0% found this document useful (0 votes)
34 views12 pages

Tle 8

The document discusses planning and preparing for tasks as a computer technician. It describes identifying the tasks to be undertaken and selecting the appropriate hand tools needed for each task. It provides examples of various types of essential hand tools in a computer technician's toolkit, such as screwdrivers, pliers, soldering equipment. The document emphasizes the importance of checking tools are functioning properly, identifying unsafe tools, and following safety procedures when using tools.

Uploaded by

sowerak pamaweb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views12 pages

Tle 8

The document discusses planning and preparing for tasks as a computer technician. It describes identifying the tasks to be undertaken and selecting the appropriate hand tools needed for each task. It provides examples of various types of essential hand tools in a computer technician's toolkit, such as screwdrivers, pliers, soldering equipment. The document emphasizes the importance of checking tools are functioning properly, identifying unsafe tools, and following safety procedures when using tools.

Uploaded by

sowerak pamaweb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

TLE 7/8 – ICT

(COMPUTER
SYSTEM
SERVICING)
Plan and Prepare for Tasks to be Undertaken

I. Learning Competency
LO 1. Plan and prepare for tasks to be undertaken
(TLE_IACSS 9-12UHT- IIIa-17)
1.1 Identify tasks to be undertaken properly
1.2 Identify and select appropriate hand tools according to the task requirements

II. Background Information for Learners


Planning for The Task to Be Undertaken Includes Proper Tool Selection:
How would you select the most ideal tools for the work? To start with,
know and comprehend in detail the extent of work to be refined, second, plan
for the scope taking into account the sequence of tasks.
On the other hand, selecting the finest tool for each task requires
training in the proper use of the tools, field experience in their safe use, and
following the manufacturer’s guidance and instructions for that specific tool.
To be proficient future computer technicians you need to have toolkit
that contains all necessary tools in repairing and maintaining computer
systems. It is important that you also know its function and uses. The
following are the must have tools of a computer technician:

HAND TOOLS
1. Flat head screwdriver – used to 8.Needle-nose plier – used to hold
loosen or tighten slotted Screws small parts.

2. Philips head screwdriver – used to 9. Wire cutter – used to strip and cut
loosen or tighten crosshead screws. wires.

3.Torx screwdriver - used to loosen or 10. Flashlight – used to light up areas that
tighten screws that have a star-like you cannot see well.
depression on the top.

4.Hex driver –used to tighten nuts in 11. Soldering Lead- used to join together
the same way that a screwdriver metal work pieces.
tightens screws.
5. Part retriever – used to retrieve parts 12. Wire Stripper - used to strip the
from location that are too electrical insulation from
small for your hand to fit. electric wires.

6. Soldering iron -used to join two or more 13. Tweezers – used to manipulate small
metal conductors with the parts.
support of soldering lead
melted around it.
7.Crimping Tool- used to conjoin two pieces
of metals by deforming one
or
both that causes it to hold
together.

CLEANING TOOLS
3.Compressed air – used to blow away
1.Lint-free cloth – used to clean different dust and debris from
computer components different computer
without scratching or parts without touching the
leaving debris. components.

4.Parts organizer – used to hold screw,


2.Cable ties – used to bundle cables neatly jumpers, fasteners and other
inside and outside of a small parts and prevents
computer. them from getting mixed
together.

DIAGNOSTIC TOOLS
1.Multimeter - used to test the integrity of 3.Loopback Adapter – used
circuits and the quality of to test the functionality of
electricity in computer computer ports.
components.

2.Lan Tester -designed to 4.Toner Probe –used to generate a tone for


check most network cable tracing cables between rooms
wiring. in a building.

Electrostatic Discharge (ESD) TOOLS


1. Anti-static wrist strap – used to prevent 2. Anti-static mat – used to stand on or place
ESD damage to computer hardware on to prevent
equipment. static electricity from
building up.
Prepare Hand Tools

