How To Run Scan Disk in Windows 2000 and Windows XP

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

How to Scan Disk

Scan Disk is one of the most common maintenance tools bundled with an operating system. This
is an application that checks the computer’s hard drive for errors and bad sectors. Once Scan Disk finds
an error in the hard drive, it will attempt to fix it.
What Does Scan Disk Do?
Scan Disk is designed to repair damaged hard drive sectors and clusters on your computer’s
hard drive. Scan Disk also checks and repairs the integrity of file systems such as FAT, FAT32, and
NTFS.
Scan Disk requires exclusive access to a drive when it executes. Hence, if one or more of
the files are open on the drive that you want to scan, Scan Disk may display a prompt asking if you
want to schedule the drive check the next time you restart your computer.
Once Scan Disk finishes its task, it provides a report that contains the errors it has found and the
amount of disk space it has scanned. It is therefore important for users to use the Scan Disk application
because it ensures that their data is safe from being corrupted. Aside from this, there is a guarantee that
their computer will perform at optimum levels.
The earliest Scan Disk version appeared in MS DOS 6.2. In Windows 95 and 98, Scan Disk was
given a graphical user interface (GUI). In this graphical environment, the user can find:

How to Run Scan Disk in Windows


2000 and Windows XP

Press the Start button on


desktop.
Double click on My Computer.
Highlight the disk to be scanned
for bad sector on the list of Hard
Disk Drives.
Open the File menu and select
Properties option.
Select the Tools tab.
Click the Check Now button.
The scanning process will then
initiate. 170 Figure
How to Run Scan Disk in Windows Vista Click the
Computer icon on the desktop.
• Right click the drive to be scanned with Scandisk and select Properties.
• Click on the Tools tab. Under the Error-checking sub heading, click the Check Now button.
• A window named Check Local Disk will appear. To attempt to correct errors, check the Scan for
and attempt recovery of bad sectors checkbox.
• Click Start to initiate the disk scan. In Vista, it is required to schedule the Scandisk to run at boot
time as Vista has mechanisms that do not allow it to run while the system is operating.
Run Scan Disk on Windows 7
In the deployment of Windows 7, the Scan Disk utility underwent a name change and is now called
“CHKDSK” that performs the same functions as the legacy application for the Operating System.
Run CHKDSK Using the Graphical User Interface (GUI)
Step 1 – Select the “Computer” option from the Start menu.
Step 2 – Right click the drive to check for errors followed by clicking the
“Properties” menu button.
Step 3 – Select the “Tools” menu option followed by the “Check Now” menu button.
If the computer drive is in use, the Operating System will d isplay a dialogue menu asking if you
desire to schedule a full scan in the future.
Run CHKDSK from the DOS Command Prompt
Alternatively, CHKDSK can be run from the DOS or Command prompt on the Windows 7 OS.
Step 1 – Open the DOS prompt on your computer by selecting the “Start” and “Run” menu options.
Step 2 – Enter “cmd” followed by the “enter” key to open the command prompt.
Step 3 – Enter “chkdsk c:” to initiate a system check of the local hard drive. If you desire all errors to
be fixed through invocation at the DOS prompt, enter “CHKDSK c: /F /R” to find and fix all errors on
the local drive. If your hard drive is labeled with a different letter than “c” just replace the letter in the
above example with the actual hard drive letter on your computer.

DELETING TEMPORARY FILES


Remove Unnecessary Data Files and Programs
Files and programs that are left idle or cluttering in your computer tend to affect the performance
of your system. This happens when the disk space is heavily occupied and more computer resources are
allocated to keep track of them
Unused Software Application
These are usually the software program that you have installed but used rarely if not at all.
To remove unwanted programs and applications, follow these steps:
• Click Start, point to Settings, select Control Panel.
• Double click on the Add/Remove Programs icon.
Figure 171. Add or Remove Programs

• Select the unused program and click on the Remove button.

Temporary Internet Files


These are files that accumulate in your computer when you surf the web. Temporary files such as
graphics, web pages and cookies are downloaded into a special temporary folder to facilitate efficient web
browsing. To delete all temporary Internet files, follow these steps:
• Click Start, point to Settings, select Control Panel.
• Double click on Internet Options.
• Under the Temporary Internet Files group box, click the Delete File button.
• Check the Delete All Offline Content option on the new window and click Ok.

