUAL INSPECTION


A simple visual inspection of a computer’s interior hardware can often lead to
the source of a problem, such as a loose expansion card, cable connector, or
mounting screw. To perform the internal visual inspection, perform the
following steps:
1. Turn off the system, including any attached peripherals, and disconnect
all the 779 AC power cables from electrical outlets.
CAUTION: Before beginning to work inside the computer, disconnect the
power supply from the power source and the power supply cables from the
power supply.
2. Remove the computer’s right side cover.
CAUTION: The heat sink assembly can get extremely hot during system
operations. Be sure that it has had sufficient time to cool before touching it.

CAUTION: When handling the heat sink assembly, take care to avoid sharp
edges on the heat sink.

3. Verify that the chips, expansion cards, and SEC cartridge and heat sink
assembly or assemblies are fully seated in their sockets or connectors.
4. To ensure that the chips are fully seated in their sockets, press firmly on
the top of each chip.
5. Verify that all jumpers are set correctly.
6. Check all cable connectors inside the computer to verify that they are
firmly attached to their appropriate connectors.
7. Reinstall the computer cover.
8. Reconnect the computer and any attached peripherals to their power
sources, and turn them on.

Types Of System Testing


ST is called a superset of all types of testing as all the major types of testing are
covered in it. Although a focus on types of testing may vary on the basis of

product, organization processes, timeline, and requirements.

The overall it can be defined as below: 

Functionality Testing: To make sure that functionality of the product is


working as per the requirements defined, within the capabilities of the system.
Recoverability Testing: To make sure how well the system recovers from
various input errors and other failure situations.
Interoperability Testing: To make sure whether the system can operate well
with third-party products or not.
Performance Testing: To make sure the system’s performance under the
various condition, in terms of performance characteristics.
Scalability Testing: To make sure the system’s scaling abilities in various
terms like user scaling, geographic scaling, and resource scaling.
Reliability Testing: To make sure the system can be operated for a longer
duration without developing failures.
Regression Testing: To make sure the system’s stability as it passes through
an integration of different subsystems and maintenance tasks.
Documentation Testing: To make sure that the system’s user guide and other
help topics documents are correct and usable.
Security Testing: To make sure that the system does not allow unauthorized
access to data and resources.
Usability Testing: To make sure that the system is easy to use, learn and
operate.
SELF-CHECK 5.1-1

A. ENUMERATION: Write the test procedures

1.
2.

3.

4.

B. List down the OBSERVING THE BOOT ROUTINE and INTERNAL VISUAL
INSPECTION

1.
2.
3.
4.
5.
6.
7.
8.
TASK SHEET 5.1-1

Inspect and Test the Computer Systems and Networks

Performance Objective: given necessary tools,equipment and materials,

you should be able to testing methods and procedures ff. standard operating
procedures within 2 hour

Supplies/Materials and Equipment:

Operating systems,cable network,router ,switch hub,bay rack

Patch panel ,2 computer systems unit,table, printer scanner,PPE

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

 The very first step is to create a Test Plan.


 Create System Test Cases and test scripts.
 Prepare the test data required for this testing.
 Execute the system test cases and script.
 Report the bugs. Re-testing the bugs once fixed.
 Regression testing to verify the impact of the change in the code.
 Repetition of the testing cycle until the system is ready to be deployed.
 Sign off from the testing team.

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-1

CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

The very first step is to create a Test Plan

Create System Test Cases and test scripts

Prepare the test data required for this testing

Execute the system test cases and script

Report the bugs. Re-testing the bugs once fixed

Regression testing to verify the impact of the change in the code

Repetition of the testing cycle until the system is ready to be deployed

Sign off from the testing team

 LEARNING OUTCOME NO.5


Inspect and Test the Computer Systems and Networks

LESSON CONTENT: 5s and 3Rs Environmental Policies

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the testing conducted


on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 5.1-2

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the 5s and 3Rs Environmental Policies

2. Determine the 5s and 3Rs Environmental Policies

What is 5s and 3rs environmental policies?