I. Learning Competency
LO 2. Prepare hand tools (TLE_IACSS 9-12UHT- IIIb-18)
2.1 Check appropriate hand tools for proper operation and safety
2.2 Identify and mark unsafe or faulty tools for repair according to standard company procedure
II. Background Information for Learners
Proper Use of Tools:
A tool is a handheld device that aids in accomplishing a task. Using tools properly helps prevent
accidents and damage to equipment and people. There are different categories of computer systems
serving tools namely:
1. Electro-Static- Discharge Tools (ESD),
2. Hand tools,
3.Cleaning tools and
4.Diagnostic tools.
It is important for a computer technician to check appropriate hand tools for proper operation and for
his safety as well as for the welfare of the community where he is working.
For example, at home we experience little shock while touching any appliances is a result of static
electricity. Static electricity is the release of power between two objects with distinctive electrical
potential. People can't feel a static stun until it is a few thousand volts solid, but it takes less than 30
volts to broil a delicate computer component, such as a stick of RAM or a processor. That's why you
have to guard computers against the dangerous assaults of static electricity, as well as take steps
toavoid injury.
Caution To Remember When Using Tools:
1. The purpose of an antistatic wrist strap is to equalize the electrical charge between you and the equipment
therefore it is imperative to use it during troubleshooting.
2. Be sure not scratch or hit any components while using the Part Retriever, Needle-Nose Pliers, Or Tweezers.
3. Compressed air should be blown around the components of computer with a distance of four inches from
the nozzle.
4. Test your tool by touching the tool with a screw. If the tool is magnetized, do not used it. Magnetic fields is
harmful to data stored on magnetic media.
5. Match the tip of the screw with the proper screwdriver then turn the screwdriver clockwise to tighten and
counterclockwise to loosen the screw.
6. Before cleaning any device, turn it off and unplug the device from the power source.
7. Never use a screwdriver as a pry bar nor to puncture anything this will damage its head

Use Appropriate Hand Tools and Test Equipment

I. Learning Competency
LO 3. Use appropriate hand tools and test equipment
(TLE_IACSS 9-12UHTIIIc-19)
3.1 Use tools according to tasks undertaken.
3.2 Observe all safety procedures in using tools at all times and use appropriate PPE
3.3 Report malfunctions, unplanned or unusual events to the supervisor
II. Background Information for Learners
As a computer technician, it is required to use appropriate tools within the toolkit when repairing
computers. A lot of tools are magnetized. When working electronic devices, see to it that tools you’re
using haven’t been magnetized. It may be harmful to data stored on magnetic media. Test your tool
by touching it with a screw. When the screw is drawn to the tool, then don’t use it. If you use an
incorrect tool to fix something, you will find hard time doing it successfully.
The following are the correct use of tools in working areas.

1. Screws. When you set screws properly, avoid stripping a screw, keeping a straight line when
driving a screw and align the drill and screw correctly. If your screwdriver starts wobbling or slipping
out of the screw, you know you’ve chosen the incorrect type or size screwdriver.
a. Flat-head screwdriver. It has a wedge-shaped flat tip, used to tighten or loosen screws that
have a straight, linear notch in their heads. Choose the one whose blades best fits the screw slot.
b. Philips screwdriver. It has a head with pointed edges in the shape of a
cross, which fit neatly into the cross slots of a Philip Screw. Use only a Philips
screwdriver for Philips screws.
2. Soldering iron and stand. Allow us to safely hold our iron, and it’s also convenient- a good idea
to keep it right next to your work piece.
3. Crimping tool and wire stripper. Always check and verify the types of wire or cable of a
crimper if it is capable to do so. To make sure that the stripper has a comfortable grip, immediately
clean and remove insulation from wires, and make sure the actual wire is intact.
4. Long Nose Pliers and Tweezer. Grip the long nose pliers firmly when
holding wires. Don’t use it as a hammer. To reach other objects or small ones,
use the tweezer.
5. Multi-tester and Lan tester. Make sure that the probes are plugged into the proper ports or
else it won’t be able to perform the test. Always maintain functional and accuracy.
6. Anti-static wrist strap. Always check the overall use, what to wear, and cleanliness of the wrist
strap. Make sure to ground yourself while working with electronic components.
PPE (Personal Protective Equipment) This is to protect you from hazards that may happen at
your workplace. Always wear PPE equipment like gloves, safety glasses, protective masks, and rubber
sole shoes.