Windows Temporary Files


Windows temporary files are generated and stored in your computer each time you perform a
software installation or procedure. To delete these temporary files, follow these
steps:
• Click Start, point to Programs, point to Accessories.
• Point to System Tools and select Disk Cleanup.
• Select the drive to clean up
• Click OK.
Disk Cleanup
Disk Cleanup is a computer maintenance utility that is included in the Microsoft Windows operating
system and is designed to free up space on the hard drive. Disk Cleanup helps free up space on your hard
drive. Disk Cleanup searches your drive, and then shows you temporary files, Internet cache files, and
unnecessary program files that you can safely delete.
Here is the list of all the files that can be deleted from Windows XP:

1. Downloaded program files


2. Temporary Internet files
3. Offline webpages
4. File for the Recycle Bin
5. Temporary files
6. Web client/publisher temporary files
7. Compressed old files
8. Catalog files for the content indexer
To delete files using Disk Cleanup
The following procedure cleans up files associated with your user account. You can also use Disk
Cleanup to clean up all the files on your computer.
1. Open Disk Cleanup by clicking the Start button . In the search box, type Disk Cleanup, and
then, in the list of results, click Disk Cleanup.
2. In the Drives list, click the hard disk drive that you want to clean up, and then click OK.
3. In the Disk Cleanup dialog box, on the Disk Cleanup tab, select the check boxes for the file types
that you want to delete, and then click OK.
4. In the message that appears, click Delete files.
Remove Unnecessary Startup Programs
Some applications are automatically configured to load each time you boot into Windows. These
programs are usually represented by icons that are loaded in your system tray (the panel located at the
bottom right corner of your screen). Most of which are unnecessary and tend to take up unnecessary
system resources which often slow down your computer. Microsoft provides a tool called the System
Configuration Utility that enables you to configure the programs to be loaded during startup.
To use this utility, follow these steps:
1. Click Start, point to Run.
2. Type in: msconfig 3. Click on the Startup tab.

4. A list of options will appear indicates that the programs that start up each time you load Windows.
5. Tick only those that are necessary and click OK.
6. Restart your computer. Click Restart.
If you are a Windows 2000 and Windows NT users, you can still use the same program msconfig.exe.
Since Microsoft did not include the utility in these two versions of Windows, you have to download it. Once
you have downloaded the file into your computer, follow these steps:
1. Unzip the file.
2. Copy the msconfig.exe file into the C:\winnt\system32 folder.
3. To access the utility, click Start, select Run and type in: msconfig. Ignore the error messages about
not being able to find the following files:
o config.sys o autoexec.bat o
win.ini o system.ini

The following are the procedures on how to maintain computer system and networks:

Create an Equipment Maintenance Schedule

In order to perform the maintenance of your computer efficiently, a maintenance schedule is made
to guide the personnel in the proper maintenance procedure. This will help them remember the
maintenance task that needs to be done in order to improve the functionality of the computer system and
networks.

Create a Maintenance Checklist

To determine if the maintenance program is implemented according to what is planned, an


assessment must be done. The result of the assessment will then be recorded and reported to the proper
authorities for immediate action.
Just knowing all the basics of computer maintenance task schedule clearly will not be enough.
Find time to apply all of the maintenance procedure regularly and frequently. Make computer maintenance
activities a regular practice, so that you always have a fine tuned computer with good performance.
Perform Network Maintenance Procedures

Networks are used to transmit information and electricity through cables. When installing these
networks, at most care must be applied to protect the network installers from injury. Procedures must also
be followed to ensure that those around the network cables do not become the victims of electrical fires or
other hazards.
1. Duct Systems
Networks are sometimes installed in duct systems. There is a concern that the network
cables might become damaged during construction, so the ducts must be built away from
planned future road construction and utilities, according to the International
Telecommunication Union.
Optical Lasers
Networks that use optical lasers uses invisible radiation that is emitted by these lasers. Before
installing the laser, the laser operation manual and safety guide must be read, according to Net
Ap. No one should stare inside the optical ports from where the lasers emit their light or else
blindness could result. When working with the laser, safety goggles must always be worn.
Falling
Many networks are run along utility poles, which are wooden poles that have network cables raised
high above the ground. When installing these cables, falling can be disastrous given the height of
the utility poles. Therefore, network installers should wear safety harnesses to ensure that they do
not fall.
De-Energize
Some networks have cables that are electrically charged. These cables must be de-energized and
tests should be used to ensure that the cables do not have any remaining electricity in them. The
tools that are used for repairing the cables are insulated so that electricity does not travel through
them and into the hands of the line repairer.
Cable Safety Standards
Network cables must have certain characteristics to be legally used for networks. The cables must
not produce flames that can ignite anything. They must not have halogen. They must not produce
acidic fumes. They must be resistant to ionizing radiation. Cables must be coded so that those
working with the cables can identify what they are.
Cable Inspection
Networks must only be installed by licensed professionals. Building inspectors must check the
network cables to ensure that they are installed properly and that they will not create a fire hazard.
These building inspections are especially important when the property containing the network
cables is sold.
General Safety
Safe working conditions help prevent injury to people and damage to computer equipment. A safe
work space is clean, organized, and properly lighted. Everyone must understand and follow safety
procedures. .
These are some of the basic safety precautions to observe when working on a computer:
• Remove your watch and jewelry and secure loose clothing.
• Turn off the power and unplug equipment before performing service.
• Cover sharp edges inside the computer case with tape.
• Never open a power supply or a CRT monitor.
• Do not touch areas in printers that are hot or that use high voltage.
• Know where the fire extinguisher is located and how to use it.
• Keep food and drinks out of your work space.
• Keep your work space clean and free of clutter.
• Bend your knees when lifting heavy objects to avoid injuring your back.
Electrical Safety
Follow electrical safety guidelines to prevent electrical fires, injuries, and fatalities in the home and
the workplace. Power supplies and CRT monitors contain high voltage.
CAUTION
Only experienced technicians should attempt to repair power supplies and CRT monitors.
Some printer parts become hot during use, and other parts might contain high voltage. Check the
printer manual for the location of high-voltage components. Some components retain a high voltage even
after the printer is turned off. Make sure that the printer has had time to cool before making the repair.
Electrical devices have certain power requirements. For example, AC adapters are manufactured
for specific laptops. Exchanging power cords with a different type of laptop or device may cause damage
to both the AC adapter and the laptop.
Follow fire safety guidelines to protect lives, structures, and equipment. To avoid an electrical
shock and to prevent damage to the computer, turn off and unplug the computer before beginning a repair.
The following are general information on electrical safety:
• Electrical equipment that is plugged into a power source should NEVER be handled if your hands
or feet are wet.
• Do not allow cables and plugs to get wet. Thus, keep liquids away from electrical equipment.
• Unplug equipment by pulling on the plug, not the cord.
• Damaged electrical equipment that constitute an electrical hazard are not to be used until
properly repaired or replaced.
• Never connect electrical cords in series.
• All electrical circuit disconnects or panels must not be blocked.
• Ground pins on the plugs and the devices plugged into the receptacles must be intact.
• Do not store flammable liquids near electrical equipment.
Fire Safety
Fire can spread rapidly and can be very costly. Proper use of a fire extinguisher can prevent a
small fire from getting out of control. When working with computer components, be aware of the possibility
of an accidental fire and know how to react. Be alert to notice odors being emitted from computers and
electronic devices. When electronic components overheat or short out, they emit a burning odor. If there
is a fire, follow these safety procedures:
• Never fight a fire that is out of control or not contained.
• Always have a planned fire escape route before beginning any work.
• Get out of the building quickly.
• Contact emergency services for help.
• Locate and read the instructions on the fire extinguishers in your workplace before you use them.
Be familiar with the types of fire extinguishers used in your country or region. Each type of
fire extinguisher has specific chemicals to fight different types of fire.
Types of Fires
Not all fires are the same. Different fuels create different fires and require different types of fire
extinguishing agents.
Class A
Class A fires are fires in ordinary combustibles such as wood, paper, cloth,
trash, and plastics.