5S or good housekeeping involves the


principle of waste elimination through
workplace organization. 5S was derived
from the Japanese words seiri, seiton,
seiso, seiketsu, and shitsuke. In English,
they can be roughly translated as sort, set
in order, clean, standardize, and sustain.
The cornerstone of 5S is that untidy,
cluttered work areas are not productive. As
well as the physical implications of junk
getting in everybody’s way and dirt
compromising quality, we all are happier in
a clean, tidy environment and hence more
inclined to work hard with due care and
attention. 5S and good housekeeping are
core elements of lean thinking and a visual
workplace and are a fundamental platform
for world-class manufacturing.
5S provides the foundation for all quality improvement programs. It is a
process to create more productive people and more productive companies
through motivation, education, and practice. It involves the creation of a strong
corporate culture with a productivity mindset.

What is 5S
 
One of the most powerful Lean Manufacturing Tools and a cornerstone of any
successful implementation is that of 5S, but what is 5S and its 5 Steps of Seiri,
Seiton, Seiso, Seiketsu and Shitsuke?
5S is a simple tool for organizing your workplace in a clean, efficient and safe
manner to enhance your productivity, visual management and to ensure the
introduction of standardized working.
Most of the other definitions of 5S and descriptions that I see here on the
internet concentrate heavily on the aesthetics and the efficiency gains that you
achieve through implementing 5S and neglect the real aim of 5S; the need to
introduce standard operational practices to ensure efficient, repeatable, safe
ways of working.
In addition to standardised working which provides you with a stable
foundation to build all of your other improvements through implementing Lean
Tools, you also provide a highly visual workplace. One of the most important
factors of 5S is that it makes problems immediately obvious.
5S is a team run process and should be conducted by the people who work
within the area in which the principles of 5S are being applied, it is not a tool
that can be applied by an outsider onto an area without the knowledge and
cooperation of the people within it.
 

Origins of 5S
5S as a methodology has come out of the techniques within Total Productive
Maintenance (TPM) and from the Toyota Production System (TPS). However
many of the individual components such as creating ergonomic and efficient
work places can be seen to owe their roots to people such as Taylor for his
work on “scientific management” and Frank Gilbreth’s “time and motion
studies.”
Frank Gilbreth showed that by improving the ergonomics of a bricklayers
working methods he could reduce the number of individual movements
required and increase the hourly output from 120 to 350 bricks laid each hour.
 
The Concept of 5S
5S is a methodical way to organize your workplace and your working practices
as well as being an overall philosophy and way of working. It is split into 5
phases, each named after a different Japanese term beginning with the letter
“S”; (Seiri, Seiton, Seiso, Seiketsu, Shitsuke) hence the name 5 S.
These five distinct phases are (with English descriptions);

Steps of 5S
 
5S Seiri;           Sort, Clearing, Classify
5S Seiton;        Straighten, Simplify, Set in order, Configure
5S Seiso;          Sweep, shine, Scrub, Clean and Check
5S Seiketsu;     Standardize, stabilize, Conformity
5S Shitsuke;     Sustain, self discipline, custom and practice
And for completeness, some companies add a 6th (6S) of Safety, although in
my opinion this should be an integral part of the steps of 5S and not a separate
stage in itself.
 
 
 
5C and CANDO
 There has been reluctance for some companies in the past to take up
“Japanese” initiatives for business improvement, so some consultancies and
other bodies have come up with non-Japanese equivalents; two of which are
listed below as alternatives for 5S.
5S is also known in some quarters as 5C, with the “S” words replaced by

 Clearing,
 Configure,
 Clean and Check,
 Conformity and finally
 Custom and practice.

CANDO is;

 Cleanup,
 Arrange,
 Neatness,
 Discipline, and
 Ongoing Improvement.

5S Definition
 
Below are definitions and explanations of each step of the 5S process;
 

5S Seiri or Sort
 
5S Seiri removing Clutter
 
5S Seiri or Sort is the first step in 5S, it refers to the sorting of the clutter from
the other items within the work area that are actually needed. This stage
requires the team to remove all items that clearly do not belong in the working
area and only leave those that are required for the processes in question.
 
 

5S Seiton or Straighten / Set in order


 
5S Seiton organized workspace
 
 
5S Seiton or Straighten is the process of taking the required items that are
remaining after the removal of clutter and arranging them in an efficient
manner through the use of ergonomic principles and ensuring that every item
“has a place and that everything is in its place.”