Plan and Prepare for Tasks to be Undertaken

I. Learning Competency with Code (TLE_IACSS 9-12PCO-Ic-d-4)


LO 1: Plan and prepare for task to be undertaken
1.1 Determine requirements of task in accordance with the required output
1.2 Select appropriate hardware and software according to task assigned and required outcome
1.3 Plan a task to ensure that OSH guidelines and procedures are followed
1.4 Follow client-specific guidelines and procedures
1.5 Apply required data security guidelines in accordance with existing procedures

II. Background Information for Learners


This lesson will help the learners to perform any computer operations such as determining the
requirements of task, selecting appropriate hardware and software, planning a task to ensure in
following the guidelines and procedures, etc. In addition, this would enhance the learner’s knowledge
and skills on how to store data and files on the computer in the different ways and using internal and
external computer devices. The learners will be empowered on how these stored files and data can
be accessed in the computer system from different storage devices. Produce output/data using
computer system is one of the objectives. Process entered data using appropriate software
commands. Print out data as required using computer hardware /peripheral devices in accordance
with standard operating procedures. Transfer files and data between compatible systems using
computer software, hardware/peripheral devices in accordance with standard operating procedure.

Input Data into Computer

I. Learning Competency with Code


LO 2: Input data into computer (TLE_IACSS 9-12PCO-Id-e-5)
2.1Enter the data into the computer using appropriate program/application in accordance with
company procedures
2.2Check the accuracy of information and save the information in accordance with standard
operating procedures
2.3Store inputted data is in storage media according to requirements
2.4Perform work within ergonomic guidelines

II. Background Information for Learners


This lesson will help the learners to perform any computer operations such as determining the
requirements of task, selecting appropriate hardware and software, planning a task to ensure in
following the guidelines and procedures, etc. In addition, this would enhance the learner’s knowledge
and skills on how to store data and files on the computer in the different ways and using
internal and external computer devices. The learners will be empowered on how these stored files
and data can be accessed in the computer system from different storage devices. Produce
output/data using computer system is one of the objectives. Process entered data using appropriate
software commands. Print out data as required using computer hardware /peripheral devices in
accordance with standard operating procedures. Transfer files and data between compatible systems
using computer software, hardware/peripheral devices in accordance with standard operating
procedure.

Software Devices Hardware Devices


Access Information Using Computer

I. Learning Competency with Code


LO 3: Access information using computer (TLE_IACSS 9-12PCOIe-f-6
3.1Select correct program/application based on job requirements
3.2Access program/application containing the information required according to company procedures
3.3Select, open, and close desktop for navigation purposes
3.4Carry out keyboard techniques in line with OSH requirements

II. Background Information for Learners


This lesson would enhance the learner’s knowledge and skills on how to store data and files on the
computer in the different ways and using internal and external computer devices. The learners will be
empowered on how these stored files and data can be accessed in the computer system from
different storage devices. Produce output/data using computer system is one of the objectives.
Process entered data using appropriate software commands. Print out data as required using
computer hardware /peripheral devices in accordance with standard operating procedures
Transfer files and data between compatible systems using computer software, hardware/peripheral
devices in accordance with standard operating procedure.
Desktop Publishing Educational Software Presentation Software

Spreadsheet Word Processor Storage Devices

Produce Output/Data Using Computer System

I. Learning Competency with Code


LO 4: Produce output/data using computer system (TLE_IACSS 9-12PCO-If-7)
4.1Process entered data using appropriate software commands
4.2Print out data as required using computer hardware/peripheral devices in accordance with
standard operating procedures
4.3Transfer files and data between compatible systems using computer software,
hardware/peripheral devices in accordance with standard operating procedures

II. Background Information for Learners This lesson would enhance the learner’s knowledge and
skills on how to store data and files on the computer in the different ways and using internal and
external computer devices. The learners will be empowered on how these stored files and data can
be accessed in the computer system from different storage devices. Produce output/data using
computer system is one of the objectives. Process entered data using appropriate software
commands. Print out data as required using computer hardware /peripheral devices in accordance
with standard operating procedures Transfer files and data between compatible systems using
computer software, hardware/peripheral devices in accordance with standard operating procedure.

TLE 7/8 – ICT (COMPUTER SYSTEM SERVICING) LEARNING ACTIVITY SHEET


Use Basic Functions of a WWW-Browser to Locate Information

I. Learning Competency
LO 5. Use basic functions of a www-browser to locate information.
(TLE_IACSS 9-12PCO-Ig-h-8)
5.1 Establish information requirements for internet search
5.2 Launch browser
5.3 Load search engine
5.4 Enter appropriate search criteria/or URL of site
5.5 Follow relevant links to locate required information
5.6 Bookmark useful pages and print as required

II. Background Information for Learners


What is a search engine? How search engine works?
In today’s generation, searching a specific information can be done in a matter of seconds. This can
be accomplished with the help of what we called SEARCH ENGINE.