Class B
Class B fires are fires in flammable liquids such as gasoline, petroleum oil and
paint. Class B fires also include flammable gases such as propane and butane.
Class B fires do not include fires involving cooking oils and grease.
Class C
Class C fires are fires involving energized electical equipment such as motors,
transformers, and appliances. Remove the power and the Class C fire becomes one
of the other classes of fire.

Class D
Class D fires are fires in combustible metals such as potassium, sodium,
aluminum, and magnesium.

Class K
Class K fires are fires in cooking oils and greases such as
animals fats andvegetable fats.

Some types of fire extinguishing agents can be used on more


than one class of fire. Others have warnings where it would be dangerous for the
operator to use a particular fire extinguishing agent.
Different types of fire extinguishers are designed to fight different classes of
fire. The three most common types of fire extinguishers are: Water (APW), Carbon
Dioxide (CO2), Dry Chemical (ABC,BC,DC).
Water and Foam fire extinguishers snuff the fire by taking away the heat
element of the fire triangle. Foam agents also separate the oxygen element from the
other elements.
Water extinguishers are for Class A fires only - they should not be used on Class B or C fires. The
discharge stream could spread the flammable liquid in a Class B fire or could create a shock hazard on a
Class C fire.
Carbon Dioxide fire extinguishers snuff fire by taking away the oxygen element of the fire triangle
and also be removing the heat with a very cold discharge.
Carbon dioxide can be used on Class B & C fires. They are usually ineffective on Class A fires.
Dry Chemical fire extinguishers extinguish the fire primarily by interrupting the chemical reaction
of the fire triangle. Today's most widely used type of fire extinguisher is the multipurpose dry chemical that
is effective on Class A, B, and C fires. This agent also works by creating a barrier between the oxygen
element and the fuel element on Class A fires.
It is important to know how to use a fire extinguisher. Use the memory aid P-A-S-S to remember
the basic rules of fire extinguisher operation:
• P: Pull the pin.
• A: Aim at the base of the fire, not at the flames.
• S: Squeeze the lever.
• S: Sweep the nozzle from side to side.
Burn-In Testing
Burn-in testing enables you to run test scripts and to create new scripts. The Diagnostics main
menu provides two burn-in selections, Immediate Burn-In Testing and Deferred Burn-In Testing.
• Immediate Burn-In enables you to run an existing script and to select configuration options.
Deferred Burn-In enables you to create a new script.
Standard Scripts
Sun provides three ready-made scripts designed to test the general health of the devices on your
system. These scripts include:
• quick.tst
This script performs a series of tests that require the user to interact with the test software. When
they require a user interaction, they stop and do not time out. These tests are faster than the full.tst but
they are less thorough. For example, they do not run all the tests associated with a DIMM.
• noinput.tst
This script performs a non-detailed test of most hardware components, excluding those
components that require user input (keyboard, mouse, sound, and video). This test does not require user
input. It is normally the first test performed for hardware-related problems.
• full.tst
This script performs a detailed and comprehensive test on all hardware components, including
those that require user input. It includes external port tests and requires loopback connectors on COM
ports, parallel ports, and USB ports. You must interact with the test utility to progress through these
interactive tests.