SELF-CHECK 5.1-2
A. ENUMERATION: Write the 5s and 3rs environmental policies

B. What is 5S?- Write the meaning


TASK SHEET 5.1-2

5s and 3Rs Environmental Policies

Performance Objective: given necessary tools,equipment and materials,

you should be able to 5s and 3Rs Environmental Policies ff. standard operating
procedures within 2 hour

Supplies/Materials and Equipment:

PPE ,Cleaning Materials of Housekeeping

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below of 5s and 3Rs Environmental


Policies

a. 5S is a foundation for more disciplined actions.


b. Cleaner and safer work areas
c. Less wasted time through more workplace organization
d. Less space
e. Improved self-discipline
f. Improved culture

Assessment Method:

Demonstration
PERFORMANCE CRITERIA CHECKLIST 5.1-2

CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

5S is a foundation for more disciplined actions.

Cleaner and safer work areas

Less wasted time through more workplace organization

Less space

Improved self-discipline

Improved culture
 LEARNING OUTCOME NO.5

Inspect and Test the Computer Systems and Networks

LESSON CONTENT: STATUS AND FINAL TEST REPORT

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the testing conducted


on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 5.1-3

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the status and final test report

2. Determine the status and final test report

About Computer Status reports and logs


Article Id: 177833

Status: Published

Updated On: 14-01-2009 11:15

Legacy Id: TECH95541

Products:

Endpoint Protection

Issue/Introduction:

Resolution:

About the information in the Computer Status reports and logs

The Computer Status log contains information about the real-time


operational status of the computers in the network. Information available
includes the computer name and IP address, last check-in time,
definitions date, infected status, Auto-Protect status, server, group,
domain, and user name. Filters for Computer Status reports have both
standard configuration options and compliance-specific options.

The table below describes some typical uses for the kind of information
that you can get from Computer Status reports and logs.

Report or log Typical uses

Virus Definitions Use this report to make sure that all the groups, domains, or servers in
Distribution your network use up-to-date virus definitions files versions.

Computers Not Use this report to find the computers that have not checked in with a
Checked into server and therefore might be lost or missing.
Server

Symantec Use this report to check the versions of product software, virus
Endpoint definitions, IPS signatures, and proactive protection content in use in
Protection Product your network. With this information you can pinpoint the computers that
Versions need an update.

Intrusion Use this report to make sure that all the groups your network use up-to-
Prevention date intrusion prevention signatures. You can also see which domains or
Signature servers are out-of-date.
Distribution

Client Inventory Use this report to see the number and percentage of computers that fall
into certain hardware and software categories. Available information
includes the computers' operating system, total memory, free memory,
total disk space, free disk space, and processor type. For example, from
the Client Inventory report, you might see that 22% of your computers
have less than 1 GB of free disk space.

Compliance Status Use this report to see which groups or subnets have the largest
Distribution percentage of computers out of compliance. You may want to
investigate if certain groups seem to have a lot more compliance
problems than others.

Client Online Use this report to see which groups or subnets have the largest
Status percentage of clients online. You may want to investigate why some
groups or subnets currently experience more problems than others.

Clients With Latest Use this report to see which groups or subnets have the largest
Policy percentage of computers that don't have the latest policy on them.

Client Count by Use this report to see the total number of clients and users, by group.
Group

Security Status Use this report to quickly see the total number of computers that
Summary have the following problems:

o Auto-Protect is disabled

o The antivirus engine is turned off

o Tamper Protection is turned off

o The computer needs to be restarted

o The computer failed a host integrity check

o Network Threat Protection is turned off


These computers may continue to be at risk unless you intervene.

Protection Content Use this report to check the versions of Proactive Protection content in
Versions use in your network, to pinpoint any computers that need an update.

Client Migration Use this report to see the migration status of clients by domain, group,
and server. You can quickly identify clients where migration has failed or
has not yet started.

Clients Online/ Use this report to pinpoint the clients that don't connect to the network
Offline Over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)

Clients With Latest Use this report to pinpoint the clients that don't get policy updates
Policy over Time frequently enough. This report is available only as a scheduled report.
(Snapshots)

Client Software Use this report to pinpoint the clients that don't have the latest software
Rollout version deployed. This report is available only as a scheduled report.
(Snapshots)

Non-compliant Use this report to pinpoint the clients that frequently fail host integrity
Clients Over Time checks. This report is available only as a scheduled report.
(Snapshots)

Virus Definitions Use this report to check to see the definitions versions that clients have.
Rollout This report is available only as a scheduled report.
(Snapshots)

Computer Status Check the Computer Status log if you need more details about any of
log the areas that the reports cover.