Search Engine is a program that searches for and identifies items in a database that correspond to
keywords or characters specified by the user, used especially for finding particular sites on the World
Wide Web.
World Wide Web is an information system on the internet which allows documents to be connected
to other documents by hypertext links, enabling the user to search for information by moving from
one document to another. World Wide Web is also known as WWW where documents and other
resources are identified by a Uniform Resource Locator (URL’s, ex:www.facebook.com) that is
linked by a hypertext and accessible over the internet using a web browser. Web browsers are
applications used to access information on the World Wide Web.

How to search information on the World Wide Web?


Step 1: Click a web browser you want to use. (Google Chrome, Internet Explorer, Mozilla Firefox,
Safari)
Step 2: In the address bar, type the Uniform Resource Locator (URL) you want to search then press
ENTER.
*To bookmark this website, simply click the start icon on the right side of the browser.
Step 3: To search any information you want, simply type any keyword in the
search tab. (Ex. What is ICT?). All results in the search web are categorized into All,
Images, Videos, Maps, News and More.
Maintain Computer Equipment and Systems

I. Learning Competency
LO 6. Maintain Computer Equipment and Systems
(TLE_IACSS 9-12PCO-Ii-j-9)
6.1 Implement procedures for ensuring security of data, including
regular backups and virus checks in accordance with
standard operating procedures
6.2 Implement basic file maintenance procedures in line with the
standards operating procedures

II. Background Information for Learners


Why is it necessary to maintain computer equipment and systems?
It’s quite difficult to imagine our lives without computers. Time will come that computers become a
necessity to everyone. Most people need computes to accomplish their works and to their daily
objectives as well. Since computers become an integral part of our lives, it is very important that we
take care of them by having properly maintained. Before we do computer maintenance, we need to
observe proper safety procedures for us to keep from harm and danger.

OHS POLICIES AND PROCEDURES


OHS or known as Occupational Health and Safety is a planned
system of working to prevent any accident and injury by identifying what is
hazards and risk in the workplace.
Below are some of the OHS procedures that we need to remember all
the time.
1. Do not work alone so that someone can take care of you in case of emergency.
2. Always power off the computer and unplug the computer before working on it.
3. Take away any liquid near your working area to avoid getting electrocuted or accidentally
damaging computer parts.
4. Be careful with tools that may cause short circuit.
5. Always ground or discharge yourself before touching any part of the computer.
6. Do not use excessive force if things don't quite slip into place.
7. Clean the area before and after using it to maintain sanitation and prevent accidents.
8. Hold the components on the edges and do not touch the Integrated Circuit (IC) parts.
9. Always wear personal protective equipment (PPE) in accordance with the organization's OHS
procedures and practices.
10.Make sure that the pins are properly aligned when connecting a cable connector.
11. Emergency measures during workplace accidents, fire, and other emergencies are recognized.
12.Use brush, compressed air or blower in cleaning the computer system.

5s for the Personal Computer


Maintaining an organize manner when you are bombarded with multiple tasks,
images, documents and other resources in your computer is quite a hassle.
However, with the help of 5s concept, it provides you the foundations and guidelines
for a quality improvement programs. It results to an increase of daily productivity and
better organizations.

Below are the 5S that help you organize your computers.


1. Seiri or Sort: Only store important files in your computer. Create folders and subfolders to
organized important computer data.
2. Seiton or Set in Order: Ensure easy retrieval of data. Establish a proper method in naming files and
folders in your computer.
3. Seiso or Shine: Clean-up unnecessary computer data on a scheduled basis. Use the disk cleanup
tool in your computer.
4. Seiketsu or Standardize: Develop a consistency of practice over time. Always follow the above 3S.
5. Shitsuke or Sustain: Track and monitor to adherence to the above 4Ss by self and peers. Conduct
monthly audits (self and for peers) to ensure that the set procedures are followed diligently.
Document and publish the hard disk space usage data on a weekly basis.

POSTURE PERFECT
When sitting in front of the computer, make sure that you are sitting in the
right way. If you slouch or sit too far away from the computer table, your body will
soon be in great pain.
Here are some things you need to remember to keep yourself safe and
comfortable when working on the computer.