Performing Immediate Burn-In Testing


Use Immediate Burn-In Testing to run test scripts.
To Perform Immediate Burn-In Testing
1. From the Diagnostics main menu, select Immediate Burn-In Testing. The screen displays a list of
settings shown in TABLE 6-3 and a Burn-In menu.
2. From the menu, select Load Burn-In Script.A text box appears.
3. Type the name of the script you want to run, for example quick.tst, noinput.tst, or full.tst.
4. To change any of the options, select Change Options at the bottom of the screen.
This opens the Burn-In Options menu, which enables you to modify the options listed in TABLE 6-3
for the currently loaded test script.
5. Select Perform Burn-In Tests.
The diagnostics software executes the test script as configured.
Show Results Summary
Selecting show results summary on the diagnostics main menu displays the tests that have been
run and lists the results, which can be Pass, Fail, or Not Applicable.

• Processor
This section shows the following tests conducted against the processor: Core Processor Tests,
AMD 64-Bit Core Tests, Math CoProcessor Tests - Pentium Class FDIV and Pentium Class FIST, MMX
Operation, 3DNow! Operation, SSE Instruction Set, SSE2 Instruction Set, and MP Symmetry.
• Motherboard
This section shows the following tests conducted against the motherboard: DMA Controller Tests,
System Timer Tests, Interrupt Test, Keyboard Controller Tests, PCI Bus Tests, and CMOS RAM/Clock
Tests.
• Memory, Cache Memory, and Video Memory
This section shows the following tests conducted against the various types of memory: Inversion
Test Tree, Progressive Inversion Test, Chaotic Addressing Test, and Block Rotation Test.
• Input Device
This section shows the following tests conducted against the input device: Verify Device, Keyboard
Repeat, and Keyboard LEDs. Mouse
This section shows the following tests conducted against the mouse: Buttons, Ballistics, Text Mode
Positioning, Text Mode Area Redefine, Graphics Mode Positions, Graphics Area Redefine, and Graphics
Cursor Redefine.
• Video
This section shows the following tests conducted against the video: Color Purity Test, True Color
Test, Alignment Test, LCD Test, and Test Cord Test.
• Multimedia
This section shows the following tests conducted against the multimedia components: Internal
Speaker Test, FM Synthesizer Test, PCM Sample Test, CD/DVD Drive Read Test, CD/DVD Transfer
(KB/Sec), CD/DVD Transfer Rating, CD/DVD Drive Seek Test, CD/DVD Seek Time (ms), CD/DVD Test
Disk Read, and CD/DVD Tray Test.
• ATAPI Devices
This section shows the following tests conducted against ATAPI devices: Linear Read Test, Non-
Destructive Write, and Random Read/Write Test.
• Hard Disk
This section shows the following tests conducted against the hard disk: Read Test, Read Verify
Test, Non-Destructive Write Test, Destructive Write Test, Mechanics Stress Test, and Internal Cache Test.
• USB
This section shows the following tests conducted against the USB: Controller Tests and Functional
Tests.
• Hardware ID
The compare test is used to determine the machine ID for the system. This test is not available for
the Sun Blade X6275 server module.
Print Results Report
The Print Results Report option enables you to print results of the diagnosis of your server if it is
connected to a printer through a parallel port.
Exit
The Exit option exits the PC-Check software and reboots the server module.
Viewing the PC-Check Results
You can use the text file editor to view the results when you run PC-Check manually. To do this, you need
to know the name of the file or files produced by the tests.
PC-Check Filenames
When you run a test, the header of the screen where you invoke the test shows you the name of the
output file. For example, when you run the continuous burn-in test, the name of the output file is
PCCHECK.BRN, as you can see in the following figure.

Page
Other files are named PCCHECK.xxx, for example, PCCHECK.JNL or PCCHECK.HII. The .HII
file is especially important because it shows the entire host configuration at the time of failure.
Viewing PC-Check Files with the Text File Editor
When you know the name of the output file, you can use the text file editor to view the file.
1. Select the System Information Menu option on the PC-Check Main Menu and press Enter.
The System Information Menu appears, as shown here:

2. Select the Text File Editor and press Enter. You are prompted for a file name.
3. Type in the file name (for example, PCCHECK.JNL) and press Enter.
The editor opens with the file displayed, as shown here:

OHS Procedures in Maintaining Network Systems

In general, testing is finding out how well something works. In terms of human beings, testing tells
what level of knowledge or skill has been acquired. In computer hardware and software development,
testing is used at key checkpoints in the overall process to determine whether objectives are being met
Safety Precautions
Occupational Health and Safety (OHS) Policy –An Information and Communication Technology
(ICT) student should know how to behave when working in the computer laboratory, and how to implement
a safe way of accomplishing every task.

Occupational Safety and Health (OSH) is a planned system of working to prevent illness and injury where
you work by recognizing and identifying hazards and risks.
Occupational Health and Safety standards
Each student has a responsibility to their colleagues and their organization to report and act upon
any potential workplace hazard. Students need to be aware of the type of hazards that are possibly present
in their work environment.

Procedure
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from harm.
4. If the hazard can easily and safely cleared, then do so.
If not…
5. Report the hazard to the appropriate person (such as teacher in charge, principal etc.) to obtain
assistance.
6. Following clearing of the hazard fill out the correct documentation to assist in identifying
improved practice to reduce further incidence of hazards.

Maintenance of the Computer Systems and Networks


Diagnostic Software for Network
Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the
possible network issues that prevent you from using your computer to the fullest. With Network Diagnostic
Tool, you can quickly identify the problems you may be having, which sometimes occur with home
computers that are connected to the web via cable or DSL modems.
The Network Diagnostic Tool is a utility that analyzes your system and performs a wide range of
tests to determine the cause of your connectivity issues by investigating all your network-related services
and programs, looking into your IP configuration and default gateway, but it will also test out the DNS and
Firewall.

Schedule and Techniques in Maintaining Systems


Regular maintenance is essential to keep a network running well. You should also be prepared
to upgrade equipment and software periodically to take advantage of improving technology.

System Restore
System Information maintains a history of device drivers that are installed on your computer. If you
are unsure of a computer's recent history, you can use System Information to better understand what has
happened in the past
To start Microsoft System Information, use either of the following methods:
• Click Start, point to Programs, point to Accessories, point to System Tools, and then click System
Information.
• Click Start, click Run, type msinfo32.exe in the Open box, and then click OK.
To start System Restore
• Click Start, point to Programs, point to Accessories, point to System Tools, and then click System
Restore; or
• Click Start, click Run, type System Restore in the Open box, and then press Enter key. Then, it
will prompt you to the dialogue box shown below:

Figure 180. System Restore Window

• Click Next button, then it will prompt you to restore your computer to the state it was working
properly. Tick on Show More Restore Points then check the box below to display other possible
options you can choose.

• Choose a Restore Point given on the list and select Next.


• Finally, choose Finish button to proceed with the process. Wait for the computer to automatically
restart as it undergoes system restore.

Network Monitoring
Network monitoring refers to the practice of overseeing the operation of a computer network using
specialized management software tools. Network monitoring systems are used to ensure availability and
overall performance of computers (hosts) and network services.
Network Monitoring Software Tools
The ping program is one example of a basic network monitoring program. Ping is a network
administration utility or tool used to test connectivity on an Internet Protocol (IP) network. It also measures
the latency or delay between two computers. Ping is a software tool available on most computers that
sends Internet Protocol (IP) test messages between two hosts

Testing Network Connection with Ping Symptoms:


• wants to test the network using Ping
• wants to test the latency of the network

1. Open the Command Prompt or Terminal. Every operating system has a command line interface
that will allow you to run the Ping command.
The Ping command operates virtually and identically on all systems. If using Windows, open the
Command Prompt. Click the Start button and enter "cmd" into the Search field. Windows 8 users
can type "cmd" while on the Start screen. Press Enter to launch the Command Prompt.

2. Type ping followed by an IP address or a website address then press Enter key to execute the
command. Here is a brief explanation of commonly used ping commands:
o ping 127.0.0.1 (This is a "loopback ping" - your computer trying to talk to itself. If the loopback step
fails, it might be because the TCP drivers are corrupted, the network adapter might not be working,
or another service is interfering with IP.)
o ping <IP address> (This will ping the IP address of a device like a local computer, remote server
or any client that receives an IP address to verify that it is reachable and that you can communicate
with it properly.) Example: ping 192.168.1.1 (this is the default IP address of
NETGEAR routers) o ping<website address> (This command will test for the Internet connectivity
and DNS functionality.) Example: ping www.netgear.com, ping google.com

Here is a screenshot of a successful ping test:

The first arrow shows the computer we are trying to reach is responding. (The DNS address
"www.netgear.com" is displayed into the equivalent IP address, 10.1.1.86.) This also shows that the
computer is Figure Command Prompt Window online and it has Internet access.
The second arrow shows that all of the sent packets are received showing that there is 0% loss.
This means that the connection is available and stable.
The third arrow shows the average time it took to answer. "Average = 0ms" is the best possible
result. This kind of result is usually received if the device you tried to reach is within the same network.

Common Ping Test Problems


1. Request Timed Out. This message indicates that no reply messages were received within the
default time of 1 second. This can be due to many different causes; the most common causes
arenetwork congestion, failure of the ARP request, packet filtering, routing error, or a silent
discard.
2. Unknown Host
This error message indicates that the requested host name cannot be resolved to its IP address;
check that the name is entered correctly and that the DNS servers can resolve it.
3. Destination Host Unreachable
This message indicates one of two problems: either the local system has no route to the desired
destination, or a remote router reports that it has no route to the destination.
Computer Communications
Although computers communicate on many different levels and there is a great deal of variation
between the different types of computer systems involved, the basic communication process is relatively
uniform and standardized. Essentially, computers communicate with one another over networks that are
connected via wire or wireless communication methods. There are many different types of networks, and
there are many different types of network-connection methods as well.
As mentioned before, there are many types of networks. From smallest to biggest, the most
common network types are personal area network, local area network, campus area network,
metropolitan area network, wide area network, global area network and internetwork. The basic difference
between these network types is their size (how many remote computer systems are connected to them)
and their method of connection.
Methods of Connection Commonly Used
There are many different types of connection media that are used in contemporary society to
connect computer networks to one another. In terms of wired connections, there is coaxial cable, fiber-
optic cable, USB cable and traditional telephone lines. These are the most common network connections.
Wireless technologies differ hugely from one another, but the most popular kinds are Bluetooth and WiFi.

How network works - Computers in network


General Network Techniques - When computers communicate on a network, they send out data
packets without knowing if anyone is listening. Computers in a network all have a connection to the
network and that is called to be connected to a network bus. What one computer sends out will reach all
the other computers on the local network.

Figure 184. General Network


For the different computers to be able to distinguish between each other, every computer has a
unique ID called MAC-address (Media Access Control Address). This address is not only unique on your
network but unique for all devices that can be hooked up to a network. The MAC-address is tied to the
hardware and has nothing to do with IP-addresses. Since all computers on the network receive everything
that is sent out from all other computers, the MAC-address is primarily used by computers to filter out
incoming network traffic that is addressed to the individual computer.

When a computer communicates with another computer on the network, it sends out both the
other computer’s MAC-address and the MACaddress of its own. In that way the receiving computer will
not only recognize that this packet is for it but also who sent this data packet so a return response can be
sent to the sender.

In an Ethernet network as described here, all computers hear all network traffic since they are
connected to the same bus. This network structure is called multi-drop.
One problem with this network structure is that when you have, let say ten (10) computers on a
network and they communicate frequently and due to that they send out data packets randomly, collisions
occur when two or more computers sends data at the same time. When that happens, data gets corrupted
and has to be resent. On a network that is heavy loaded, even the resent packets collide with other packets
and have to be resent. In reality this soon becomes a bandwidth problem. If several computers
communicate with each other at high speed they may not be able to utilize more than 25% of the total
network bandwidth since the rest of the bandwidth is used for resending previously corrupted packets.
The way to minimize this problem is to use network switches.

Set up a DSL or cable connection


To set up a Digital Subscriber Line (DSL) or cable connection, you first need an account with an
Internet Service Provider (ISP). For DSL, the ISP is usually a phone company; for cable, it is usually a
cable TV provider.
You will also need a modem, a router, or a device that combines the two. When you have your
modem and router or your combination device, follow the corresponding steps below.
How to plug in a combined modem and router properly
1. Plug the device into an electrical outlet.
2. Plug one end of a phone cord or cable into the wide area network (WAN) port of the device, and
then plug the other end into the wall jack. The WAN port should be labeled "WAN." (DSL users:
Do not use a DSL filter on the phone line.)
3. Plug one end of an Ethernet cable into the local area network (LAN) port on the device, and then
plug the other end into the networking port of the computer that you want to connect to the Internet.
The LAN port should be labeled "LAN." (If you are connecting wirelessly, skip this step.)
4. Start (or restart) the computer.
5. Open the Connect to the Internet wizard by clicking the Start button, clicking Control Panel,
click Network and Internet, click Network and Sharing Center, click Set up a connection or network,
and then click Connect to the Internet.

How to plug in modem and router properly


1. Plug the modem into an electrical outlet.
2. Plug one end of a phone cord or cable into the modem, and plug the other end into the wall jack.
(DSL users: Do not use a DSL filter on the phone line.)
3. Plug one end of an Ethernet cable into the modem, and plug the other end into the wide area
network (WAN) port on the router.
4. Plug the router into an electrical outlet.
5. Plug one end of an Ethernet cable into the local area network (LAN) port on the router, and plug
the other end into the networking port on the computer that you want to connect to the Internet. (If
you are connecting wirelessly, skip this step.)
6. Start (or restart) the computer.
7. Open the Connect to the Internet wizard by clicking the Start button , clicking Control Panel,
clicking Network and Internet, clicking Network and Sharing Center, clicking Set up a connection
or network, and then clicking Connect to the Internet.

Identify Safety Procedures and Potential Hazards for Users and Technicians
Safety in the lab and in the work place is an important issue when working on computers and other
electrical devices. General safety guidelines and fire safety guidelines protect the technician and the
equipment.

General Safety Guidelines

Follow the basic safety guidelines to prevent cuts, burns, electrical shock, and damage to eyesight.
As a best practice, make sure that a fire extinguisher and first aid kit are available in case of fire or injury.
Installing network cables, whether copper or fiber-optic, can be dangerous. Often, cables must be
pulled through ceilings and walls where there are unexpected obstacles or toxic materials. You should
wear clothing that protects you from these materials. For example, wear long pants, a longsleeved shirt,
sturdy shoes that cover your feet, and gloves. Most importantly, wear safety glasses. If possible, ask
building management, or someone responsible for the building, if there are any dangerous materials or
obstacles that you need to be aware of before entering the ceiling area.

Cable, Cable Cutters, and Cable-Cutting Safety Hazards

All levels of technicians should know the hazards before working with network cables and
equipment. This section describes the safety hazards of working with copper cables, which, like fiber-optic
cables, can be dangerous to handle.

Caution
When handling cable, always wear eye protection. Never touch the ends of any type of cable to bare
skin.
When you cut copper cable, the small copper strands can puncture your skin or cut you. The small
pieces that come off after cables are cut often fly into the air. Remember to always wear safety glasses
when cutting any type of cable.
The cutting and crimping tools used to repair set of terminate copper cables can be dangerous if not
used properly. Read the instructions that comes with the tool. Practice using the tool on scrap cable, and
ask an experienced installer for help if you need it.

Remember that copper cable conducts electricity. A faulty equipment, static electricity, or lightning
can energize even a disconnected cable. If in doubt, test the cable you are working on with a simple voltage
detector before touching it.

Preparing Technical Reports


The main purpose of a technical report is to deliver information. Technical reports are intended
primarily for the long-term archival of results and descriptions and for monitoring the conditions of
laboratory facilities such as the computers, network status and other hardware facilities.
A good report needs careful planning. As part of the planning stage, you should answer the following
questions.
• What is the report about? What are you trying to say? You should arrange things so that the key
facts and conclusions are very accessible. Not everyone will read the whole report, so ensure that
your message is concise even if a person only skims the document.
• Who are you writing for? It is simply impossible to write a technical document that will be equally
easy for everybody to read: the level of explanation you need for an expert audience is totally
different from the explanation needed for readers who are unfamiliar with the subject. It is
absolutely essential that you identify the potential readers — the professional group, not the
individuals — before you start your work.


How long can the report be? It is difficult to predict in advance exactly how long a report will be.
Technically speaking, writing reports for hardware and other facilities should be specific and
itemized.
A hardware report can help you to:
• identify the hardware components inside your computer – CPU, memory, motherboard etc;
• understand conflicting hardware inside your computer; and
• help the computer repair person to understand your computer with a written, detailed hardware
report (therefore he can find the missing drivers faster, for example).
Sample Detailed Technical Report

I. Identify what maintenance procedure is described in each situation.


__________1. This will allow proper circulation of air inside the computer unit.
_________ 2. This will help lessen the attacks of viruses and will increase the life span of your computer.
__________3. This means taking care of your computer.
__________4. Protecting your files means creating backups, storing your file backups on your hard drive
or any removable storage device regularly.
__________5. By deleting the temporary files on your computer, it will enhance its speed and will create
more disk space for your files.
__________6. Regularly update your anti-virus for your computer protection against viruses.
__________7. To avoid damage to the computer unit always turn off and unplugged it when trying to
transfer the computer to another location.
__________8. Installing passwords makes your files more secure.
__________9. Maintenance of equipment or systems before fault occurs
__________10. This will allow proper circulation of air inside the computer unit.
II. Choose the letter of the correct answer:
1) It refers to a list of the key components that make up the computer.
a. Specs c. Brand
b. Manufactures d. Checklist

2) The main working memory in a computer is called ___________.


a. ROM c. Processor
b. RAM d. memory chips

3) It stores the applications and programs that run on the PC, as well as any work created by users.
a. CD/DVD c. Hard drive
b. RAM d. Zip drive

4) These cards are installed inside a PC and are responsible for determining the quality of the visuals
output by the computer.
a. Audio Card c. LAN Card
b. Graphics Card d. Adapter card

5) These are the two leading companies when it comes to manufacturing processors.
a. HP and Dell c. AMD and Intel
b. Epson and Canon d. Acer and Asus

6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per
second) card is the standard card specifications today
a. Audio Card c. Network Card
b. Graphics Card d. Adapter card

7) It is a free open source operating system.


a. Microsoft Windows c. Mac OS
b. Linux d. Chrome OS

8) A cabling is used to connect your wired network adapters to a router or network switch.
a. Internet c. coaxial
b. Ethernet d. fiber optic
9) A glue that holds your home network together
a. router c. Hub
b. DSL d. Ethernet cable
10) The standard transfer speed of your wireless connection is __________.
a. 802.11g c. 802.11m
b. 801.11g d. 802.11j
11) The wired half of your router has a speed of _____________.
a. 10/100 Mbps c. 100/1000 Mbps
b. 10/10/100 Mbps d. 10/10/1000 Mbps
12) Routers have two types of ports available at the back. Which is not part of it?
a. LAN c. MAN
b. WAN d. WLAN
13) It basically means to create a redundant copy of a data.
a. Data Backup c. System restore
b. Image copy d. hardcopy
14) It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in
damage and causing your system to act in an undesirable manner.
a. Software c. Malware
b. Spyware d. Firmware
15) Software is used to identify problems on a computer or piece of equipment.
a. Network software tool c. Diagnostic Software tool
b. Hardware Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently.
a. Defragmenter c. software
b. Fragmenter d. defrag
17) It is a system-defined database which is used by an Operating System to store all the information
needed to configure the Windows settings.
a. Registry c. Registration
b. Register d. Registering
18) This is an application that checks the computer’s hard drive for errors and bad sectors.
a. Scan c. Scan Disk
b. System Restore d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft Windows operating system and
it is designed to free up space on the hard drive.
a. Network software tool c. Scan Disk
b. Data Backup d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the
possible network issues that prevent you from using your computer to the fullest.
a. Burn-in c. Diagnostic Software tool
b. Hardware Software tool d. Network Diagnostic tool

III. Match Column A with Column B


Column A Column B
1. Creates and deletes disk A. Scan disk
partitions
2. Optimizes use of space on a disk B. Format

3. Prepares a hard drive prior to use C. Defrag

4. Removes unused files. D. Disk Cleanup


5. Checks for physical errors on the disk E. Fdisk
surface
How to Scan Disk
I. Identify what maintenance procedure is described in each situation.
__________1. This will allow proper circulation of air inside the computer unit.
_________ 2. This will help lessen the attacks of viruses and will increase the life span of your computer.
__________3. This means taking care of your computer.
__________4. Protecting your files means creating backups, storing your file backups on your hard drive
or any removable storage device regularly.
__________5. By deleting the temporary files on your computer, it will enhance its speed and will create
more disk space for your files.
__________6. Regularly update your anti-virus for your computer protection against viruses.
__________7. To avoid damage to the computer unit always turn off and unplugged it when trying to
transfer the computer to another location.
__________8. Installing passwords makes your files more secure.
__________9. Maintenance of equipment or systems before fault occurs
__________10. This will allow proper circulation of air inside the computer unit.
II. Choose the letter of the correct answer:
1) It refers to a list of the key components that make up the computer.
a. Specs c. Brand
b. Manufactures d. Checklist

2) The main working memory in a computer is called ___________.


a. ROM c. Processor
b. RAM d. memory chips

3) It stores the applications and programs that run on the PC, as well as any work created by users.
a. CD/DVD c. Hard drive
b. RAM d. Zip drive

4) These cards are installed inside a PC and are responsible for determining the quality of the
visuals output by the computer.
a. Audio Card c. LAN Card
b. Graphics Card d. Adapter card

5) These are the two leading companies when it comes to manufacturing processors.
a. HP and Dell c. AMD and Intel
b. Epson and Canon d. Acer and Asus

6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per
second) card is the standard card specifications today
a. Audio Card c. Network Card
b. Graphics Card d. Adapter card

7) It is a free open source operating system.


a. Microsoft Windows c. Mac OS
b. Linux d. Chrome OS

8) A cabling is used to connect your wired network adapters to a router or network switch.
a. Internet c. coaxial
b. Ethernet d. fiber optic
9) A glue that holds your home network together
a. router c. Hub
b. DSL d. Ethernet cable
10) The standard transfer speed of your wireless connection is __________.
a. 802.11g c. 802.11m
b. 801.11g d. 802.11j
11) The wired half of your router has a speed of _____________.
a. 10/100 Mbps c. 100/1000 Mbps
b. 10/10/100 Mbps d. 10/10/1000 Mbps
12) Routers have two types of ports available at the back. Which is not part of it?
a. LAN c. MAN
b. WAN d. WLAN
13) It basically means to create a redundant copy of a data.
a. Data Backup c. System restore
b. Image copy d. hardcopy
14) It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting
in damage and causing your system to act in an undesirable manner.
a. Software c. Malware
b. Spyware d. Firmware
15) Software is used to identify problems on a computer or piece of equipment.
a. Network software tool c. Diagnostic Software tool
b. Hardware Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently.
a. Defragmenter c. software
b. Fragmenter d. defrag
17) It is a system-defined database which is used by an Operating System to store all the information
needed to configure the Windows settings.
a. Registry c. Registration
b. Register d. Registering
18) This is an application that checks the computer’s hard drive for errors and bad sectors.
a. Scan c. Scan Disk
b. System Restore d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft Windows operating system
and it is designed to free up space on the hard drive.
a. Network software tool c. Scan Disk
b. Data Backup d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the
possible network issues that prevent you from using your computer to the fullest.
a. Burn-in c. Diagnostic Software tool
b. Hardware Software tool d. Network Diagnostic tool

III. Match Column A with Column B


Column A Column B
1. Creates and deletes disk partitions A. Scan disk
2. Optimizes use of space on a disk B. Format
3. Prepares a hard drive prior to use C. Defrag
4. Removes unused files. D. Disk Cleanup
5. Checks for physical errors on the disk surface E. Fdisk

You might also like