References: 2009081409151448 - About the different types of Symantec


Endpoint Protection Manager Reports
 LEARNING OUTCOME NO.5
Inspect and Test the Computer Systems and Networks

LESSON CONTENT: WASTE MANAGEMENT

ASSESSMENT CRITERIA:

1. Final inspections are undertaken to ensure that the testing conducted


on the device conforms with the manufacturer’s instruction/manual

2. Computer systems and networks are checked/tested to ensure


safe operation.

3. OHS standards and 5S principles are followed according to


enterprise policies

4. Work site is cleaned and cleared of all debris and left in safe condition
in accordance with company procedures

5. Excess components and materials are disposed of based on WEEE


directives and 3Rs waste management program.

6. Report is prepared and completed according to company requirements

RESOURCES:

Tools, Materials and Equipment and Facilities

METHODOLOGIES:

Lecture /discussion

Demonstration

Self-learning
INFORMATION SHEET 5.1-4

Inspect and Test the Computer Systems and Networks

LEARNING OBJECTIVES:

After reading of this Information Sheet, you should be able to:

1. Identify the waste management

2. Determine the waste management

Waste disposal, the collection, processing, and recycling or deposition of the


waste materials of human society. Waste is classified by source
and composition. Broadly speaking, waste materials are either liquid or solid in
form, and their components may be either hazardous or inert in their effects
on health and the environment. The term waste is typically applied to solid
waste, sewage (wastewater), hazardous waste, and electronic waste.

In industrialized countries, municipal liquid waste is funneled through sewage


systems, where it undergoes wastewater treatment, or sewage treatment. This
process removes most or all of the impurities from wastewater, or sewage,
before they can reach groundwater aquifers or surface waters such
as rivers, lakes, estuaries, and oceans. (For more information on sewage
systems and treatment, see wastewater treatment.

wastewater-treatment plant
Wastewater-treament plants remove chemical or biological waste from water.

Refuse, or municipal solid waste (MSW), is nonhazardous solid waste from


a community that requires collection and transport to a processing or disposal
site. Refuse includes garbage and rubbish. Garbage is mostly decomposable
food waste, and rubbish is mostly dry material such as glass, paper, cloth,
or wood. Garbage is highly putrescible or decomposable, whereas rubbish is
not. Trash is rubbish that includes bulky items such as old refrigerators,
couches, large tree stumps, or construction and demolition waste (e.g.,
wood, drywall, bricks, concrete, and rebar [a steel rod with ridges for use in
reinforced concrete]), all of which often require special collection and handling.
Refuse is often deposited in sanitary landfills—that is, pits or other sites sealed
with impermeable synthetic bottom liners where waste is isolated from the rest
of the environment. (For more information on the treatment of solid
wastes, see solid-waste management.)

Zero Waste is a set of principles focused on waste prevention that encourages


the redesign of resource life cycles so that all products are reused. The goal is
for no trash to be sent to landfills, incinerators or the ocean. Currently, only
9% of plastic is actually recycled. In a zero waste system, material will be
reused until the optimum level of consumption.[1] The definition adopted by
the Zero Waste International Alliance (ZWIA)[2] is:
Zero Waste: The conservation of all resources by means of responsible
production, consumption, reuse and recovery of all products, packaging, and
materials, without burning them, and without discharges to land, water or air
that threaten the environment or human health.
Zero Waste refers to waste prevention as opposed to end-of-pipe waste
management.[3] It is a whole systems approach that aims for a massive change
in the way materials flow through society, resulting in no waste. [3] Zero waste
encompasses more than eliminating waste through recycling and reuse. It
focuses on restructuring production and distribution systems to reduce waste.
[4]
 Zero waste is more of a goal or ideal rather than a hard target.[according to whom?]
[5]
 Zero Waste provides guiding principles for continually working towards
eliminating wastes.[3]
Advocates expect that government regulation is needed to influence industrial
choices over product and packaging design, manufacturing processes, and
material selection.[6]
Advocates say eliminating waste decreases pollution, and can also reduce costs
due to the reduced need for raw materials.

How to Recycle Your E-Waste Safely

The good news is that you have plenty of options for properly recycling or
donating your used electronics. It’s important to understand this: Even if you
take your e-waste down to your local recycling center, there’s a high
probability that it won’t get recycled properly. As ABC News discovered, e-
waste recyclers are often more concerned with making a buck than they are
with making sure these hazardous materials are disposed of properly. So
what can you do?