1. Sit up straight. This will keep your shoulder and neck from getting stiff.
2. Place your feet flat on the floor. If your feet do not reach the floor, use a stable footrest.
3. Your elbows should be bent at a right angle at your side. This position allows your arms to be
relaxed.
4. Make sure your monitor is right in front of you. It is best to sit about two feet away from the
screen.
5. Look away from the computer every few minutes to rest your eyes. Blink a few times, do not let
your eyes get tired.
6. When working on the computer for a long time, take frequent short breaks. Wiggle your fingers,
shake your hands and stand up and stretch on your tiptoes.
7. Do not squeeze the mouse. Lay your hand gently on it. When moving the mouse, move your
whole arm and not just your hand.
8. Use an optical glass antiglare filter when needed.

BASIC COMPUTER MAINTENANCE


Just like changing tires of a motorcycle, maintaining the computer is very
important to keep it secure and in a good running condition. Maintaining computer
also protect your valuable computer files and documents free from cyber-attacks.
Computer maintenance is the practice of keeping computers in a good state
of repair.

1. Folders - are used to organized and categorized computer files for easy retrieval of data.
2. Antivirus – use to check your computer, files and storage devices free from viruses and malwares.
Always update your Antivirus.
3. Back- up – creating a backup of your files ensures that if something goes wrong to your computer,
you can always retrieve the duplicate data from your back up storage.
4. System Update - system update is a scheduled basis. This addresses any computer problems, bugs
and security issues in your computer.

Select Measuring Instruments

I. Learning Competency LO
1. Select measuring instruments (TLE_IACSS 9-12PMCIIa-b-10)
1.1 Identify object/s or component to be measured
1.2 Obtain correct specifications from relevant source
1.3 Select measuring tools in line with job requirements

II. Background Information for Learners In this lesson will help the learners to perform simple
calculations and measurement. With your enhanced computer skills, it does not mean that you
should depend too much all measurement and calculation to computer. It is necessary to know the
basics in measurement and calculation to determine possible result and output. Mensuration the
branch of geometry that deals with the measurement of length, area, or volume. the act or process
of measuring. Mensuration is a process of measuring and determining the value, length, width,
thickness, weight, and area of a surface or an object. Calculation is performing mathematical
calculations such as addition, multiplication, subtraction, or division. Calculation is also a deliberating
process that transforms and calculate one or more inputs into results and to determine mathematical
in terms of numbers and amount.

TLE 7/8 – ICT (COMPUTER SYSTEM SERVICING)


LEARNING ACTIVITY SHEET Carry Out Measurements and Calculation

I. Learning Competency LO
2. Carry out measurements and calculation (TLE_IACSS 9-12PMC- IIe-f-12)
2.1 Select appropriate measuring instrument to achieve required outcome
2.2 Obtain accurate measurements for job
2.3 Perform calculation needed to complete task using the four mathematical fundamental operations
addition (+), subtraction (-), multiplication (x), and division (÷)
2.4 Use calculation involving fractions, percentages and mixed numbers to complete workplace tasks
2.5 Self-check and correct numerical computation for accuracy
2.6 Read instruments to the limit of accuracy of the tool

II. Background Information for Learners In this lesson will help the learners to perform simple
calculations and measurement. With your enhanced computer skills, it does not mean that you
should depend too much all measurement and calculation to computer. It is necessary to know the
basics in measurement and calculation to determine possible result and output. Mensuration the
branch of geometry that deals with the measurement of length, area, or volume. the act or process
of measuring. Mensuration is a process of measuring and determining the value, length, width,
thickness, weight, and area of a surface or an object. Calculation is performing mathematical
calculations such as addition, multiplication, subtraction, or division. Calculation is also a deliberating
process that transforms and calculate one or more inputs into results and to determine mathematical
in terms of numbers and amount. In this lesson will help learners to understand more about
computer wherein how computer process data, information and how information is stored within a
computer. The term bit is an abbreviation of binary digit and represents the smallest piece of data.
It’s also the most common unit of digital data storage. Humans interpret words, signs graphics and
pictures; computers interpret only patterns of bits. A bit can have only two possible values, a one
digit (1) or a zero digit (0). A bit can be used to represent the state of something that has two states.
For example, a light switch can be either On or Off; in binary representation, these states would
correspond to 1 and 0, respectively. To increase the size of information stored, bits are grouped into
a pack of eight, which equals a byte. This measurement process continues exponentially (1 bit = 8
bytes, 1 kilobyte = 1,024 bytes, etc.). Codes can be used to represent almost any type of information
digitally: computer data, graphics, photos, voice, video, and music. Computers use binary codes to
represent and interpret letters, numbers and special characters with bits. A commonly used code is
the American Standard Code for Information Interchange (ASCII). With ASCII, each character is
represented by a string of bits.

You might also like