1. Use a Certified E-Waste Recycler


Find an e-waste recycler certified through the Basel Action Network (BAN) .
BAN is a non-profit organization devoted to certifying e-Stewards, recyclers
who are committed to safely and responsibly recycling electronics. Members
take and demonstrate the Pledge of Responsible Recycling, so working with a
certified e-Steward means you don’t have to worry that your gadget will
become another nation’s pollution or a criminal’s newest
project. BAN’s recycler locator will help you find the certified safety and
comfort of e-Stewards in your area.

2. Visit Civic Institutions


Check with your local government, schools, and universities for additional
responsible recycling options. With e-waste becoming such a large problem,
government offices and schools are assigning days when citizens can bring
unwanted electronics to a designated drop-off location.

Many communities post a calendar that will include recycling days, so check
your local paper or visit their website. When you recycle your items locally,
you can make the occasion a day trip and a community event. Encourage
your neighbors to join you and spread the word about educated e-waste
disposal.

3. Explore Retail Options


Best Buy, for example, isn’t certified through BAN’s e-Steward program, but
they do have an effective recycling program in all of their stores. They claim to
only use recyclers who adhere to the highest standards of e-waste processing.
Specifically, their website discloses that e-waste that you bring to their stores
will not end up in a foreign country or in any landfill:

Best Buy makes sure that the recyclers we work with adhere to the highest
guidelines and standards so that the products customers bring into our
stores for recycling don’t end up in landfills or in foreign countries, and that
all hazardous materials are disposed of properly. We partner directly with a
short list of qualified, respected recycling companies who ensure all products
collected for recycling through Best Buy are handled responsibly. These
recycling companies meet our standards, and we encourage them to examine
and consider additional third-party standards for responsible practices (such
as the EPA R2 and e-Stewards).

You can drop off all kinds of e-waste for recycling at Best Buy including:
 Cell phones
 TVs
 Power cords
 GPS devices
 Speakers
 DVD players
 Paper shredders
 Memory cards
 Desktops
 Laptops
 Netbooks
Additionally, Gettington teams up with an e-Stewards partner, CExchange, to
provide you with an opportunity to recycle your e-waste via pre-paid postage
containers. You can recycle old items and get the benefit of cash reward for
some products. You can even transfer the rewards to charitable organizations.

4. Donate Your Electronics


Reusing is always better than recycling. If your electronics still have life left,
you can reduce e-waste pollution and share technology with people who
wouldn’t otherwise have access to it.

Organizations like Cell Phones for Soldiers  and Verizon’s HopeLine


program will make sure your old cell phone makes its way to a worthy cause.
Other organizations, like the Salvation Army and Goodwill, can sell your used
electronics and use the profits to educate and empower others who need help.
Goodwill has been particularly active with its Reconnect program, which has
a strict no-export policy.

Gazelle, a marketplace that can also provide some cash incentives, will help
you organize a Gadget Drive if you’re trying to raise money for your school or
non-profit. To get a feel for the kind of money people are willing to spend,
check out Ecosquid. When you run a Gadget Drive, people in your community
will drop off their devices. You’ll ship everything off to Gazelle, and then you’ll
get a check for everything that was donated. Gazelle, in turn, will either sell
the electronics or make sure they’re recycled responsibly.

SELF-CHECK 5.1-4
A. ENUMERATION: Write the Recycle Your E-Waste Safely and explain
brief it.

TASK SHEET 5.1-4

WASTE MANAGEMENT
Performance Objective: given necessary tools,equipment and materials,

you should be able to waste management ff. standard operating procedures


within 2 hour

Supplies/Materials and Equipment:

PPE, cleaning materials

Steps / Procedure:

1.Wear your ppe

2.Observe safety and proper sanitation

3.Gather the necessary materrials and equipment

4.Follow the steps / procedures below

5 stages of waste management. Stage 1: Preventing waste generation

1. Prevention.
2. Preparation for reuse.
3. Recycling.
4. Other utilization (e. g. energy recovery).
5. Landfilling.

Assessment Method:

Demonstration

PERFORMANCE CRITERIA CHECKLIST 5.1-4


CRITERIA YES NO

Did you…….
Wear your ppe

Observe safety and proper sanitation

Gather the necessary materrials and equipment

Prevention

Preparation for reuse

Recycling

Other utilization (e. g. energy recovery)

Landfilling

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy