Field Technician - Computing - Peripherals
Field Technician - Computing - Peripherals
Electronics
Sub - Sector
Consumer Electronics &IT Hardware
Occupa on
A er sales service
Reference ID : ELE/Q4601, Version 2.0
NSQF Level 4
Field Technician
Computing and
Peripherals
Skilling is building a better India.
If we have to move India towards
development then Skill Development
should be our mission.
iii
iii
iii
Participant Handbook
30.12.2021
02.06.2025
iviv
Acknowledgements
The need for having a standard curriculum for the Job Role based Qualification Packs under
the National Skills Qualification Framework was felt necessary for achieving a uniform skill
based training manual in the form of a participant handbook.
I would like to take the opportunity to thank everyone who contributed in developing this
handbook for the QP Field Technician Computing and Peripherals.
The handbook is the result of tireless pursuit to develop an effective tool for imparting the
Skill Based training in the most effective manner.
I would like to thank the SME and the team at the ESSCI along with the industry partners for
the tireless effort in bringing the handbook in the current format.
CEO
v
Participant Handbook
Field Technician: Also called ‘Service Technician’, the Field Technician provides after sale
support services to customers, typically, at their premises.
Brief Job Description: The individual at work is responsible for attending to customer
complaints, installing newly purchased products, troubleshooting system problems and,
configuring peripherals such as printers, scanners and network devices.
Personal Attributes: The job requires the individual to have: ability to build interpersonal
relationships and critical thinking. The individual must be willing to travel to client premises
in order to attend to calls at different locations.
Role Description: Installing the system and configuring the peripherals, and attending to
field calls from customer and complaints for system trouble shooting and repairs.
Symbols Used
Notes Unit
Key Learning Steps Role Play Tips
Objectives
Outcomes
Activity
vi
Field Engineer RACW
Table of Contents
vii
Participant Handbook
viii
FieldField
Technician - Computing
Technician andand
- Computing Peripherals
Peripherals
1. Introduction to
Computers and its
Peripherals
11
Participant Handbook
2
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Outline the history of computers
2. Define computer and its types
3. Identify computer hardware and software and its applications
4. List the different types of computer equipment assembled in a pack
Development of Computers
Computation has been done since earlier times with the aid of devices, when generally
there was interaction at one-to-one level utilizing fingers. A form of tally stick was possibly
the first counting device. Later, people in the Fertile Crescent region began record keeping
by using calculi with aids such as clay spheres and cones. These aids were, possibly,
representations of items such as livestock or containers of grains. Counting rods and stones
were used with passing of time. People, gradually, began to follow certain steps to calculate
with stones, giving birth to digital counting devices. These proved to be the predecessor of
the first device invented for calculation, called as the ABACUS.
The ABACUS
Abacus was used to do quick additions and subtractions mechanically. Although it was
initially developed in the 10th century by the Egyptians, it was the Chinese who gave it its
proper shape in the 12th century. It comprised of a wooden frame with rods fitted from one
end to the other. The rods had round beads slid onto them, which represented different
numbers according to their position. The abacus had an upper section called Heaven and a
lower section called Earth.
3
Participant Handbook
NAPIER'S BONES
Napier Bones was invented by John Napier of Scotland in the year 1617. This device had
bone rods with numbers printed on them and enabled easy calculations.
PASCAL'S CALCULATOR
Pascal’s calculator was invented by Blaise Pascal of France in the year 1642. It was an adding
machine which had gears on it to represent the position of the digits.
LEIBNZ CALCULATOR
Leibnz calculator was a modification of the Pascal’s calculator and could do multiplication
and division operations. It was devised by Gottfried Leibniz of Germany in the year 1671.
ANALYTICAL ENGINE
Sir Charles Babbage of England,also called father of the computer, invented the Analytical
engine in the year 1833. It is considered as the first mechanical computer, which could
safeguard data. Charles Babbage added such features in it which are similar to the present
day computer language.
The Von Neumann model
The architecture of computer has been modified many times over the last 20 years
according to new developments. The way the algorithms are mapped to the hardware of a
computer has been modernized and the quantity of circuits which can be added to the
silicon wafers too has changed. However, the basic concept of computer design has
remained unchanged. Von Neumann devised the computer architecture in such a way so as
to enable it to store the program instructions and data in its memory.
Earlier, every computing device was made for a single, specific purpose. The programming
entailed the circuits to be rewired manually and snags were difficult to detect or rectify.
Von Neumann’s architecture had the computer with three main components:
• A central processing unit (CPU)
• Memory
• Input/output (I/O) interfaces.
Generation is a term used in connection with the changes or developments in the
computer’s hardware and software technology over a period of time. There are mainly five
computer generations commonly accepted till date.
First Generation
The computers used in the period 1946-1959 are considered as first-generation computers.
4
Field Technician - Computing and Peripherals
5
Participant Handbook
Second Generation:
The computers used in the period 1959-1965 are considered as second-generation
computers. In these computers, magnetic cores served as primary memory and magnetic
tapes and disks as devices for secondary memory.
Use of transistors
Still expensive
6
Field Technician - Computing and Peripherals
IBM 1620
CDC 3600 UNIVAC 1108 IBM7094 CDC 1604
Third Generation:
The computers used in the period 1965-1971 are considered as third generation computers.
Jack Kilby had invented integrated circuits (IC's) which replaced transistors. An IC comprised
of multiple transistors and capacitors connected to the associated circuitry. The computers
were faster, smaller in size, more dependable and efficient. They generated less heat,
required lesser maintenance, consumed less electricity but were still expensive and needed
alternating current (AC). High-level languages such as FORTRAN-II TO IV, COBOL, PASCAL
PL/1, BASIC and ALGOL-68 were used. The operating system had features such as, time
sharing, multi-programming and remote processing.
Some examples of computers of this generation are as shown in figure:
TDC-316
Fourth Generation:
The computers used in the period 1971-1980 are considered as fourth generation
computers. They used Very Large Scale Integrated (VLSI) technology which involved around
5000 transistors and all other circuit elements along with their linked circuits placed on a
single chip. The computers were portable, reliable, powerful, easily available and
economical. They did not require AC to function. Their distributed operating system had
features such as pipeline processing, real time, networks and time sharing. The high-level
languages such as C, C++, DBASE and so on were used in these computers. The concept of
personal computers (PCs) was brought to the fore and internet was introduced. There was
major progress in the field of networks.
7
Participant Handbook
CRAY-1 (Super
DEC 10 STAR 1000 PDP 11
Computer)
CRAY-X-MP
(Super
Computer)
Fig. 1.1.6: Examples of fourth generation of computer
Fifth Generation:
The computers used in the period 1971-1980 are considered as fourth generation
computers. They used Very Large Scale Integrated (VLSI) technology involving
microprocessor chips which comprised of ten million electronic components. High-level
languages such as C and C++, Java and .Net were utilized in this generation. The multimedia
features of the computers had user friendly interfaces. The computers were powerful,
compact and economical. The main features of these computers also included progress in
parallel processing hardware, progress in superconductor technology and development of
true artificial intelligence (AI) as well as of natural language processing. AI is an upcoming
branch of computer science which interprets procedures of enabling computers to think like
humans.
The following figure shows the features of fifth generation of computer:
Laptop
Desktop Ultra Book Chrome Book
Notebook
8
Field Technician - Computing and Peripherals
The basic functionality of computers, irrespective of its size or make, is shown in the
following figure:
Accepts data
Stores data
9
Participant Handbook
Some characteristics that have made usage of computers almost a necessity in life are they
are fast, accurate, diligent, and adaptable and have good storage capacity.
A computer consists of various units or parts that enables it to perform its functions. The
following figure shows a block diagram of the functional units of a computer:
The four main functional units in a computer are described in the following figure:
10
Field Technician - Computing and Peripherals
Types of Computers
Computers can be classified based on their size, speed and computing power. The following
table lists the different types of computers:
11
Participant Handbook
12
Field Technician - Computing and Peripherals
The following image shows a laptop and the internal view of the laptop:
• Unique Function Keys: Keyboards generally have function keys, marked from F1 to F12
that can be used when working. For instance, if the F1 key is pressed then it will open
help. Similarly, the F5 key can be used to refresh a document or a website.
On laptops, the function keys have more than one purpose, which can be accessed by
pressing the Fn key, and after that pressing the desired function key. The ‘a’ key can be
pressed to get a lowercase a, or the Shift key can be pressed with the ‘a’ key to get a
capitalized A. Some features of function keys are:
o Dual Displays: The dual-display key is useful when there is a second monitor
connected to the laptop or when the laptop is connected to a projector during a
presentation. If this key is pressed, four choices will be seen, with one selected. If it
is pressed again the next choice will be selected. The four choices are as follows:
1. Computer Only
2. Duplicate
3. Extend
4. Projector Only
o Screen Brightness: Keyboards have some keys to increase or decrease the screen
brightness. For example, F4 is used to decrease the brightness and F5 is used to
increase it. The screen brightness controls commonly use a circular icon which
resembles the sun, with a plus “+” and “-” sign to increase and decrease the
brightness respectively.
o Bluetooth: Laptops have a special key to turn the Bluetooth on and off. It is usually
indicated by an icon resembling an uppercase B.
Desktop
A desktop is a PC that is made to be used on or near a desk or a table, and is not portable. A
desktop PC has a mouse, a keyboard and a base unit which includes the computer’s
components. Some newer models have the base unit within the monitor to save space.
13
Participant Handbook
The following image shows a desktop computer along with its system unit or CPU and
peripherals:
Fig. 1.1.16: A desktop computer along with its CPU and peripherals
Server
A server computer is a central computer, which comprises of collection of data and
programs. It is also known as a network server as it allows all the connected systems to
share and store data and applications. File servers and application servers are the two main
types of servers. The following image shows a server computer connected to various other
computers:
14
Field Technician - Computing and Peripherals
When a new desktop is bought, some hardware components and devices, shown in the
following figure, come along with it:
Hardware
Computer Case
Power Supply
Motherboard
Exansion Cards
Processor Chip
Storage Devices
15
Participant Handbook
Computer Case
A computer case is a steel, aluminium or plastic enclosure which contains most of the
components of a computer. It is also known as a tower, cabinet, system unit or base unit. It
is available in different sizes and shapes. It has points, slots and screws for various
components to be fit into. A typical tower is shown in the following figure:
Motherboard
The main printed circuit board, or PCB, in a computer that holds the microprocessor,
provides sockets and slots to connect/hold the other peripherals/parts of the computer and
connects the power supply to various other electronic parts. It is also called as a system
board or main board, and allows the components to communicate with each other, making
it a complete working unit. It also has a provision for initial set up of computer after power is
turned on, which is the Basic Input/output System (BIOS) or boot firmware. The
motherboard also contains slots and provision for expansion cards. Sometimes, another
board, called a daughter board, is connected to the main motherboard for providing further
expandability.
16
Field Technician - Computing and Peripherals
Types of Motherboard
Following are the main types of motherboard:
• Integrated Motherboard: It has various components integrated into the board itself.
These may include the CPU, video card, sound card, and various controller cards.
• Non-integrated Motherboard: It uses various instable components and expansion
cards. For example, a non-integrated system board may enable upgrading the video
card by evacuating the old one and introducing another one.
Form Factor
The form factor of the motherboard determines the physical organization, general shape,
the sorts of cases and the power supply usage of the PCB. It also specifies the physical
layout, order of the board and the arrangement of mounting holes in the PCB. For example,
a company can manufacture two motherboards with the same functionality but having a
different form factor. The real differences lie in the physical layout and the position of the
components on the board. On the basis of the form factor, following are a few types of
motherboards:
17
Participant Handbook
Chipset
A chipset is a motherboard component that includes the CPU and other chips that support
basic functions of the computer.
The two main chips in the chipset are:
• Northbridge: Northbridge is the part of the computer chipset that provides a network
between the CPU and the other interfaces of the computer. These interfaces may
include memory, Accelerated Graphics Port (APG) port and Peripheral Component
Interconnect (PCI) bus. It is also linked to the Southbridge.
• Southbridge: Southbridge is the portion of the computer chipset that provides a network
between the north bridge and the slower speed interfaces and further connects the
interfaces to the CPU. These interfaces may include parallel ports, serial ports, Universal
Serial Bus (USB) ports and PS/2 ports.
The south bridge controls the slower I/O components like the Serial ports, USB ports and
the integrated development environment (IDE).
18
Field Technician - Computing and Peripherals
The following image shows the connection of South Bridge and North Bridge in a PCB:
There are several types of chips found on a motherboard of a CPU as shown in the following
table:
CPU chip Input Processing Unit Output
19
Participant Handbook
Peripheral
Component
CPU Slot RAM Slot PCI Express Slot
Interconnect (PCI)
Slot
•Also known as a •Provide slots or Used for expansion •Used for expansion
CPU socket placement for devices such as cards.
•Is where the inserting RAM modems, network •However, PCI
processor or the chips. cards, television express slot is used
CPU chips are •These can be easily tuners, radio tuners, for higher transfer
inserted on a removed and video cards and speeds and is
computer's replaced. sound cards. typically used for
motherboard. graphics cards.
20
Field Technician - Computing and Peripherals
Expansion Cards
The circuit boards which are inserted in the slots are called expansion cards. These
expansion cards allow a computer system to connect and communicate with its peripherals.
The following image lists few of the expansion cards:
Network Interface
Graphic Card Sound Card
Card
Ports
A port serves as an interface between the computer and other computers or peripheral
devices. The ports vary depending on the kind of equipment that will be connected to the
ports such as to connect a monitor, webcam, speakers the ports sizes are different, as shown
in the following image:
21
Participant Handbook
• The big connector which supplies the motherboard with power from the power supply
• Other connectors for the diskette drive, hard disk, CD-ROM drive and so on.
• Jumpers, which are used on some motherboards to configure voltage, various operating
speeds and so on.
• A number of pins used to connect the reset button, LED for hard disk activity, built-in
speaker and so on.
Connectors
Motherboards commonly have connectors that are used to run wires to the front panel.
There are several front panel connectors on the motherboard. Wires are plugged into these
connectors with the other ends going to the appropriate connection on the front panel. For
example, power drive, power button, reset button and so on.
22
Field Technician - Computing and Peripherals
Jumpers
Motherboards have a variety of different pins that can be connected with jumpers for
different purposes. The most common reason to access a jumper is to reset the BIOS
password. It is possible for a user to set the password for the BIOS so that only that user can
access the BIOS settings. If the user forgets the password, it can be cleared with a jumper to
manage the BIOS.
RAM Chips
RAM is the short-term memory used to store information which is being processed. It is
available as a RAM chip, which is an integrated circuit (IC) soldered on the motherboard. The
two types of RAM are static RAM (SRAM) and dynamic RAM (DRAM). SRAM is expensive to
produce, but faster and requires less dynamic power than DRAM. SRAM is typically used as a
cache memory for the CPU.
The following images shows different types of RAM:
ROM Chips
Read-only memory (ROM) is a non-volatile memory. It is available as a ROM chip, which is
also an IC soldered on the motherboard. The five basic types of ROM are:
• ROM - Read Only Memory
• PROM - Programmable Read Only Memory
• EPROM - Erasable Programmable Read Only Memory
• EEPROM - Electrically Erasable Programmable Read Only Memory
• Flash EEPROM memory
23
Participant Handbook
System Resources
System resources are not actual physical devices; they cannot be touched by reaching into
the machine. But, they are very important for two reasons. First, they dictate how the PC
organizes its access to various memory areas and devices. Second, they are one of the most
common areas where people have problems with the setup of their PCs: also called resource
conflicts. The following are the four types of resources that the various parts of a computer
can sometimes decide to fight over:
• Interrupts (IRQs): As described in the example in the chapter on how the PC works, a
device requests time from the processor using these interrupt requests. Under
traditional designs, each device has a different IRQ number. If two try to use the same
one, a conflict can result. Newer technologies can allow multiple devices to share an IRQ
channel.
• Direct Memory Access (DMA) Channels: Some devices have the ability to read and write
directly from the system memory, instead of asking the processor to do it for them.
Cutting the "middle man" out in this manner improves the efficiency of the system. Each
device that does this, needs its own DMA channel.
• Input/Output (I/O) Addresses: Devices exchange information with the system by putting
data into certain specific memory addresses. For example, when the letter "M" was
pressed in the example mentioned above, the keypress was stored in a certain memory
address until it was time for the processor to deal with it. Any time some information
goes into or out of the machine, to the modem or the hard drive or the printer, for
example, it uses these I/O addresses. Again, each device needs its own memory area.
• Memory Addresses: Similar to I/O addresses, many devices use blocks of memory as part
of their normal functioning. For example, they may map hardware programs (BIOS code)
into memory, or use a memory area to hold temporary data they are using.
• Jumpers: Motherboards have a variety of different pins that can be connected with
jumpers for different purposes. The most common reason to access a jumper is to reset
the BIOS password. It is possible for a user to set the password for the BIOS so that only
that user can access the BIOS settings. If the user forgets the password, it can be cleared
with a jumper so that the BIOS can be managed.
24
Field Technician - Computing and Peripherals
25
Participant Handbook
26
Field Technician - Computing and Peripherals
Other common keys or key combinations are: F1, F10, Del (delete key), Ctrl+Alt+Esc keys
(pressed at the same time), and Ctrl+Alt+Enter keys. On some laptops, the FN+Esc or FN+F1
keys can be pressed. There are a lot of combinations and one needs to read the messages on
the screen as the system starts as shown in the figure:
The BIOS can be used to verify the different components that are installed on a system. This
can be useful to ensure that the system is recognizing newly installed hardware. For
example, if new RAM is installed but not recognized, the BIOS can sometimes give insight
into the problem.
Figure shows a screen from a different BIOS version with the system information page
selected.
This page shows information about the processor type, processor cache, and memory. It can
be seen that the processor is an Intel Core i7, with a 133-MHz clock multiplied by 20, giving a
CPU speed of 2.66 GHz.
27
Participant Handbook
It can also be seen that the system has 12 GB (12,288 MB) of RAM installed. The RAM has a
speed of 1,066 MHz (using a 133-MHz clock multiplied by 8) and is DDR3 SDRAM.
Additionally, most BIOS systems will automatically detect the presence of different drives
and report their presence within BIOS. This includes hard disk drives and different types of
optical drives, such as DVD drives. Sometimes, these settings are reported in the Standard
CMOS Features page, if it exists, and other times the settings are on a dedicated page for the
drives.
Drives might be reported as SATA1, SATA2, and so on, if the system is using a SATA interface.
If the system is using an EIDE interface, they might be reported as IDE, EIDE, or as hard disk
drives. This can be useful if a new drive has been installed but is not recognized after
starting. Then, one has to go into BIOS, find the drive settings, and ensure that the new drive
is recognized by BIOS. If it's not recognized, the hardware such as the cables or the
configuration has to be checked.
BIOS Configuration
There are a few configuration settings that are important to understand. Changes that are
made in the configuration will remain in the system even after the system has been powered
off.
Time and Date: A very basic setting for the BIOS is the time and date. These settings can be
seen on the very first page of the BIOS, which is sometimes called the Main page or the
Standard CMOS Features page. The computer keeps time with a real-time clock, and the
CMOS battery keeps the clock ticking even when the system is turned off. This rarely needs
to be changed except when the CMOS battery is failing. If the battery is failing, the real-time
clock becomes slow and needs to be reset often. When replacing the battery, make sure that
it is replaced with the correct type. Motherboard manufacturers warn the users that a
wrong battery could explode. Also, local regulations should be followed when disposing the
original battery.
Boot Sequence: One of the most important BIOS settings for a technician to understand is
the boot sequence. The boot sequence setting tells the computer about the device from
which it should try to boot first. If the hard drive does not have a bootable operating system,
it will look for a bootable operating system on the CDROM, then on a floppy drive, and then
by using PXE. As configured, it will never boot using the CDROM drive, unless the hard drive
fails. If the booting has to be done using a bootable CDROM drive, the configuration will
have to be changed.
Clock Speeds: Motherboards typically include a serial presence detect (SPD) chip that
detects and stores the speed of the CPU and the RAM. The BIOS either reads the data from
the SPD chip or automatically detects the clock speeds and reports them. Some BIOS utilities
allow manipulating these clock speeds by altering the frequency, the multiplier, or the
voltage. For example, if a system has a 133-MHz clock and a 20x multiplier, the speed is 2.66
GHz. If the clock is changed from 133 MHz to 148 MHz, the speed is 2.96 GHz. If the
multiplier is changed from 20x to 24x, the speed is 3.55 Ghz.
28
Field Technician - Computing and Peripherals
Manufacturers commonly warn that modifying these settings can cause additional heat or
other damage. It can also cause the CPU or other components to fail, and reduce the system
performance. However, for the promise of a quicker PC, many hobbyists are willing to take
the risk. The biggest danger of over-clocking is heat. The more quickly a system runs, the
hotter it gets. If it gets too hot, it can destroy components.
Security: Many BIOS utilities include security settings, and the most common security setting
is related to BIOS passwords. Other possible settings are related to a Trusted Platform
Module (TPM) and LoJack. Looking again at the given figure, the settings for a supervisor
password and a user password can be seen. When set, the supervisor password provides full
control over any BIOS settings and is sometimes set by administrators to ensure that they
can override any changes made by a user. Depending on the BIOS, the user password
provides varied access. It might allow the user to do anything except change the supervisor
password, or it might allow the user to change only limited settings such as the date and
time. In some systems, it requires a user to enter the password every time the system is
started.
POST and Other Diagnostics: POST is an in-built diagnostic tool that starts as soon as the
processor of a computer starts. POST verifies that the various hardware components of a
computer such as the keyboard, random access memory and disk drives are functioning
properly. If POST is successful then the computer begins to boot, else the BIOS issues an
error message. The error message is in the form of a series of beeps. These beeps may have
a pattern of long beeps or short beeps or a combination of the two depending on the nature
of the problem. The pattern of beep conveys information about the type of the fault
detected. For example, if the POST is unable to detect the processor, it will stop the boot
process and convey the message through a code of beeps.
POST can only test internal functioning of the card and not the external interface logic of the
card. There are two types of test that can test the external interfaces of the card with other
boards in the system. These are shown in the following figure:
Interface Tests
• The card is labelled as out of service. The neighboring cards are then
configured to work in the interface test mode. The card under test is
instructed to run the test. The neighboring cards are then restored by bringing
them out of test mode.
29
Participant Handbook
Keyboards allow users to enter letters, numbers and other symbols into a computer that can
serve as commands or be used to type text.
30
Field Technician - Computing and Peripherals
Standard
alphabets
Alphanumeric
Numbers
keys
Punctuation
Function(Fn) key
Modifier keys
Shift key
Keyboard
Arrow key
Home key
Tab key
Navigation
key/Cursor key
Insert key
Delete key
Lock key
• Alphanumeric keys: Are the standard letters and numbers, and also include punctuation
keys such as comma, period, semicolon, and similar keys
• Modifier keys: Are special keys that modify the normal action of another key, when the
two are pressed in combination and are categorised into:
31
Participant Handbook
o Fn key
o Shift key
o Alt key
o Ctrl key
• Navigation keys or cursor keys: Includes a variety of keys which move the cursor (a
mouse cursor, also called a pointer, is a symbol which is shaped like an arrow or a small
hand pointing towards the top of the display device.) to various places on the screen:
Monitor (Output Device)
.
The monitor is an output device, also called a visual display unit (VDU) that shows the
graphical and textual information of the computer. The following image shows a LCD
monitor:
Storage Devices
Storage devices, also called storage media, are hardware devices which are used to store
data or information. It can store information temporarily or permanently. These devices can
be added to computers externally or internally. Storage devices are of two types:
• Magnetic storage: Includes hard disk drive, magnetic tapes, floppy drive and so on.
• Optical storage: Includes CD-R, CD-RW, Blue ray disk, DVD, flash drive and so on. It uses
laser ray or light to access data in it.
The following images shows the storage devices:
32
Field Technician - Computing and Peripherals
In case of a laptop, the hardware components and devices that come along in the package
are same as that of a desktop except a few changes; instead of mouse, laptops have
touchpads or track pads and instead of external power source, laptops have an internal
battery.
Physical components:
• Platters: Hard drives have multiple spinning platters, and each platter can be written on both
the sides.
• Read/write head: A hard drive will have one read/write head for each platter side. This drive
has two platters and four read/write heads.
• Actuator: The actuator controls the movement of the arm.
• Actuator arm and axis: The actuator arm is moved back and forth by pivoting around the
actuator axis.
Logical components:
• Tracks: Each platter is logically divided into multiple tracks, which are circular areas on
the disk. When the head is positioned over a track, it can read or write data on the track
as the platter spins.
• Sectors: Tracks are logically separated into track sectors. A sector can be between 512 bytes
and 2 KB in size.
• Clusters: A cluster is a group of multiple sectors. Clusters are also known as allocation
units and are the smallest element of a drive to which an operating system can write.
• Files: Files are written to clusters. If the file is bigger than a single cluster, the file is written
to multiple clusters. Ideally, a file will be written to clusters that are next to each other,
or
33
Participant Handbook
contiguous clusters. However, if other data is already written on an adjoining cluster, the
file is fragmented and written to another available cluster.
It is relatively common to replace or add a hard drive to a system. For example, many people
store enough data on the original drive that came with their computer and fill up the drive. They
can either buy a new computer or buy an additional hard drive; the additional hard drive is much
cheaper.
While buying a new hard drive, the following important considerations need to be kept in mind:
1. Capacity or Size: The size of the drive is listed as GB or TB; for example, 750 GB or 1 TB.
Bigger drives hold more data but are more expensive.
3. Rotational speed: This is stated as rpm, and higher speeds generally result in a faster
drive.
The rotational speed of the drive helps determine how quick it will be overall. Common speeds
are 5,400, 7,200, 10,000, and 15,000 rpm. Drives with 7,200 rpm are used in standard desktop
computers.
Other factors also contribute to the speed. For example, seek time refers to the average
amount of time it takes to move the read/write head from one track to another track; lower
seek times are better. If two drives are of the same size with the same rpm speed but one is
significantly cheaper, it might be due to a higher seek time, resulting in overall slower
performance.
The interface can also limit the speed. Imagine a drive spinning at 15,000 rpm with a low
seek time. It can read and write data to and fro from the hard drive, but how much data can
actually be transferred between the hard drive and the other computer components is
limited. The following sections describe the common interfaces.
Processor
Processor is a logical circuitry unit which is embedded in a printed main board (or
motherboard), which responds to instructions and also helps in running programs like OS,
and others such as Windows Office and so on. The processor is commonly known as a
central processing unit or CPU; a small silicone chip aimed to perform complex
computations. There are many types of processors like AMD (advanced Micro devices), Intel
processors and DSP (Digital signal Processing) processors.
There are two primary manufacturers of computers used in computers: Intel and Advanced
Micro Devices (AMD).
34
Field Technician - Computing and Peripherals
1. Intel: Intel is the largest seller of CPUs, selling about 80 percent to 85 percent of all
CPUs. It manufactures other products as well, including chipsets, motherboards,
memory, and SSDs.
2. AMD: AMD is the only significant competition to Intel for CPUs, and it sells about 10
percent to 15 percent of all CPUs. It also manufactures other products, including
graphics processors, chipsets, and motherboards.
Processor Technologies
Processor technologies in the following sections might be used by AMD only, by Intel only, or
by both vendors. These technologies are used to help distinguish different processors from
each other in terms of performance or features.
Overclocking
VRM
Throttling
35
Participant Handbook
Software
Software is a set of instructions or programs used to instruct a computer to perform specific
tasks. The following figure shows classification of software based on their application:
Software
36
Field Technician - Computing and Peripherals
Fig. 1.1.43: Block diagram of a computer with respect to the operating system
The three most commonly used operating systems for personal computers are Microsoft
Windows, Mac OS and Linux.
Microsoft Windows
Windows is an OS owned by Microsoft. It is different from any open source software in the
sense that only Microsoft can make changes to the code. It can be installed on different
kinds of computers, by various manufacturers, giving a wide range of choice for hardware to
the user.
The latest version Windows is 10 which includes touchscreen support. This combines the
usability of a touchscreen tablet and the power of a desktop/laptop computer. It also
includes the "Play To" and "Remote Media Streaming," features that allow a user to play
media from the computer on another device. These features also allow the user to access
media when away from the computer.
A processor running Windows OS has two modes:
• User mode
• Kernel mode
The Windows hardware abstraction layer is an interface between the hardware and the rest
of the OS. It hides differences in hardware components and provides a consistent platform
for the kernel to run. This layer includes hardware-specific code which controls multiple
processors, I/O interfaces and interrupt controllers.
37
Participant Handbook
The OS has to share memory with an application program. It manages the memory
management hardware of the computer and decides which memory locations a
process may access. It controls the assignment of memories to the processes.
File System Management
The transfer of information in a computer takes place through the various input and
output devices. Processes use the system call interface to access these devices. The
OS has to control the devices in such a way that they are properly shared by all the
processes needing them. The programming interface made available to the services
by the OS is termed as the system call. It is commonly written in C/C++ language.
38
Field Technician - Computing and Peripherals
Directory Structure
The root directory in Windows OS is represented as "drive:". For example, the root directory
is generally "C:\". The directory separator is a "\" but the OS also recognizes a "/" internally.
The following figure shows the folders which appear in the root directory of a Windows OS:
Root
drive:\
39
Participant Handbook
Configuration/Installation
The steps that should be performed in order to install the Windows operating system on a
computer are shown in the following figure:
Save the changes of the settings and Select the CD-ROM drive as the first
shut down the system. boot device of the computer.
Mac OS
Mac OS which was known as Mac OS X earlier, is a Unix-based graphical OS developed by
Apple Inc. and is designed to be run only on Apple's Macintosh computers. After Microsoft
Windows, Mac OS is the second most widely used desktop OS. In the earlier years, Mac OS
had a negligible number of types of spyware and malware which have affected the Windows
users. The share of usage of Mac OS is smaller compared to Windows. Apple regularly
releases security updates for Mac OS. The latest version of this is Mac OS 10.12 Sierra.
Functionally, the Mac OS architecture consists of several layers. The base level of the
operating system is its Unix core. The next layer is the graphics and media layer, which
consists of Core Audio, OpenGL, Core Video, Core Image and QuickTime. Then comes the
application framework layer, whose components are, Carbon, Cocoa, and Java. Finally, the
top layer is the user interface, which is called Aqua. It provides a working interface to the
user.
The following figure shows the architecture of Mac OS:
40
Field Technician - Computing and Peripherals
Directory Structure
The Mac OS file system also stores the files within folders or directories. The topmost folder
is the root directory. Folders located within the root are called subdirectories.
The root directory is referred to as /. Within the root, by default, there are several additional
folders. These include the Application folder that stores programs and the Users folder that
stores the home folder information for each user account. The following figure lists some
directories of Mac OS:
/Application
/Developer
/Library
/Network
/System
/Users
/Volumes
/ (root directory)
/bin
/etc
/dev
/usr
/sbin
/tmp
/var
41
Participant Handbook
Utilities
The following figure shows the list of some common utilities of Mac OS:
Mac OS Sierra
Default Folder
Text Expander
Bartender
Launch Bar
Configuration/Installation
One can install Mac OS over any earlier version, without removing the data. The following
figure lists the steps to reinstall the Mac OS:
Linux
Linux is a free and open-source software. The main component of the Linux OS is the Linux
kernel.
The user interface, called shell, may be a command-line interface (CLI) or a GUI. For any
desktop system, the default mode is usually GUI. The CLI is also available either through a
terminal emulator Windows or an independent virtual console.
42
Field Technician - Computing and Peripherals
Linux Utilities
Linux
saidar
wnmon
ncdu
slurm
43
Participant Handbook
Directory Structure
The following figure lists the directories of the Linux OS:
Configuration/Installation
To install, update or remove a software in Linux, certain package managers are used such as:
• Synaptic Package Manager
• Package Kit
• Yum Extender
44
Field Technician - Computing and Peripherals
Most of the major Linux distributions contain extensive repositories. Users can:
• download the pre-compiled packages from websites directly,
• install the packages from unofficial repositories or
• compile the source code by themselves.
Other Software
System software includes the OS and utilities. A field technician should know about the
utilities that are compatible with the OS version. The person must be able to search for the
utilities that are correct for the user and install them on the system. Moreover, the
technician should know the use of software such as:
• Commercial software
• Mail server software
• Remote access software
• Antivirus software
The following figure lists the general steps of installing a software on any operating system:
45
Participant Handbook
The following figure lists the steps to assemble and install a desktop (note that these steps
may not apply to all the desktops, but are the typical steps to be performed):
46
Field Technician - Computing and Peripherals
A computer network helps the end-user computers to share common resources, as shown in
the following figure:
In the preceding figure, the main server is connected to the end-user computers through a
switch. The switch is connected to the router, which is connected to the Internet via a
modem. The switch is also connected to a print server acting as a medium between the end-
user computer and the print server. The print server connects the two printers to the
computers in the network.
47
Participant Handbook
[[
Sharing of devices,
such as printer and
scanner
Sharing of Sharing of
Internet software or
connection program
Network Architecture
Network architecture is a structural model that specifies the type, layout and components of
a network along with data format, different protocols and services provided. The following
figure shows the types of network architecture:
Network
Architecture
Peer-to-Peer Client-Server
48
Field Technician - Computing and Peripherals
offer the same performance in case of heavy network loads. The following figure shows a
peer to peer network architecture:
49
Participant Handbook
The following figure lists some of the servers along with their description:
File Server
•It provides data such as data files, e-mail and printer access programs which are shared
among various clients in the network.
•It has large hard disks which all users in the network share.
•Application softwares and shared data reside on this server.
Print Server
•It acts as a buffer for the print jobs sent by the users to the shared printers or centralised
printers.
Communication Server
•It grants the outside users access to the network through a telephone line.
Mail Server
Clients
Client computers access the network and use various shared resources in the network. They
rely on servers for resources, such as files, devices, and even processing power. They receive
services from the servers as per their request.
[[
Types of Network
There are mainly three types of network classified according to the area covered for
transmission, as shown in the following figure:
50
Field Technician - Computing and Peripherals
LAN
The network that is distributed over a small area, such as within a building, school, or home
is called LAN. It allows a number of users to share common resources. Generally, a LAN is
limited to 255 users per LAN. The following figure shows a LAN:
Fig.1.1.65: LAN
LANs generally employ Ethernet cables for connecting various devices within the network. It
can connect to mainframe or the minicomputers through network devices such as routers or
bridges.
TIPS
Ethernet is a network protocol which defines a standard way to connect computers on a
network over a wired connection (LAN).
MAN
MAN is a network that interconnects the nodes or computers with resources within a
geographic area or region which is larger than the area covered by a LAN but smaller than
that of a WAN. The following figure shows a MAN:
Fig.1.1.66: MAN
51
Participant Handbook
A MAN typically includes one or more LAN but covers a smaller geographic area than a WAN.
It can also be defined as the interconnection of several local area networks by bridging them
with backbone lines. This usage of MAN is also sometimes referred to as a campus network.
WAN
WAN is used to connect devices over much larger distances than LANs. A WAN is established
by connecting LANs using routers. WAN is not limited to a single person or organization, for
example, Internet, which is a network of networks spread across the globe for exchange of
information and services. The following figure shows a WAN:
Fig.1.1.67: WAN
52
Field Technician - Computing and Peripherals
53
Participant Handbook
The following figure shows the intranet, extranet and the Internet:
54
Field Technician - Computing and Peripherals
• Duplex: Data can be sent in both the directions simultaneously. A device can send as
well as receive data. Example: Telephone network
File management
Based on its architecture, there are two approaches to network operating system:
55
Participant Handbook
The following figure lists the advantages and disadvantages of peer-to-peer NOS:
Advantages Disadvantages
Advantages Disadvantages
1.1.5 Troubleshooting
Operating system problems can be attributed to hardware, software, networks, or some
combination of the three. There will be needing to resolve OS problems more often than
others. A stop error is a hardware or software malfunction that causes the system to lock up.
An example of this type of error is known as the Blue Screen of Death (BSOD) and appears
when the system is unable to recover from an error. The BSOD is usually caused by device
driver errors.
56
Field Technician - Computing and Peripherals
The problems related the OS can be due to one or more of the following:
• the hardware,
• the software,
• the networks
Certain errors are more common than the rest. A stop error occurs due to the
malfunctioning of a hardware or a software and results in the lock up of the system. Blue
Screen of Death (BSOD) is one such error and takes place when the system becomes
incapable of recovering from an error. It generally happens because of device driver errors.
The cause can be researched by using the Event Log or other diagnostic methods. Prevention
of such errors entails:
• Verifying that compatible hardware and software drivers have been used
• Ensuring that the latest patches and updates of Windows have been installed
If the system stops working during Start up, it can begin to reboot due to the auto restart
function of the Windows. The error message, then, cannot be read properly. One needs to
go to the Advanced Start up Options menu and disable this function.
A few commonly occurring operating system problems and their solutions are shown in the
following chart:
57
Participant Handbook
58
Field Technician - Computing and Peripherals
"Missing NTLDR" error • NTLDR has been removed • NTLDR from the
is displayed on the or is impaired. installation media
computer screen after • ntdetect.com has been should be restored.
the POST in the removed or is impaired. • ntdetect.com from the
Windows XP. • boot.ini has been installation media
removed or is impaired. should be restored.
• The BIOS has incorrect • boot.ini from the
boot order settings installation media
• The MBR has been should be restored.
corrupted. • The boot order within
• Hard drive failure is the BIOS settings
detected. should be altered to
• Hard drive jumpers start the boot drive
are incorrectly set. • fdisk /mbr command
present in the Cmd
prompt should be run.
• chkdsk /F /R command
from the recovery
console should be run.
• Hard drive jumpers
should be reset.
Failure of a service to • The service has not been • The service should be
start after the enabled. enabled.
computer has been • The service has Manual • The service should be
booted settings. set to Automatic.
• Failed service needs • The appropriate
some other service to service should be
get enabled. re- enabled or re-
installed.
Failure of a device to • The power for the • The power for the
start after the external device has not external device should
computer has been been switched on. be switched on.
booted • The device is not joined • Both the cables should
to the data cable or the be checked, and the
power cable. required connections
• The BIOS in its settings should be done.
has the device as • The BIOS settings
disabled. should be opened, and
• Device failure is the device should be
detected. enabled.
• A device lacks • The device should be
compatibility with a replaced.
recently installed device. • The recently installed
• The driver has become device should be
corrupted. removed.
• The installation of • The driver should
the driver is still in be re-installed or
process. rolled.
59
Participant Handbook
60
Field Technician - Computing and Peripherals
61
Participant Handbook
62
Field Technician - Computing and Peripherals
63
Participant Handbook
GUI is not detected for • The start-up files for • The computer
all the users or the GUI Windows are should be repaired
does not load. missing. by going to the
• The operating system advanced start-up
has been corrupted options menu.
by Window updates. • The Windows Start-
up Repair should be
run.
• The OS should be
reinstalled.
The computer abruptly A program is responsible for • The computer
shuts down. the sudden shut down of the should be booted
Windows OS. to Safe Mode and
start-up
applications should
be managed by
using Ms-config
command.
Computer boots to the • A program that has • The start-up
safe mode. been installed leads settings of the
to the computer program should be
booting to the safe adjusted by using
mode. the msconfig
• The computer has command.
been configured to • The computer
boot in Safe Mode. should be
configured to boot
normally by using
the msconfig
command.
Computer boots just to • There is a corrupt • The video driver
the VGA mode. video driver. should be
reinstalled.
Fig.1.1.75: Troubleshooting
64
Field Technician - Computing and Peripherals
Exercise
1. What are the main functional units in a computer?
a. __________________
b. _________________
c. __________________
d. __________________
65
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. List the different types of peripherals
2. Describe peripherals’ standard installation procedures
3. Identify different modules in the peripherals and their functions
Webcam
Microphone
Peripheral
Devices
Printer
Output
Speakers
Devices
Projector
66
Field Technician - Computing and Peripherals
Webcam
Webcam is a video camera which streams real-time images through a computer to
a network. The video data/stream may be saved, viewed and sent via the Internet. Webcams
are used for video conferences, video chats, video broadcasting, and security surveillances
and so on. The following image shows a webcam:
Fig.1.2.2: Webcam
Scanner
A scanner reads documents (text and photographs) and stores it in the computer to which it
is connected. The physical document is converted to digital format after it gets scanned. The
digital document can be viewed and modified on a computer. Earlier a software needs to be
installed in the computer for scanners to work but now all the systems have inbuilt settings
to detect the scanner automatically. Basic scanning software allows the user to import data
from it.
Scanners with flat scanning surface are suitable for books, pages, photographs and so on.
The following image shows a scanner:
Fig.1.2.3: Scanner
67
Participant Handbook
Microphone
A microphone is an input device which converts sounds to electrical energy variations, used
to record voice or interact with the computer through voice. The following image shows a
microphone:
Fig.1.2.4: Microphone
Printer
Printer is a peripheral device which is used to display graphics or text on paper. They are a
great resource, but they should be used in a controlled way. Their overuse puts unnecessary
wear and tear on them and also uses up expensive ink and paper. The following image
shows a printer:
Fig.1.2.5: Printer
The historical backdrop of printing goes back to the duplication of pictures using stamps in
early times. The evolution in printing has made it feasible for books, daily papers, magazines,
and other readable materials to be created in appreciable numbers, and it plays a vital part
in advancing literacy.
68
Field Technician - Computing and Peripherals
One of the most serious issues with paper happens when it is exposed to humidity. The
paper would not really be wet, yet it can absorb the humidity from the air, making it
more troublesome for the printer to move it through the paper way. The outcome is
more paper jams. So, as a best practice, the paper should be put away from areas that
are subjected to high humidity.
69
Participant Handbook
70
Field Technician - Computing and Peripherals
On the basis of modern print technology, the printer can be classified into following types:
• Laser Printers:
o High-quality output
o Used by medium to- large organizations
o Includes pickup rollers, separator pads and imaging drums
• Inkjet Printers:
o Send jets of ink from the print head onto the paper
o Print in black and white or in full colour
o High-quality photographs
• Thermal Printers:
o Heat up the paper to print the output
o Used to print cash register and ATM receipts and lottery tickets
• Impact Printers
o Create a print using small hammer-like pins to force ink onto the paper
o Still used in businesses where multipart forms are printed
Laser Printers: Laser printers give a very high-quality output and are generally used as a part
of medium to-substantial associations that require quick, top notch printers. They have
turned out to be more reasonable and are additionally utilized as a part of little small
offices/home workplaces (SOHOs) and even by a few individual clients. The description of a
few components of a laser printer is as follows:
• Pickup rollers are used to pick up a sheet of paper and begin feeding it through the
printer.
• Separator pads work with the pickup rollers to ensure that only one piece of paper is
picked up at a time.
• Imaging drums are round, rotating cylinders that are covered with a photosensitive
surface; meaning it is sensitive to light. A laser uses light to write an image onto the
drum.
• Toner is an extremely fine powder that includes carbon and plastic. It is electrically
charged during the imaging process, causing it to stick to the drum where the laser
wrote the image. Later in the process, it is transferred to the paper.
• Transfer rollers charge the paper. The image is transferred to the paper because the
charged paper attracts the toner.
• Fuser assemblies heat the toner and melt into the paper.
• Transfer belts are used only on some high-end colour laser printers. Colours are first
applied to the transfer belt and then applied to the paper.
• A high-voltage power supply provides voltages as high as -1,000 VDC. This is used only in
laser printers.
71
Participant Handbook
As a technician, one has to work with laser printers; so it is important to understand how
they work to be better prepared to maintain and troubleshoot them. The laser imaging
process includes seven stages or steps, and these steps work in a specific sequence as the
imaging drum is rotating. The following figure shows an overview of these stages, labelled as
Processing, Charging, Exposing, Developing, Transferring, Fusing, and Cleaning:
1. Processing: The handling stage is also called the raster image processing stage. A raster
is a solitary line of spots, and a raster image is the mix of all the raster lines for a page. A
laser printer recognizes the page as a raster dot images. For example, consider a 600 ×
600 dpi laser printer. For a given square inch of a sheet of paper, the raster image
incorporates insights about each of these 360,000 dots. These points of interest
incorporate, regardless of whether it ought to be printed or not, how light or how dim
the dab ought to be; and, if it's a colour printer, also, what should be the colour of the
dots.
Most laser printers incorporate a raster image processor (RIP) that makes the raster
image. The PC sends the print job to the printer in a configuration the RIP comprehends,
and the RIP at that point makes the raster picture. Raster images can take up a great
deal of room. On the off chance that pages are printed using 600-dpi illustrations, it
takes around 4 MB of RAM for each page to hold the raster image. If it's a coloured
page, it takes around 16 MB of RAM for every page. In a case when the printer doesn't
have enough space to hold the print work, it will frequently give a "low memory" or "out
of memory" blunder message.
2. Charging: In the charging step, an essential charge roller applies a high-voltage negative
charge to the imaging drum. In an old laser printer, this was connected with a corona
wire that was effortlessly broken during the maintenance activities. However, most new
laser printers utilize an essential charge roller. This voltage is normally between 500
and 600 VDC, but they can be as high as - 1,000 VDC as well.
72
Field Technician - Computing and Peripherals
3. Exposing: After the drum has a uniform charge, the laser exposes the imaging drum with
the raster image in the exposing stage. It does this by sending a highly focused laser
beam through one or more mirrors and lenses, and when the beam hits the
photosensitive drum, it neutralizes the charge applied in the previous step. However, it
neutralizes the charge only where the laser beam hits the drum, as shown in the
following figure:
Now, the drum has a high-voltage negative charge everywhere, with the exception of where
it has been uncovered by the light bar. At the place where the drum has been uncovered, it
develops a negative charge.
4. Developing: The toner is connected to the imaging drum in the creating stage. To start,
the toner is given a negative charge. Now, the imaging drum has a negative charge with
the exception of where the picture has been uncovered, and the toner likewise has a
negative charge. When managing power, similar charges repulse and opposites are
drawn toward each other. In this manner, in the event that there are two parts with
comparative charges, they are pulled away from each other, while two segments with
inverse charges are pulled in towards each other. For this situation, the contrarily
73
Participant Handbook
charged toner is pulled in to the uncovered ranges of the drum that have a nonpartisan
charge.
Toner is in the toner cartridge, and the designer roller makes the toner available to the
drum. As the drum turns, the toner adheres to the drum where the image has been
composed to the drum. The following figure shows a side perspective of the imaging
drum:
There are a wide range of toner and toner cartridges. For instance, a few producers
incorporate the engineer roller (now and then called only the designer) in the toner
cartridge.
5. Transferring: The toner is connected to the paper in the exchanging stage. In the first
place, pickup rollers move over the top of the paper in the paper plate to get a page.
Separator cushions roll the inverse path from underneath to guarantee that just a single
sheet of paper is transferred. Next, an exchange roller (now and then called an exchange
crown) charges the paper, giving it an inverse charge from the toner. Similarly, as the
toner was pulled in to the drum in the creating stage due to inverse charges, it will be
pulled in to the paper in this phase due to inverse charges. After the paper is charged,
it's passed to the drum and the toner hops to the paper, as shown in the following
figure:
74
Field Technician - Computing and Peripherals
Laser printers have a static charge eliminator that expels the static charge from the paper
instantly after the picture is exchanged. It has been observed how socks stick together after
they have expelled them from the clothes dryer. So also, the paper can adhere to the drum if
the static charge isn't removed.
6. Fusing: The toner isn't joined to the paper in the exchanging stage. On the off chance
that it could be lifted up and shook, the toner would simply tumble off. The toner is
melded to the paper in the combining step. Toner is made out of carbon and plastic
particles, and on the off chance that plastic is warmed, it softens. The fuser get together
warms the toner with the goal that it dissolves into the paper. One of the fuser rollers is
heated, and the other fuser gives grinding to press the toner into the paper as it is
softened. The following figure demonstrates how the paper is passed between two fuser
rollers:
7. Cleaning: In this stage, excess amount of toner is scratched off the drum and gathered
for transfer. The scrubber is a little plastic or elastic cutting edge that scratches the toner
off without harming the drum. Next, an erase light kills the charge on the drum, as
shown in the following figure:
75
Participant Handbook
Maintenance
Despite the fact that there are various models of laser printers, it can be seen that they
share regular upkeep undertakings. Security is one of the most critical things to
acknowledge. A laser printer incorporates a high-voltage control supply. Voltages are as high
as - 1,000 VDC and can be savage. Remain safe and unplug the laser printer before playing
out any upkeep. Additionally, capacitors inside a power supply can hold a charge even after
a gadget is unplugged. Hence, even after unplugging the printer, it should be handled with
caution.
The fuser get together melts the toner onto the paper and achieves a temperature of around
180 degrees Centigrade (around 356 degrees Fahrenheit). Thus, after the printer has been
unplugged, it could still be hot. In the event that the imaging drum is uncovered amid
support, care should be taken not to touch it. It could get scratched or could be left with a
check that would not be cleaned amid a print cycle. These scratches or checks would show
up on each printout until the point that the drum is supplanted.
Replacing Toner
If the toner runs low, then it degrades the print quality of the printouts. Additionally, most
laser printers give programming cautions telling that the toner is running low and its solution
is to replace the toner.
Different printer models have distinctive techniques for replacing the toner, and it is
essential to follow the maker's directions. Following are some broad rules that apply to most
of the toner cartridges:
• Instructions will generally guide to shake the cartridge here and there and from side to
side. This relaxes the toner and guarantees that there is full use out the cartridge.
• Most toner cartridges incorporate some kind of seal to keep the toner from spilling out.
It is regularly a bit of tape or plastic that could get expelled before the new cartridge is
introduced. In the event that it is not evacuated, the printouts will be clear.
• Be cautious when dealing with the new toner cartridge. In a perfect world, you should
expel the new cartridge from the bundling and embed it instantly in the printer. This
implies you have effectively expelled the old cartridge.
• If the toner spills on you or another person, counsel the guidelines or Material Safety
Data Sheet (MSDS) to figure out what to do. By and large, you can wash it off with icy
water. It's intended to soften, so you ought not to flush it off with warm or high temp
water. In the event that it spills on a work area, you can evacuate it with paper or
material towels doused with chilly water.
• If you have to vacuum a toner spill, you should utilize an exceptional vacuum with a high
proficiency particulate capturing (HEPA) channel. Without a HEPA channel, the toner
particles may very well blow appropriate over into the air.
76
Field Technician - Computing and Peripherals
• Recycle the old cartridge. Many organizations will buy these. Organizations revamp
them, fill them with toner, and offer them at a reduced cost.
Inkjet Printers: Inkjet printers can create high quality coloured printouts and are extremely
affordable. These two advantages make them extremely well known among home clients
and a few SOHOs. They don't have the same number of serviceable parts inside them, so you
don't need a profound comprehension of how they function to look after them. The
following figure shows the main parts of an inkjet printer:
At least one print head is connected to a carriage and belt get together, and this gathering
moves the heads from side to side as the paper is bolstered through the printer. Ink
cartridges can be joined to the print head or can be found somewhere else.
A stepper motor and a pulley control the carriage and belt assembly and typically
incorporates a plastic guide and sensors. The sensors identify the position of the print head
and paper. The gathering additionally incorporates an information link associated from a
printed circuit board to the print head.
Impact Printers: These are the first printers used with the computers. Despite the fact that
the innovation for affect printers is exceptionally old, they are as yet utilized as a part of
organizations where multipart shapes are printed. Different spots where you may see them
include back divisions.
77
Participant Handbook
The main components of an impact printer are the platen, the ink lace, and the print head,
appeared as things 1, 2, and 3 in the figure given below. Impact printers usually utilize a
tractor encourage and utilize persistent nourish paper. The paper has openings on the edges
the thing 4 that fit into sprockets in a tractor bolster instrument in the printer. The tractor
feeder moves a persistent fan-crease move of paper through the printer. The following
figure shows the basic components of impact printers:
The platen is a hard, elastic like material that gives a back to the print head. The ink lace is a
long segment of fabric soaked with ink. It's associated with two rollers that relentlessly wind
the strip from one roller to the next, and when it achieves the end, it switches bearings.
The print head has little mallet like sticks that hit the strip and press the ink from the lace
onto the paper. A motor and-carriage assembly move the print head from side to side as it
prints. When the printer finishes a line, the tractor feed advances the paper to the next line.
Thermal Printers: Thermal printers are utilized to print money enrol receipts, ATM exchange
slips, and even lottery tickets. More established fax machines utilized warm printers as well,
yet most fax machines now catch the approaching fax as a document that can be printed
with a laser or inkjet printer.
Thermal printers utilize an extraordinary sort of warm paper that is secured with a synthetic.
At the point when the compound is warmed, it changes shading. Most warm printers can
print just a solitary shading, yet some can print two hues. The paper is typically on a move
with a middle sprocket, and clerks can for the most part supplant a void come in under a
moment.
Different segments of a thermal printer are as follows:
1. A feed assembly that encourages the thermal paper through the printer. The nourish get
together uses the sprocket in the focal point of the move to propel the paper.
2. A print head that incorporates a heating component to heat the paper. Warm printers
are generally moderate, with their speed measured in inches every second (ips). Be that as it
may, they don't have to print much. Likewise, with most printers, warm printers should be
cleaned occasionally with compacted air or an ESD-safe vacuum to expel garbage. You can
clean the print head with isopropyl liquor and a build-up free fabric or a cotton swab.
78
Field Technician - Computing and Peripherals
Cleaning the print head broadens its life, yet you can supplant it on the off chance that it
falls flat.
Device Drivers
When the printer makers make printers, they, likewise, compose device drivers for various
working frameworks. These drivers give the working framework the points of interest it
needs to work with the gadget. When you purchase another printer, the maker incorporates
a CD with programming that you can use to introduce it.
Most of the makers also submit drivers to Microsoft. On the off chance that the drivers meet
certain quality confirmation necessities, Microsoft makes them accessible by means of
Windows Update. If none of these strategies work, you can go to the maker's site to find the
right driver. On the off chance that you can't locate a reasonable driver, the printer will
ordinarily create an output.
Required Permissions
On Windows Vista and Windows 7, consistent users can introduce the printer with no
uncommon authorizations as long as the print driver is accessible. If the print driver isn't
accessible, the client will require managerial authorization to introduce an alternate print
driver. Additionally, managerial consents are required to introduce applications, so normal
clients won't have the capacity to introduce programming applications that accompany a
printer.
On Windows XP, clients should be in the Power Users gathering to introduce a printer or
include an alternate driver.
Wired Connections
The most widely recognized way a printer is associated is by utilizing a USB association.
Printers regularly have a USB Type B port, and you utilize a link with a USB Type A connector
toward one side for the PC and a USB Type B connector on the other side for the printer.
Wireless Connections
Numerous printers incorporate remote capacities that enable remote frameworks to
interface with them without a wired association. The regular sorts of remote associations
incorporate the accompanying:
1. Remote systems utilize one of the 802.11 conventions, for example, 802.11a, 802.11b,
802.11g, or 802.11n.
79
Participant Handbook
2. Bluetooth is regularly used to make individual territory systems; PANs, for example, with a
cell phone and a headset. A few printers bolster Bluetooth, and with Class 2 Bluetooth, the
printer can be upto 10 meters (33 feet) away.
3. TV remotes utilize infrared, and it has been utilized with printers. A disadvantage is that it
requires an observable pathway between the printer and the PC.
USB printers are automatically installed when you plug them in. However, you have to take
some additional steps to add a networked printer to a computer. You can use the following
steps to add a network printer on a Windows 7based computer:
1. Click on Start and then select Devices and Printers.
2. Click on Add a Printer.
3. Then Click on Add a Network, Wireless or Bluetooth Printer.
4. Select the desired printer and then click next.
5. Windows will attempt to automatically locate the driver. If it can't locate it, you'll be
prompted to select it by first selecting the manufacturer and then selecting the printer
model.
6. Select the printer, click on Next, and then click Finish.
Speakers
Speakers receive audio signals as input from the sound card of the computer and produce
them in the form of sound waves as audio output. The following image shows speakers:
Fig.1.2.15: Speakers
80
Field Technician - Computing and Peripherals
Projector
A projector is also known as an image projector. It is an optical device that sets up the
images onto a blank surface, generally on a projection screen. For example, a data projector
simply connects with a laptop or any other computer system and projects/displays the
output or data onto a white board. The following image shows a projector:
Fig.1.2.16: Projector
81
Participant Handbook
A regular MFP may serve as a blend of a few or all of the devices shown in the following
figure:
Fax
Photocopier
Printer
Scanner
Types of MFPs
MFPs are divided into different segments, according to their speed and duty cycle. The
following figure shows various segments/categories of MFPs:
• These type of devices are designed for home or home-
office use.
All-in-one
• The main focus of these devices is to provide print and scan
functionalities for home use.
82
Field Technician - Computing and Peripherals
Exercise
1. What are the types of printers?
a. _____________
b. _____________
c. _____________
d. _____________
_____________________________ _________________________________
(c) (d)
________________________________ __________________________________
83
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Explain the controls of different peripherals
2. Identify safety rules, policies and procedures while operating hardware and peripherals
84
Field Technician - Computing and Peripherals
The following figure represents the general guidelines to be followed while working with
electrical/electronic systems:
Electrical Safety
It is of utmost importance to remove the power while disassembling the computer except
while measuring voltages. Removing the power not only includes turning off the power
switch but also unplugging it from the socket.
Ensure that the power plug should be unplugged to ascertain that there is no power in the
computer. This is required as certain power providers need to provide service to the
motherboard even when the power has been switched off.
The following two important points should be kept in mind while working with power
supplies:
• Refrain from opening it when it is plugged in.
• Even after unplugging, the capacitors continue to hold, in which case, if the capacitor is
touched, it can discharge and give a shock.
85
Participant Handbook
Purpose of Fix the potential of active conductors with respect to the earth
Earthing
86
Field Technician - Computing and Peripherals
Rod-earth contact
Electrode resistance Ground resistance
resistance
Caused due to
Caused due to
Caused due to soil resistivity,
connection of
interface which occurs
grounding
between ground because of the
electrode to
and electrode grounding
grounding wire
electrode
The resistance of ground electrode connection influences the levels of transient voltage
during any event of switching and lightning. The body of earth may be considered as several
concentric shells surrounding the electrode. The shells, near the electrode, are of small
cross-sectional area and relatively of high resistance. For example, some of the screws which
connect motherboard to the computer case also connect the motherboard to the ground
case. The ground case is further connected to the earth by the help of power cables.
Electro Static Discharge (ESD)
ESD is the sudden build-up of static electricity when two differently charged objects are
brought together. While repairing electronic products, ESD is one of the issues that arises, as
it can cause damage to the electronic devices and components.
87
Participant Handbook
Absence of
electrostatic
wrist strap
Unshielded Use of
cables and synthetic
components materials
Causes of
ESD
Improper Movement
grounding of air
Human
negligence
ESD protection is essential for sensitive components during assembly of a device and in the
finished device. It can cause severe damage to components such as microchips. Grounding is
imperative for ESD prevention. An ESD simulator having special output circuit called human
body model (HBM) is generally utilized to test the vulnerability of electronic devices to ESD
from human contact.
88
Field Technician - Computing and Peripherals
The following figure list a few points that should be kept in mind in order to reduce ESD
damage:
Practise self-grounding
• Use an ESD wrist strap: It wraps around the wrist and contains a metal component
touching the skin. A wire leads from the strap to an alligator clip that can be clipped to
the computer case. This results in the user and the case being at the same potential and
prevents static discharge.
• Use antistatic bags: For handling electronic components, use antistatic bags. These bags
prevent static from building up and thus helps in preventing ESD damage to the
components.
• Use ESD mats: These prevent static build-up at work benches. Technicians usually use
computers on antistatic mat.
• Practise self-grounding: Usually self-grounding is used to ensure that the body is at the
same ground potential as the case.
• Do not touch components or pins: If any circuit cards are removed, do not touch the
components or the pins. Hold the outside edges or the plastic handles.
• Control humidity: When humidity is very low, static builds up faster.
• Avoid placing computers on carpets: Static can build up on rugs or carpets easily than on
other surfaces.
89
Participant Handbook
Cleaning solutions
Battery Printer cartridge
such as LCD cleaner
Cleaning solutions such as LCD cleaner, battery, adapter and printer cartridge.
MSDS provides information about the safety factors of handling the products and includes
their characteristics, handling strategy, storage instruction and disposal method.
It is the responsibility of the technician to read the MSDS sheets which are available with the
products. For example, while using a cleaning product to clean the LCD screen of the
monitor, if that product is leaving some patches on the screen, then the MSDS sheet should
be immediately checked. To avoid such kind of situations, it is advisable to read the MSDS
sheets prior to using the product.
90
Field Technician - Computing and Peripherals
Exercise
1. Match the following:
a. Mouse Produce output in the form of various sounds.
b. Touchpad Controls the movement of the cursor.
c. Scanner Reads text that is printed on paper.
d. Printer Used for pointing on a computer display screen.
e. Speakers Produce paper output of the text.
2. What are the steps that can be taken for ESD damage reduction?
__________________________________
___________________________________
___________________________________
___________________________________
____________________________________
91
slarehpireP dna gnitupmoC - naicinhceT dleiF
Participant Handbook
92
Field Technician - Computing and Peripherals
2. Basics of Electronics
Unit 2.1 – Fundamentals of Electronics
Unit 2.2 – Other Electronic Concepts
Unit 2.3 – Inside a Computer
93
Participant Handbook
94
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Define electronics
2. Explain the basics concepts of electronics
3. Identify electronic circuits and their components
4. Explain the fundamentals of electricity
• Analog Circuit
Circuits • Digital Circuit
• Basic Circuitry
• Ohm's Law
• Kirchoff's Law
Electricity
• AC
• DC
• Digital multimeter
• Clamp meter
Measuring • Power supplies
Instrument/ • Voltage source
Equipment • Current source
• Oscilloscopes
• Generators
95
Participant Handbook
96
Field Technician - Computing and Peripherals
Diodes
Rectifiers Transistors
Active
Components
Solenoids ICs
Power
LEDs
Sources
97
Participant Handbook
Fig 2.1.6: An IC
LED
An LED is a p-n junction diode which gives out light when it is activated. It is a two-lead
semiconductor source of light. Energy is released as photons when a suitable voltage is
applied to the leads. The following image shows an LED:
Fig.2.1.7: An LED
Power Source
A power source is a source which provides power to a circuit. Generally, it is a generator or
a battery. The following image shows a battery:
98
Field Technician - Computing and Peripherals
Solenoid
A solenoid is an insulated or enamelled wire coil wrapped around a cylindrical solid core. The
solid core may be of iron, steel or powdered iron. Solenoids can be used as electromagnets
and inductors in electronic circuits. The motherboard contains solenoids to perform
different functions. The following image shows a solenoid:
Passive Components
These components do not require any power source to perform their specific functions.
They are not capable of controlling current.
99
Participant Handbook
Transformer
Fuse Resistor
Passive
Components
Thermistor Capacitor
Inductor
Transformer
A transformer consists of a metal core with coils of wire around it. It is a device used to
convert AC to the required values by decreasing or increasing the alternating voltages in an
electronic or electric system. The following image shows a transformer:
Resistor
A resistor is a component in an electronic circuit which is built to resist or limit the flow of
current in that circuit. It may be a small carbon device or a big wire-wound power resistor.
Its size varies in length from 5mm up to 300mm.
100
Field Technician - Computing and Peripherals
Capacitor
A capacitor is a device which is made up of one or more pairs of conductors and an insulator
separating them. It is used to store electric charge. The following image shows capacitors:
Inductor
An inductor consists of a coil or a wire loop. This component is used to store energy in the
form of a magnetic field. The more the turns in the coil, the more will be the inductance. The
following image shows inductors:
101
Participant Handbook
Fuse
A fuse is a device which is used to protect electrical systems against excessive current. The
following image represents a fuse:
Electronic Circuit
Analog Digital
Analog Circuit
In analog circuits, there is a continuous variation of voltage or current with time. These
circuits are a combination of basic components such as resistors, capacitors, diodes,
inductors and transistors.
102
Field Technician - Computing and Peripherals
Parallel Connection
In a parallel connection, the magnitude of voltage is same through all the connected
components and the current is divided among the various components. The following figure
represents a parallel circuit. 1⁄R = 1⁄R1 + 1⁄R2 + 1⁄R3, where, R shows the resistance in the
circuit and I represent the current:
103
Participant Handbook
Digital Circuit
Digital circuits use a binary scheme for digital signalling. Two different voltages (high or low)
are represented by different logic levels. High voltage, generally 5V, represents one value
and the other value represents low voltage that is generally 0V. The following figure shows a
digital circuit:
NOT Gate/Inverter
The output is 0 when the input is
1 and vice-versa.
104
Field Technician - Computing and Peripherals
105
Participant Handbook
A commonly used
analog integrated
circuit is an
operational amplifier
(op-amp). The basic
building block of these
type of circuits are
integrated circuits
(analog ASICs).
Mixed These type of circuits
Integrated are formed by the
Circuit combination of analog
integrated circuits and
digital integrated
circuits on a single
chip. These circuits
are mainly used as
digital to analog
converts (DAC) and
analog to digital
converters (ADC).
General These type of circuits
type of include:
Integrated
• Logic Circuits
Circuit
• Comparators
• Switching IC
• Timer IC
• Audio Amplifiers
106
Field Technician - Computing and Peripherals
Exercise
1. Categorise the following components as active or passive:
a. Resistor
b. Transistor
c. Capacitor
d. Diode
e. Fuse
f. Transformer
g. Battery
h. Solenoid
107
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Define voltage and power
2. Identify voltage and power requirement for different hardware devices
So, in a computer broadly three types of DC voltages are required, which are +12V, +5V and
+3.3 V.
108
Field Technician - Computing and Peripherals
TIPS
Power ratings and voltages outside the permissible range can cause system failure.
PSU
A PSU draws the AC voltage from the source (generally from the socket) and converts it to
the desired level of DC voltage. It is usually found at the back side of a computer case. The
following figure lists the parts found on the back of a PSU:
There are different types of power supplies available in the market but switched-mode
power supplies are globally used today in personal computers.
There is also a stack of different coloured cables inside a PSU.
109
Participant Handbook
The following figure lists the colour codes of the PSU cables:
TIPS
Power supply and computer can be protected from a surge and voltage drops by simply
adding a UPS (backup) to the computer.
110
Field Technician - Computing and Peripherals
Exercise
1. Write the voltage requirement of the given components:
i. USB ports
ii. CPU fan
iii. Motherboard
iv. Graphic cards
v. CPU
2. Match the following:
v. Yellow e. +5V
111
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Explain the different modules inside a computer system such as SMPS, drivers, hard disk,
battery and mother board
Motherboard
A motherboard is the main PCB of a computer. It contains the CPU, memory, expansion
cards to regulate the audio and video, the attachments for the hard drive and optical drives
and links to ports of the computer such as the USB port. There is a direct or an indirect
connection between the motherboard and every other part of the computer.
112
Field Technician - Computing and Peripherals
CPU
A CPU, also called as the processor, is positioned on the motherboard, inside the computer
case. It is called the brain of the computer. This unit takes data and instructions from the
storage unit and processes it as per the instructions given and the type of data provided. It is
then sent back to the storage unit. Whenever any keyboard key is pressed, or the mouse is
clicked or any application is started, the instructions are send to the CPU.
The CPU chip (processor chip) can be identified by the processor type and the name of the
manufacturer. This information can be found on the chip itself. For example, Intel 386,
Advanced Micro Devices (AMD) 386, Cyrix 486, Pentium MMX, Intel Core 2Duo and iCore7.
RAM
RAM is the short-term memory in a computer that is used to store documents while they are
being processed. It is available as a chip and is an IC soldered on the motherboard.
RAM slots are present on the motherboard and provide slots for inserting RAM chips. These
can be easily removed and replaced.
BIOS
A motherboard also has a provision for initial set up of a computer after the power is turned
on, which is called BIOS or boot firmware. The BIOS consists of a software code that gives a
computer the basic instructions to start. Whenever the computer is turned on, it runs the
program within BIOS to do some basic system checks, locates the operating system on the
disk and starts the computer.
PSU
A PSU converts the input AC to low-voltage regulated DC power for the internal components
of a computer. The most commonly used PSU in modern computers is Switched-mode
Power Supply SMPS.
SMPS
An SMPS is also known as switching-mode power supply, switch-mode power supply,
switched power supply or simply a switcher. It is an electronic power supply which efficiently
converts electrical power, i.e. transfers power from a DC or AC source to DC loads, such as a
personal computer. The conversion process of electrical power becomes more efficient with
high input voltage and synchronous rectification.
113
Participant Handbook
The following figure shows the block diagram of a mains operated AC/DC SMPS with output
voltage regulation:
In the process of output voltage regulation by SMPS, there are certain stages involved which
are:
Input rectifier stage: This is the first stage of voltage regulation known as rectification. In
this stage an AC input is converted into DC. If the input is already in the form DC, then there
is no requirement of this stage.
Inverter stage: The second stage of voltage regulation converts the input DC, which comes
either directly from the source or from the rectification stage, into AC. DC is converted into
AC by passing it through a power oscillator.
114
Field Technician - Computing and Peripherals
Voltage converter and output rectifier: The inverted AC should drive the primary winding of
a transformer, if the output needs to be isolated from the input. This in turn makes the
voltage high or low to reach the desired output level on the secondary winding of the
transformer. The AC output is rectified from the transformer if the desired output is DC.
Regulation: The output voltage is monitored by a feedback circuit and is compared with a
reference voltage. An additional power supply is used because the feedback circuit needs
power to function before it can generate it.
Expansion Cards
The motherboard also contains slots and provision for expansion cards. The circuit boards
which are inserted in the slots are called expansion cards. These cards allow a computer to
connect and communicate with various input and output devices. The various types of
expansion cards are video card, sound card, graphic card, network interface card and
Bluetooth card.
Resistor IC Switch
LED Switch
Fig. 2.3.4: A few electronic components present inside the hardware devices
115
Participant Handbook
Exercise
1. Given below is an electronic circuit. Identify all the basic electronic components
embedded in the circuit.
2. Identify the components in the block diagram of a mains operated AC/DC SMPS with
output voltage regulation.
116
Field Technician - Computing and Peripherals
Practical
1. Perform the steps of connecting the wires of computer peripherals in a CPU cabinet.
Equipment:
• CPU cabinet
• Mouse
• Headphone
• Keyboard
• Monitor
• UPS
• Printer
2. Perform the steps of connecting a UPS with a computer system and check the voltage.
Equipment:
• Computer system
• UPS
• Multimeter
117
Participant Handbook
118
Field Technician - Computing and Peripherals
3. Interacting with
Customers
ELE/N4601
119
Participant Handbook
120
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the customer requirements
2. Educate customer about different aspects of installing and repairing hardware
121
Participant Handbook
The following figure shows list of information about hardware which is to be used by
customer:
Warranty and
Cost estimate of
terms and
installing
conditions of
hardware
devices
122
Field Technician - Computing and Peripherals
Exercise
1. What practices can be used to understand customer requirements?
a. __________________________________
b. __________________________________
c. __________________________________
d. __________________________________
e. __________________________________
123
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Analyse location requirements for hardware devices
2. Ask customers about their issues
3. Inform customers about repair procedure and warranty coverage of devices
4. Educate customer about annual maintenance contract
It should be spacious.
124
Field Technician - Computing and Peripherals
Did you come yesterday? Do, Did, Is, Can, Could, Will, Would,
Shall, Should and so on
Can you finish this task in 2
hours?
Shall I do it now?
• Open ended questions – are mainly questions which do not demand a specific answer
but are probing for details. The following table shows pattern of open ended questions:
Example
What do you think about the
meeting yesterday?
How was your day?
Where have you been all
afternoon?
125
Participant Handbook
126
Field Technician - Computing and Peripherals
This image shows template for annual maintenance contract of hardware and peripherals:
127
Participant Handbook
Exercise
1. What are important requirements to analyse a location for hardware installation?
a. ________________________________________
b. ________________________________________
c. ________________________________________
d. ________________________________________
2. Write some important questions to be asked at the customer to identify the requirement
for the selection of site.
a. ________________________________________
b. ________________________________________
c. ________________________________________
d. ________________________________________
128
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Provide solution to the customer problems
2. Explain customer about the estimated cost of repairing under warranty and time
required to repair the faulty equipment
3. Inform customer whether the module require replacement with reasons
129
Participant Handbook
The following figure shows the step required to inform the customer about modules
replacement:
[
Fig 3.3.2: Steps required to inform the customer about modules replacement
130
Field Technician - Computing and Peripherals
Exercise
1. What are the steps involved in suggesting a solution to the customer?
___________________________________________
_________________________________________
______________________________________
2. Write down the step required to inform the customer about modules replacement:
131
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Explain maintenance schedules
2. Tell customer to retain the copy of invoice and provide the same
Hardware Maintenance
The field technician should assess the condition of hardware components and upgrade if
required. He/she should be aware of the compatibility issue. He also need to maintain the
warranty details of the components. If the warranty period is going to expire, he/she should
communicate that with the customer and ask for any extended warranty he needs.
In this case, there are two ways:
• The customer can ask for extending the warranty period.
• The customer doesn’t want to extend it. If there is any problem, he will buy a new one.
132
Field Technician - Computing and Peripherals
The field technician need to communicate about the above two ways and then tell the
details of further procedure.
The following image shows a sample maintenance requirement form:
The technician should maintain a checklist for scheduling the maintenance. The following
figure shows a maintenance checklist:
133
Participant Handbook
134
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Deliver the service within service level agreement (SLA) time
2. Identify customer’s requirement and put them at ease by providing appropriate
solutions
3. Achieve customer’s satisfaction
4. Maintain no repeat or second escalation from customer
It’s important for the service engineer to read and understand the SLA before visiting a
customer, so that all the queries, support and service can be addressed according to the
135
Participant Handbook
terms specified. This will minimize all the issues related to service expectations of a
customer.
Understand Proper
Providing
Quality and Timely work communication
appropriate
Completion of Work requirements with the
solutions
of customer customer
136
Field Technician - Computing and Peripherals
Escalation Process
There may be cases where the customer’s request is not closed within the agreed SLA time
frame. In such a situation, the technician should escalate the matter to his superior/ back
line support and the escalation manager. The supervisor is responsible for ensuring that all
escalated enquiries are dealt with and resolved promptly. However, the technician should
try to exhaust all the options at his level before escalating any enquiry to the supervisor.
A customer enquiry should reach the supervisor only if there is a need to oversee the issue
from a holistic viewpoint. The manager will evaluate the situation, facilitate the issue
resolution and act as an advocate on behalf of the customer.
Complaints escalation process
The technician should do everything to resolve an issue in the first instance. To facilitate the
fast and efficient resolution of the issues at the first point of contact, a complaint process
needs to be designed and followed.
If an issue is unresolved and needs expert guidance, the helpdesk technician should clearly
explain the escalation options to the customer before proceeding.
•First contact
Step 1
•Further options
Step 4
137
Participant Handbook
138
Field Technician - Computing and Peripherals
Exercise
1. What are the measures to achieve zero defects in work?
______________________
_________________
______________________
139
Participant Handbook
Practical
1. Perform the steps to identify and fill in customer details in the invoice to be generated.
Equipment:
• Working system/Desktop
• Invoice
• Customer details
2. Perform the steps to record details of a faulty printer for escalation of the issues in the
faulty printer as per customer inputs.
Equipment:
• Faulty printer
• Escalation form
• Customer details
140
Field Technician - Computing and Peripherals
4. Installing Hardware
and Software
141 ELE/N4602
Participant Handbook
142
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Explain the installation procedures given in the manuals
2. Identify the specifications for setting up the system
3. Check site conditions and customer requirements
4. Connect the system
5. Follow standard operating procedures
143
Participant Handbook
A user manual generally has five sections. The following figure shows the five segments of a
user manual:
Description
System Operating Error
Introduction of system
capabilities instructions handling
functions
There is a help facilities section also available in the manual which describes a help desk
facility that the user can contact for error resolution. Help desk telephone numbers are also
included.
There are various sections in a typical help book of a particular equipment.
The following figure lists the contents of a user manual:
Cover
page
Contact
Preface
details
Sections of a
User Manual
FAQ Contents
Trouble Guide -
how to
shoot use
144
Field Technician - Computing and Peripherals
• Cover page: Shows the image of the equipment along with the manufacture’s name. The
title page shows the name of the equipment.
• Preface: Gives a brief introduction to the equipment.
• Contents page: Lists down the table of contents, that is, the list of topics along with the
page numbers.
• Guide: Includes all the instructions that enable a user to operate the equipment.
• Troubleshoot section: Includes all the issues and the resolutions for them, which the
users can handle at their end.
• FAQs section: Covers all possible questions related to the product and the answers to
them.
• Contact details section: Provides a call centre or service centre number where the users
can call and register their complaints and seek assistance to their grievances.
• Glossary section: Includes terms which have been mentioned in the manual along with their
definitions. Their page numbers are mentioned alongside.
145
Participant Handbook
The following figure shows the workflow for the role of a field technician:
Maintenance/Re Ask about the service, repair, maintenance and Annual Maintenance
pair: Contract (AMC) of the equipment
Before visiting the customer for installation or repair, it is important to understand the
requirement of the customer. The following figure represents the various activities which
should be done before a visit to the customer’s site is scheduled:
Based on the
Check the new
requests/complaints
requests or complaints For repairs, anticipate
and location of the
registered by the the problem
customer, make a
customer
route plan for the day
146
Field Technician - Computing and Peripherals
147
Participant Handbook
The tools used for handling and unpacking the system are shown in the following figure:
Utility knife Cutter
148
Field Technician - Computing and Peripherals
149
Participant Handbook
In the case of laptop computers, the keyboard is attached to the monitor and other
connection ports are located on the side of the laptop as shown in the following image:
150
Field Technician - Computing and Peripherals
The following figure lists a few standard operating procedures for a field technician:
Ensure that
appropriate
device and
Carry tools and model specific
manuals procedure is
followed as per
the installation
manual
Maintain zero-
material defect
during
installation
ESD
ESD is the sudden build-up of static electricity when two differently charged objects are
brought together. While manufacturing electronic products, ESD is one of the issues that
arises, as it can cause damage to the electronic devices and components.
151
Participant Handbook
Absence of
electrostatic
wrist strap
Unshielded Use of
cables and synthetic
components materials
Causes of ESD
Human
Improper
negligence
grounding
152
Field Technician - Computing and Peripherals
Exercise
1. Match the following:
2. Identify all the connection ports in a laptop as shown in the image given below.
153
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the customer’s peripheral requirements and their placement
2. Connect all the peripherals
3. Install the peripherals
154
Field Technician - Computing and Peripherals
Installing a Printer
A typical printer includes components such as a cord, cable, ribbon and cartridges. Papers
placed in the printer’s tray are a part of the printing stationary and not of the printer.
155
Participant Handbook
Installing a Scanner
The following figure lists the steps to install a scanner:
Click on Start then select Control Panel and type scanners in the Search box.
Click on Finish.
Installing a Modem
Before installing a modem, it should be ensured that it can work with the service provider of
that area. In addition, compatibility of the modem with the current version of the OS should
be checked.
156
Field Technician - Computing and Peripherals
Installing a Webcam
A very small amount of user input is required to install the modern webcams. Most of the
webcams automatically get installed after being plugged in. If they do not get installed
automatically, then the driver file from the manufacturer's website needs to be
downloaded. The following figure lists the steps to install a webcam:
Installing Speakers
There are two types of speakers that can be installed in a system, that is, USB speakers and
headphone jack speakers.
157
Participant Handbook
The following figures list the steps to install both the types of speakers:
158
Field Technician - Computing and Peripherals
159
Participant Handbook
The following figure explains the general safety guidelines that must be followed by a field
technician:
160
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Check the functioning of the system
2. Check the functioning of the installed software such as antivirus
3. Ensure product functions are tested
4. Provide demo to the customer
5. Resolve customer queries
6. Take feedback from the customer
Is it a hardware/software issue?
Fig. 4.3.1: Basic questions to answer to ensure the system’s proper functioning
161
Participant Handbook
Hardware Testing
Hardware failures are responsible for problems, such as the computer not getting
switched on by the user, it getting overheated or appearance of a blue screen. A
computer can function only when all the components work well together. Consider a
scenario, there is a broken hard drive, which implies that it doesn’t work.
Alternatively, it can also mean that it is slow or gives an error message on the screen
informing that one of the hardware components is having an issue.
As compared to software issues, hardware issues are harder to tackle, as a process is
needed to find out exactly which component is not working properly. Hardware
diagnostics is run on most computers. It is used to check the health of the system
and detect faults in normal operations of computers.
Software Testing
When testing the software of a computer, the field technician should ensure that
correct drivers are installed on that system. The technician should know how to use
hardware troubleshooter, how to configure a device and how to download as well as
install and update device drivers.
Using Windows 7 Troubleshooter
To run the Hardware and Devices Troubleshooter in Windows 7:
• Select the Start button and click on Control Panel
• Type ‘troubleshooter’ in the search box and click on Troubleshooting
• Select Configure a device under Hardware and Sound tab
Download and Install a Driver
• Select the Start button, enter "device manager" in the search box, and then click on
Device Manager.
• Find the device that needs to be updated.
• Double-click on the device name.
• Click the Driver tab and select Update Driver.
162
Field Technician - Computing and Peripherals
• Select the Start button, type "Windows Update" in the search box
• Select Windows Update
• In the left pane, click on Check for updates
• Select the updates that needs to be installed. Then select the check box for the driver
that needs to be installed, then select OK.
• On the Windows Update page, select Install updates.
Functional Testing
Functional testing can be done at the end. This implies that the computer should be
used as desired and then checked to see if its performance is up to expectations. For
example, boot up the computer and browse the internet after connecting it to a
network through a wireless fidelity (Wi-Fi). This action will check the working of the
browser, the functionality of the Wi-Fi hardware and the configuration of the
network connection.
The typical steps to run an antivirus are shown in the following figure:
163
Participant Handbook
Open the antivirus user interface by double-clicking the icon on the computer and
select any of the following options:
• Quick scan - This will guide the antivirus to perform a scan on the area on the computer
most susceptible to malware infection.
• Full scan – This performs an in-depth scan of the computer. All the files are scanned. It
can take time to complete as it is a detailed scan.
• Select folder scan – If malicious files are only in a particular folder, select the folder(s)
and perform scan on the specific or multiple folders.
• Boot-time scan – Some viruses are in the system but they do not show up after the
computer is started. Perform a boot-time scan to detect and remove such viruses while
booting.
After the scanning is complete (irrespective of the option), a notification will appear
with the scan result. If threat(s) is detected, click ‘show result’ to view the automatic
action taken by the software. Action on a threat(s) can also be taken manually.
Providing Guidance to the Customer
Demonstrating a product is a way of promoting or showing the operation of an equipment
to the users. The goal of demonstrating the workability of an equipment, such as a newly
installed desktop, peripheral device, software or hardware, to the customer is to make them
aware of the operation of that equipment and answer their queries related to its operation.
There is nothing better than a good demonstration session. It is only after a demonstration
(demo) that the users understand the operation of a particular equipment.
There are a few rules which must be considered while preparing for the demo. The following
figure lists these rules:
Customize
your demo
Test
everything
beforehand
164
Field Technician - Computing and Peripherals
In addition, it is the responsibility of a field technician to make the customers aware of the
user manual and tell them how to read it.
It can be a user manual which contains instructions for the installation of a
software/hardware or it may be a help book giving solutions to common problems
that may arise with an equipment. The following figure lists the steps for reading a
manual:
Step 1: One must be able to determine and read as per the specified
Determine requirement rather than reading the entire document.
information
Step 2: Scan Scan the document to determine its layout style and get a better
the document idea about the manner in which the content is presented.
Step 3: Find Look up for the required information using headings, index or
information the table of contents.
Step 4: Take It is essential to take notes for any important topic that one may
notes come accross while reading the document. Tips and warnings
mentioned in the manual should also be noted.
Step 5: Use A person may come across technical terms while reading the
glossary document. Meanings of such terms can be looked up in the
glossary section at the end of the manual.
Customers can have varied queries and issues. It the core responsibility of the field
technician to respond to them.
Take Feedback from Customer
Just like it is essential to address issues within the facility, it is also important to get feedback
of the customer. The customer is always special and the customer’s feedback is the most
important thing for an organization.
165
Participant Handbook
The time taken to resolve an issue and the difficulties that a customer encountered while
communicating the problem should be understood. The misunderstandings observed during
the interaction should be clearly documented.
The methods of interaction and behavioural aspects also need to be considered in drawing
conclusions after each task or problem handling routine. Getting honest feedback from the
clients helps to improve the organizational functioning.
The field technician can get a feedback form filled by the customer at the facility.
166
Field Technician - Computing and Peripherals
The following figure shows a typical template for a customer feedback form:
□
Very Good
□
Good
□
Poor
2. Did the technician come with all the necessary tools and equipment to do
the job?
□ □
Yes No
□ □
Yes No
□ □
Yes No Fig.
4.3
.7:
5. Any suggestion which you would like to share. A
_______________________________________________________________ sa
_______________________________________________________________ mp
le
_______________________________________________________________ cus
tomer feedback form
167
Participant Handbook
Exercise
1. What rules should be followed to prepare an effective demo?
___________________________
___________________________
___________________________
___________________________
____________
____________
_____________
168
Field Technician - Computing and Peripherals
Practical
1. Perform the steps to install a printer and connect it to a desktop. Test its functioning
after installation.
Equipment:
• Working system/Desktop
• Printer and cartridges
• Paper
2. Perform the steps to install Microsoft Office (MS Office) 2016 on Windows 10.
Equipment:
• Working system/Desktop
• Printer and cartridges
• Paper
3. While testing the laptop you realize that it is not giving audio output. How would you
troubleshoot the problem?
Equipment:
• System with faulty sound card
• Flat/Phillips screwdrivers
• Screws
• Sound card
• Correct drive cables [Integrated Drive Electronics (IDE) or Small Computer System
Interface (SCSI)]
• Audio cable to attach CD-ROM drive to sound card
• Installation disk for the new sound card
4. Perform the steps to set automatic updates of an antivirus.
Equipment:
• Desktop/laptop
• An older version of an installed antivirus
169
Participant Handbook
170
Field Technician - Computing and Peripherals
5. Repairing and
Replacing Faulty
Modules
Unit 5.1 – Understanding Customer Complaints
Unit 5.2 – Identifying System Level Problem on Field
Unit 5.3 – Replacing Faulty Module
Unit 5.4 – Completing Repairs
Unit 5.5 – Reporting to Superior
171
ELE/N4603
Participant Handbook
172
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the concerns of the customers
2. Interact with the customers on phone
3. Commence field trip based on the type of complaint
4. Explain product warranty, terms and conditions
5. Identify the type of problem and carry relevant tools and equipment
6. Assess the issue to decide between replacement and repair
7. Carry approved and verified replaceable parts
New Carry the needed equipment, the manual and the warranty
Installation
Maintenance/ Ask about the service, repair, maintenance and AMC of the
Repair equipment
Before visiting the customer for installation or repair, it is important to understand the
requirement of the customer.
173
Participant Handbook
The following figure represents the various activities which should be done before a visit to
the customer’s site is scheduled:
Based on the
Check new requests or requests/complaints
For repairs, anticipate
complaints registered and location of the
the problem
by the customers customers, make a
route plan for the day
174
Field Technician - Computing and Peripherals
The following figure highlights the to-do list to be followed when on a call with a customer
before visiting the premises:
Communicate the problem identified to the customer and inform about the
possible reasons along with a suggested solution
5.1.3. Troubleshooting
Troubleshooting refers to repair of faulty products or processes. It begins with searching for
the source of a problem and ends with finding the solution for that problem to ensure that
the product or process functions properly. Good troubleshooting consists of the following
four steps:
• Identification of the symptoms
• Elimination of the causes of a problem
• Verification of the solution
• Restoration of the product or process
In other words, the first thing to do is to identify the symptoms that are causing a failure in
the system. The next step is to diagnose the cause of that malfunction, till a solution is
reached. This is followed by returning the product to its original state.
175
Participant Handbook
Proper knowledge and understanding of the behaviour of each of the components that
make up a computer system is necessary.
A field technician should follow some simple steps for troubleshooting as shown in the
following figure:
Action the company will take if the product fails–replace the product or refund the cost
Conditions or limitations of the warranty (some warranties provide coverage only if the
product is maintained or used as directed)
In addition, the field technician should be able to make the customer understand about the
warranty details.
176
Field Technician - Computing and Peripherals
The following image lists some examples of serial number and product id of different
products:
The field technician should be able to find the product identification label for different
products. For a notebook, the identification label may be at different locations, depending
upon the manufacturer, as shown in the following images:
Software serial numbers, also known as product keys, are included with the CD inside its
packaging.
177
Participant Handbook
178
Field Technician - Computing and Peripherals
Exercise
1. Write down the main tasks involved in the role of a field technician.
New ___________________________________________
Installation
___________________________________________
___________________________________________
Maintenance/ ___________________________________________
Repair
___________________________________________
___________________________________________
2. various activities which should be done before a visit to the customer’s site is scheduled:
__________________
__________________
179
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Identify customer problems at their premises
2. Use appropriate tool and equipment
3. Perform root-cause analysis
4. Disassemble and check each part of a computing system
5. Follow standard operating procedures
6. Identify the solution design
180
Field Technician - Computing and Peripherals
Read and understand the service request to know the problem of the
customer.
Resolve the issue by replacing the faulty module. If any external support is
required, contact the appropriate person.
Fill the required documents such as service bill, service report, log book and
so on.
181
Participant Handbook
To analyse and identify the critical applications and hardware at a customer’s site, the field
technician should follow some key points, as shown in the following figure:
Also, the field technician should check the call log database to be aware of similar problems
faced by other customers. This helps in faster resolution of issues and thus saves time and
effort. Therefore, it is imperative that based on the log database, the technician should stock
replacement spares for regularly occurring problems.
For example, a customer reports that the printer is not printing anything on the paper. The
customer has also tried switching the printer on/off and unplugging it. The field technician
has tried to resolve the issue remotely by suggesting to the customer to check the print
queue. But the problem has not resolved. The print queue shows that the file is printing, but
the paper is blank.
In this case, the field technician would typically check the log database and from there the
person would come to know that the primary issue in such cases is that the ink cartridge is
empty and the printer driver is not able to identify this problem. Therefore, when the
technician visits the customer’s site to resolve this issue, it would be ideal to carry new
cartridges for the printer along with the invoice. Since, this is a very common problem and
the possible resolution is to replace the cartridges with new ones, therefore, the field
technician should keep the spare ready and take them along for site visits.
182
Field Technician - Computing and Peripherals
183
Participant Handbook
The overall action plan for handling hardware faults is shown in the following figure:
Timeouts
Audits
Incremental Reboot
184
Field Technician - Computing and Peripherals
Timeouts
Timeout is used by most of the real-time systems that process data which comes in without
any buffering. A timeout signals that some components which are involved in the process
have faulted and a fix is required. There are two possible actions for this process, Retry or
Abort (cancel).
The following figure shows how Retry and Abort work:
The Timeout messages vary from one platform to another. The following images show
typical timeout messages on different platforms:
185
Participant Handbook
Whether a request should be cancelled or retried depends on several factors. The following
figure lists a few of these factors:
How important When system stability is important, the Retry option should be used.
is system
stability
For example, one should not abort a system startup feature on a
single timeout.
How important When system performance is the main concern, starting and stopping
is system of operations frequently may lower it.
performance
So, aborting the feature is the better option on timeout of the feature.
Implementation If the user keeps on retrying without considering the abort option, the
of complexity whole design may go beyond debugging because of the code getting
level complicated.
Most of the times the two options, Retry and Cancel, are used together. If no response is
received after retrying a feature a certain number of times, then it might be aborted.
Audits
An audit is a method of checking the consistency of data structures across multiple
processors in a system.
A field technician should be able to read the audit log files. These files are the output of the
Audit programs that are defined in a system. For example, an Enterprise Resource Planning
(ERP) system has more than one layer and contains multiple processors. Hence, any break in
signals because of hardware failures, software bugs, protocol failures or any independent
processor reboot may lead to data inconsistency.
186
Field Technician - Computing and Peripherals
187
Participant Handbook
Generally, first level reboot resolves the issue. However, sometimes, the processor keeps
first level rebooting of the system due to some hardware fault. This results in overflowing of
the first level reboot counter, which in turn leads to second level reboot.
Typically, second level reboot resolves the issue. In case, even the second level reboot is
unable to resolve the issue, then the processor keeps second level rebooting of the system.
This results in overflowing of the second level reboot counter, which in turn leads to third
level reboot.
Hardware Fault Tolerance Techniques
Hardware fault tolerance provides a real-time system the ability to run even when there is
hardware failure. Critical systems, such as servers, should have this arrangement
incorporated to nullify loss. The techniques used to incorporate hardware fault tolerance are
redundancy, load balancing and memory mirroring.
Redundancy
Real-time systems are installed with redundant hardware so that whenever a fault takes
place, they takeover and thus prevent downtime and loss. Some methods of hardware
redundancy are:
• One for One redundancy – Each hardware module contains a redundant module, the
Passive module. The primary module (Active module) and the secondary module
(Passive, redundant module) are exact replica of each other. The Passive module
monitors the Active one and takes over if there is an Active module failure. The
probability of failing of both the modules at the same time is very low.
• N+X Redundancy – Similar to the One for One Redundancy method, this method uses a
specific number (say, X) of Passive modules for N number of Active modules. Moreover,
there is also a main hardware module which monitors and tracks the Active N modules.
This main module decides which Passive module will take over in case an Active module
fails.
Load Balancing
In ideal conditions, the hardware modules share the load. There is a top-level module, the
main module, which distributes the load evenly and maintains the health status of the
hardware modules simultaneously.
If any hardware module fails, the main module enables the distribution of the load among
the rest of the modules. This setup makes a compromise with the system performance but
ensures availability of system at all times.
Memory Mirroring
In this technique, the system setup contains two parity based memories and two CPUs – one
active and one passive. The passive CPU does not have any memory and the active CPU
keeps writing on both the memories. The passive CPU monitors the active CPU continuously.
If a fault is detected, it takes over. When the memory is read, both the memories are
compared. If there is any mismatch, the processor considers the output of the correct
memory and tags the other one as faulty.
188
Field Technician - Computing and Peripherals
Remove the
motherboard's power
Memory modules are The power supply is
connector, including the
mounted on the attached into the tower
CPU fan power
motherboard. Handle cabinet at the top back
connector, the cabinet
the chip only by the end of the tower. Detach
fan and the front panel
edges it from the switchboard
of the cabinet power
buttons.
189
Participant Handbook
Remove the
Remove any other cable motherboard and the
Remove the display unit
under the keyboard motherboard
peripherals
190
Field Technician - Computing and Peripherals
A Program is Not The Computer is Frozen • Press the Ctrl +Alt and Delete keys
Responding. simultaneously.
• Open the Task Manager and
highlight the program’s name. Then
press the End Task button.
• Manually turn=off the computer by
pressing the on/off button.
• Once the computer responds again,
run a virus check.
191
Participant Handbook
192
Field Technician - Computing and Peripherals
193
Participant Handbook
Blank Screen Improper Connection or • Check if the monitor and the CPU
(Nothing Appears Display Settings power is in On position.
on the Screen) • Check if the monitor is plugged into
the CPU.
• Ensure that the power cable is
plugged into the monitor and is not
loose.
• Some CPUs have multiple ports for
display. Check each port by
plugging in securely.
• When the power button on the
monitor is pressed, some status is
displayed. This means that the
power to the monitor is in On
position and the screen display is
okay.
• Check the cable runing from the
CPU to the monitor.
• Check the brightness level using
the menu button on the monitor. It
may have been set to dark.
• Check that the computer is not in
the screensaver or sleep mode.
194
Field Technician - Computing and Peripherals
The following table lists some common system problems and their solutions:
Devices Not Listed in BIOS • Ensure that the drive is installed properly
• Ensure that the cables are connected properly.
No Operating System(OS) • Ensure that the system is set to boot from the right
Found or Similar Message device.
• Ensure that the proper boot order is listed under the
Boot menu.
• Remove any non-bootable DVD from the drive.
• Ensure that the boot drive is the first option.
• Once boot drive is found, the OS begins to load it.
Non-Working • Ensure that the cables are plugged in.
Devices/Device Not • Ensure that the cables are firmly connected to the
Recognized device.
• Check that the add-on cards are seated in their slots.
• Check the device drivers.
• Try to reinstall the device driver or download the
latest version.
• Try to uninstall and reinstall the device.
195
Participant Handbook
System Turns On, • Check that the video card is inserted properly in
Gives Quick Beeps, its AGP or PCI slot.
Does Not Boot
196
Field Technician - Computing and Peripherals
197
Participant Handbook
Hard Drive Computer does not boot • Check whether the BIOS supports
and no error message drives.
appears on the screen • Turn off the computer and remove
the new drive.
• Shift the jumper onto the
alternate-capacity jumper.
• Remount the drive in the
computer.
• Insert a bootable system diskette
into drive A and turn on the
computer.
• Insert the Disc Wizard diskette into
drive A.
• Type A: XDM and press ENTER.
• Follow the Disk Manager
instructions.
• Install the dynamic drive overlay
and partition and format the new
drive
• Reboot the system.
198
Field Technician - Computing and Peripherals
199
Participant Handbook
200
Field Technician - Computing and Peripherals
201
Participant Handbook
System only boots from • Hard Disk boot program has been
floppy disk. Hard Disk damaged.
can be read and o Create back up of the data and
applications can be used, the applications files.
but booting from the o Reformat the hard drive.
hard disk is impossible o Re-install applications and data
using backup disks.
o Check the cable running form
disk to disk controller on the
board.
o Make sure both ends are
securely plugged in.
o Check the drive type in the
Standard CMOS Setup
New Network Unable to connect to a • Load the driver and ensure that the
Card server protocols are bound.
• Check the Device Properties list.
• Use the diagnostic utilities to test
the NIC adapter.
• Check if additional networking
software needs to be installed.
202
Field Technician - Computing and Peripherals
Exercise
1. Write down the solutions of some common system problemsgiven in the table:
No Operating System(OS) •
Found or Similar Message
Non-Working •
Devices/Device Not
Recognized
Spontaneous Reboots •
203
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
204
Field Technician - Computing and Peripherals
A field technician should do the following when working with a new product:
• Keep in mind the constraints related to the use of the new product to avoid any
hardware or software failure.
• Comply with the codes put in place for the use of any machine or software.
Soldering
Soldering is a process of joining two or more objects that are usually metals by melting and
pouring a filler metal, called solder, into the joint. The solder component has a lower melting
point than the other two metals that are to be joined.
While replacing the faulty parts, soldering of some components may be required. So, a field
technician should have a basic knowledge of how to use manual hand soldering iron unit to
solder the components or parts. The following image shows a typical soldering process:
Soldering Procedure
The steps of the soldering technique are as follows:
205
Participant Handbook
• Step 6: Hold the soldering iron and place the iron tip in such a way that it touches both
the surface and the lead of the component on the board.
• Step 7: Touch the solder to the iron tip and move that around the joint by keeping the
iron tip fixed. Let the solder melt and flow till the joint is covered.
• Step 8: Remove the iron after removing the solder and make sure the joint is kept
stationary till it cools down.
Tips
When the soldering iron gets hot, it becomes dirty because of oxidization. Clean the tip with
a wet sponge until it shines.
In-Service Monitoring
206
Field Technician - Computing and Peripherals
POST
POST is an in-built diagnostic tool that begins to operate as soon as the processor of a
computer starts. It verifies that the various hardware components of a computer such as the
keyboard, RAM and disk drives are functioning properly. If POST is successful, then the
computer begins to boot; otherwise, the BIOS issues an error message.
The error message is in form of a series of beeps. These beeps may have a pattern of long
beeps or short beeps or a combination of the two depending on the nature of the problem.
The pattern of beep conveys information about the type of the fault detected. For example,
if the POST is unable to detect the processor, it will stop the boot process and convey the
message through a particular code of beeps.
OST
POST can only test the internal functioning of the card and not its external interface logic.
There are two types of tests that can be used to test the external card interfaces. These are
shown in the following figure:
Interface Tests
•The card is labelled as out of service. The neighboring cards are then
configured to work in the interface test mode. The card under test is
instructed to run the test. The neighboring cards are then restored by
bringing them out of the test mode.
•The card is configured in echo back mode. The interface receives the data
and echoes it back by transmitting it to the card under test. The card
under test receives back the data that it had transmitted.
207
Participant Handbook
In-Service Monitoring
In this method, the health of the card is verified using any of the following two ways:
Transient error Transient errors are caused by power fluctuations, spikes and
monitoring interference from other cards. They can occur even when the
hardware is functioning normally. In case of frequent errors,
complete hardware diagnostics of the system is needed to isolate the
issue.
Link monitoring This method monitors the bit rate on the links in order to get
advance warning. When a certain threshold is exceeded by the bit
error rate, a diagnostics may be triggered.
208
Field Technician - Computing and Peripherals
209
Participant Handbook
210
Field Technician - Computing and Peripherals
• There are some hardware servers or systems which are under control and support of an
external vendor. Thus, the service engineer may not have any role to play in this
scenario.
In both the scenarios, one may take external support or escalate the issue. However, if it is
not sure under whose preview the issue lies, a senior person should be consulted before
approaching the problem.
Escalate Problems to the Vendor
Software developers write a code to meet the client’s requirement in such a way that only
they can understand the system’s behaviour. Hence, it is difficult to troubleshoot such a
system and it can be time consuming also. It is always recommended to take external
support of the developer to solve such issues.
Escalate Problems to a Senior
If the field technician is not aware of the developer of a particular system, then it becomes
difficult to contact and resolve an issue. In most of the organizations, there is a list of all
software and systems that are being used. This list also contains a point of contact for each
software or system. To refer to this list, a senior person should be consulted.
211
Participant Handbook
Exercise
1. Choose the correct answer for the following questions:
212
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Report percentage of call closure in multiple visits against a benchmark
2. Ensure no sub-standard or unverified parts are used in replacement
3. Complete the function within the agreed Turn Around Time (TAT)
4. Meet the given monthly or daily target
213
Participant Handbook
The following figure shows some points which ensure that the work is always completed
within the expected time period:
Scrutinize the
procedures on site
214
Field Technician - Computing and Peripherals
Exercise
1. Write down few key points for timely completion of work.
____________________________
____________________________
2. Write down the key points for meeting the targets on time.
___________________
_________
___________________
_________
215
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Take work order from the Supervisor
2. Report 100% on time completion
3. Submit the feedback form
4. Report work status accurately
5. Create knowledge bank
Take work order from the supervisor or customer care about the complaint registered
Find solutions to customer complaints and queries that are unresolved in the field or
escalate issues of concern to the supervisor
216
Field Technician - Computing and Peripherals
Work requirement is also a document which has the date, location and the details of a
particular task, which has to be done. It is the record of the task which is to be performed.
The technician should be able to understand the task assigned and its requirement.
• Ensure that work is done is as per the guidelines and standard of the company.
• Plan and organize the allocated work for the day.
• Follow the proposed plan of action.
• Inform the supervisor in case of any deviation or emergency.
• Work to ensure 100% customer satisfaction.
The field technician would get a job sheet or work allocation from the supervisor. The
supervisor would also share a plan of action with the field technician to ensure adherence to
timelines and quality for the work assigned and an explanation if the target is not met. The
following figure highlights the points which help a field technician in understanding the plan
to achieve 100% quality and timely completion of work:
217
Participant Handbook
5.5.4. Documentation
After completing an installation at a site, the technician should complete the documentation
to record the details related to the installation. A knowledge bank should be created on the
complex repairs done through documentation. Along with completing the documentation,
the field technician should tell the customer about some dos and don’ts for using the
computer and its peripherals. The customer should also be told about the important pages
to refer from the product manual, such as the webcam switch and its functionality. The
documents may include the following:
218
Field Technician - Computing and Peripherals
Exercise
1. What is the procedure of taking the customer feedback?
_______________________
_______________________
________________________
219
Participant Handbook
Practical
1. A customer has recently purchased a new hard disk for a computer since the old one had
crashed. Perform a task of installation of the new hard disk on the computer.
Components:
Hardware:
2. You received a customer complaint that a laptop is not giving audio output. How would
you troubleshoot the problem?
Components:
220
Field Technician - Computing and Peripherals
6. You have received a customer complaint that their computer loses its time and date
settings on every restart. You have called the customer and after fixing a time to visit,
you have gone to the customer’s facility to fix the issue. How will you fix this issue?
Component:
221
Participant Handbook
222
Field Technician - Computing and Peripherals
2.
6. Understanding
Organizational
Policies and
Standards Modules
Unit 6.1 – Explain Company’s Policies
Unit 6.2 – Identify Company’s Product/Quality Standards
Unit 6.3 – Describe Company’s Safety Policies and Standards
Unit 6.4 – Interact with Supervisor
Unit 6.5 – Interact with Colleagues
ELE/N4602
223 ELE/N4603
Participant Handbook
224
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the company’s customer care policies
2. Identify the company’s code of conduct policies
3. Describe the organisation culture and typical customer profile
4. Explain the company’s reporting structure
5. Define company’s policy on product’s warranty
6. Identify the company’s line of business and product portfolio and competitors
Easy access
Quick resolution
Timely follow-up
225
Participant Handbook
Be polite to the
customer
Show integrity,
trustworthiness Be on time for the
and good service
inetrpersonal skills
As a field technician, you may need to cater to different set of customers, from different
backgrounds.
226
Field Technician - Computing and Peripherals
Domestic
•Local language
•Region/area-wise code of conduct
•Technical know-how of the product
Industry/Factory
•Scale
•Point of contact
•Layout plan/wiring diagram for the industry/factory
Small Enterprises
•Point of contact
•Layout plan/wiring diagram for the building
Conduct of an Employee
Attendance/Time off
227
Participant Handbook
Reporting Structure
There are set rules and regulations within an organization which an employee needs to
follow. These outline responsibilities of both the employers and the employees.
The following figure explains what working in an organization requires a field technician to
ensure:
Documentation
Right documentation can make a lot of the difference in getting quick resolutions. To
achieve this, certain steps need to be taken as shown in the following figure:
228
Field Technician - Computing and Peripherals
229
Participant Handbook
Exercise
1. Which one among the following is not a step of right documentation?
a. Document every complaint
b. Make documentation an ongoing process
c. Give the crucial documents to everyone
d. Document common problems
2. Which one among the following is not an organization culture?
a. Be well groomed and look professional
b. Be on time for service
c. Always show integrity
d. Talk harshly to customers
230
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the company’s products and recurring problems reported
231
Participant Handbook
In this case a field technician should perform the following steps to troubleshoot the
recurring problems in device as shown in the following figure:
232
Field Technician - Computing and Peripherals
Exercise
1. WIdentify the steps to idenitify the recurring problems in a device?
__________________ __________________
________________ ________________
__________________ __________________
________________ ________________
233
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the safety procedures to follow
2. Identify the quality standards to be followed
3. Explain the ESD
Always wear appropriate clothing and remove metal objects before working.
Always follow Electrical Safety Rules when working with electrical machinery or
equipment.
234
Field Technician - Computing and Peripherals
The following table represents the dos and don’ts of safety measures at a customer’s home:
Dos Don’ts
Place the inverter in a well aerated place Never place the battery in a closed
container
Installation should be done on a flat Never keep batteries close to water or
surface other chemicals
Battery terminals should be tightened Never load the connection with more
than the mentioned capacity
All battery cables should be connected Do not operate device with damaged
in right direction cables
Keep the batteries connected when the Never connect the inverter to an
device is in ‘ON’ state incoming power supply
Test the
product
235
Participant Handbook
236
Field Technician - Computing and Peripherals
Exercise
1. What is among not to do measures at a customer home?
a. Operate device with damaged cables.
b. Battery terminals should be tightened.
c. Place the inverter in a well aerated place.
d. Installation should be done on a flat surface.
2. Which protective gears should be used to handle ESD prone components?
a. Gloves
b. Wire strap
c. Safety clothes
d. All of the above
237
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Understand and assess work requirements
2. Identify the targets and incentives
3. Documentation of work on enterprise resource planning (ERP) software
4. Resolve personnel issues
5. Communicate any potential hazards at a particular location
6. Deliver work of expected quality despite constraints
• With any issues in hardware and software, a field technician needs to come-up with
solutions as soon as possible to eliminate any bottlenecks in terms of productivity. It is
an integral part of maintaining a smoothly running working environment having zero
tolerance for even major delays.
• Coordinating with customers, co-workers, subordinates and superiors is also defined as
one of the major roles of a field technician.
• Having a clear picture about the work requirements determines the smooth functioning
of an organization.
Understand Work Requirements and Targets
The targets and short-term goals set by the organization determine the targets for the
personnel. The field technician needs to understand the goals set by the superiors. The goals
may be set with respect to timespan as listed in the following figure:
Quarterly
Monthly
Weekly
Daily
238
Field Technician - Computing and Peripherals
These goals then further define the targets to be assigned to the team responsible for all
hardware related personnel. The incentive policy should be clear so that the employees can
understand the policy well. It will motivate them to put maximum effort in maintaining
hardware facility of an organization.
Any ambiguity in understanding the work requirements defined by the supervisor results in
time delays and confusions. A field technician needs to avoid such instances at all costs. For
example, failing to understand the priority of jobs or tasks assigned by the supervisor for the
day. Understanding the technical requirement is also equally important. So, while replacing
faulty modules, a field technician should check the warranty on the faulty module while
replacing it and also ensure that no damage to the other hardware is done.
ERP software is used in company to maintain the records of work performed by the field
technician. It is defined as the business management software consist of integrated
applications required to manage the documentation process and control back office related
functions such as human resources and other technologies.
239
Participant Handbook
240
Field Technician - Computing and Peripherals
Consider an example: Pawan finished the task assigned to him. He has done the work on
time and in an efficient manner. He also informed his supervisor regarding a major safety
breach which helped in preventing an accident situation. Pawan was awarded an incentive
for the best work done in that month. Later on, for his alertness and proactive stance he was
also awarded by the MD of the company.
241
Participant Handbook
Build a Develop an
Establish a
communication effective work
compliance plan
strategy schedule
Create a review
Test the product
plan
Understanding all the possible hazards that can happen in a facility are the responsibilities of
a field technician. One possible cause of hazard could be the lack of clear understanding
about the company’s code of conduct or reference handbook which puts constraints on the
use of equipment for purpose that is against the code of conduct. A field technician can
handle the hazard by:
• Communicating any such hazard to the supervisor can prevent unaffordable downtimes
which could hamper critical functioning of the organization.
• Having clear communication with the other staff members and getting in place early
warning systems for potential threats in another dimension.
• Making risk assessment is an integral part of a field technician job description. Potential
hazards should be assessed with precision and supported with practical evidence.
• Adopting a systematic approach is one dimension of communicating potential hazards.
242
Field Technician - Computing and Peripherals
Exercise
1. Tick the actions which can prove to be a threat to the health and safety of a field
technician.
Identification of cause
___________________
___________________
243
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Receive spares from tool room or stores or deposit faulty modules and tools to stores
2. Pass on customer complaints to colleagues
3. Assist colleagues with resolving field problems
4. Resolve conflicts and achieve smooth workflow
Resolve Conflicts
As discussed earlier, individuals are divided by roles and responsibilities in an organization
despite working towards a common goal. Hence possibility of conflicts is nearly unavoidable.
244
Field Technician - Computing and Peripherals
Here are a few tips to reinstate better communication among co-workers in such quandary.
• Clarify role and responsibilities
Going to basics is the best way to resolve a problem. Role of a field technician is to
ensure a glitch-free workflow in an organization. He and his team will participate in
addressing IT issues, whether small or big. Providing a more rounded perspective of job
roles and responsibilities offers inculcation of a positive and resolute approach for
problems among co-workers. Also, this enables people with less job experience take up
things in a more constructive manner.
• Plan strategically
In most organizations, conflicts between co-workers occur due to tight schedules and
deadlines. Employees working on deadlines are required to work on short turnaround
times, resulting in causing frustration and stress. Strategic planning in advance is the
best way to avoid such circumstances. Irrespective of the team size, this can be achieved
by deploying tools like Calendar to communicate deadlines. The following image shows
planning using a calendar:
245
Participant Handbook
The following images show the segmentation of the customer base to collect their
complaints accordingly:
Assist Colleagues
Be it work allocation, manpower distribution or identification of areas of high
responsiveness, healthy communication is the key to improve service quality. Informal
communication is what is usually seen to be dominant in most workplaces. People asking for
help from the person sitting at the adjacent desk to troubleshoot a hardware issue, rather
than consulting a field technician, is one of the most common examples of informal
communication. The communication is spontaneous and successful in achieving the goal,
paving the way to formal inter-personnel communication. Despite having established
communication procedures, the informal communications occur in every organization and
help in resolving problems and conflicts in real time. Hence, the role of a field technician is
to understand potential of this form of communication and further it with the help of
modern-day technologies.
The following image shows colleagues assisting each other:
246
Field Technician - Computing and Peripherals
247
Participant Handbook
Exercise
1. Write down the points to maintain healthy interpersonal skills.
_________________________
Interpersonal Relationship
_________________________
_________________________
_________________________
2. Write down few points for better communication with the colleagues.
_______________________
_______________________
_______________________
_______________________
248
Field Technician - Computing and Peripherals
7. Work effectively at
the workplace
Unit 7.1 Effective Communication and Coordination of work
Unit 7.2 Work Effectively and Maintain discipline at work.
Unit 7.3 Maintain social diversity at work
ELE/N9905
249
1
Participant Handbook
250
Field Technician - Computing and Peripherals
Unit Objectives
By the end of this unit, participants will be able to:
1. Work efffectely at the workplace.
2. Demonstrate practicesrelated to gender and PwD sensitazation.
Accountability
Responsibility
Equality
Transparency
Trust
Fulfilling promises
Loyalty
Fairness
Cooperaton
Dedication
Discipline
Professionalism
251
Participant Handbook
Workplace ethics are essen al for a successful organiza on with a sa sfied and loyal team. High ethical
standards help in ensuring all stakeholders, such as customers, investors, employees, and other
individuals involved in the workplace opera ons, feel the organiza on is safeguarding their interests. By
crea ng and implemen ng ethical guidelines, organiza ons can keep the best interests of their
employees in mind while maintaining a posi ve influence on those they impact through their processes.
As a result, employees maintain the organiza on's best interests by being ethical in their daily work
du es. For example, fairly-treated employees of an organiza on who understand the organiza on's
commitments to environmental sustainability are usually less likely to behave in a manner that causes
harm to the environment. Thus, they help maintain a posi ve public image of the organiza on. It means
that workplace ethics help in maintaining reciprocal rela onships that benefit organiza ons at large and
the individuals associated with and influenced by the organiza onal policies.
There are various benefits of implemen ng workplace ethics. When organiza ons hold themselves
to high ethical standards, leaders, stakeholders, and the general public can experience significant
improvements. Following are some of the key benefits of employing ethics in the workplace:
Employee satsffacon
Legal compliance
252
Field Technician - Computing and Peripherals
Interpersonal Skills
Interpersonal skills, in other terms, are known as people skills, which are used to communicate and
interact with others effec vely. These are so� skills one uses to communicate with others and
understand them. One uses these skills in daily life while interac ng with people
Ac v listening
Teamwork
Responsibility
Dependability
Leadership
Motvaaon
Flexibility
Patence
Empathy
Conflict resooluon
Nego atn
Numerous interpersonal skills involve communica on. Communica on can be verbal, such as
persuasion or tone of voice — or non-verbal, such as listening and body language.
253
Participant Handbook
Interpersonal communica onis the key to working in a team environment and working ccollectely to
achieve shared goals. Following are the interperso
Verbal Communica on
The ability to speak clearly, appropriately and confidently can help one communicate effec vely with
others. It is vital to select the appropriate vocabulary and tone for the target audience.
For example – one should speak formally and professionally in the work environment, while informal
language is acceptable in an in mate environment with close friends and family. Also, one should avoid
using complex or technical language while communica ng with an audience that may not be familiar
with it. Using simple language in a courteous tone helps achieve be�er communica on, irrespec ve of
the audience.
Ac ve Listening
Ac ve listening is defined as the ability to pay complete or undivided a�en on to someone when they
speak and understand what they are saying. It is important for effec ve communica on because
without understanding what the speaker is saying, it becomes difficult to carry forward a conversa on.
One should ensure to use appropriate verbal and non-verbal responses, e.g. eye contact, nodding, or
smiling, to show interest in what the speaker says. Ac ve listening is also about paying a�en on to the
speaker's body language and visual cues. Asking and answering ques ons is one of the best ways to
demonstrate an interest in conversing with the other person.
Ac ve listening is cri cal for communica ng effec vely without ambiguity. It helps one understand the
informa on or instruc ons being shared. It may also encourage co-workers to share their ideas, which
ul mately helps achieve collabora on.
Body Language
One's expression, posture, and gestures are as important as verbal communica on. One should prac ce
open body language to encourage posi vity and trust while communica ng. Open body language
includes - maintaining eye contact, nodding, smiling and being comfortable. On the other hand, one
should avoid closed body language, e.g. crossed arms, shi�ing eyes and restless behaviour.
Empathy
Empathy is the ability to understand the emo ons, ideas and needs of others from their point of view.
Empathy is also known as emo onal intelligence. Empathe c people are good at being aware of others'
emo ons and compassionate when communica ng with them. Being empathe c in the workplace can
be good to boost the morale of employees and improve produc vity. By showing empathy, one can gain
the trust and respect of others.
Conflict Resolu on
One can use interpersonal communica on skills to help resolve disagreements and conflicts in the
workplace. This involves the applica on of nego a on and persuasion skills to resolve arguments
between conflic ng par es. It is also important to evaluate and understand both sides of the argument
by listening closely to everyone involved and finding an amicable solu on acceptable to all.
Good conflict resolu on skills can help one contribute to crea ng a collabora ve and posi ve work
environment. With the ability to resolve conflicts, one can earn the trust and respect of co-workers.nal
communica onskills that vital for success at work:
254
Field Technician - Computing and Peripherals
Teamwork
Employees who communicate and work well in a team o�en have be�er chances of achieving success
and common goals. Being a team player can help one avoid conflicts and improve produc vity. One can
do this by offering to help co-workers when required and asking for their feedback and ideas. When
team members give their opinions or advice, one should posi vely receive and react to the
opinions/advice. One should be op mis c and encouraging when working in groups.
255
Participant Handbook
Ÿ One can a�end appropriate courses on interpersonal skills or sign up for workshops at work to
improve interpersonal skills. One can find many resources online also, such as online videos.
Ÿ For personal mentoring, one can approach a trusted family member, friend, co-worker, or current/
former employer. A person one looks up to with respect and admires is o�en a good choice to be
selected as a mentor. One can even hire a professional career or communica on coach.
Interpersonal communica on skills o�en help one boost their morale, be more produc ve in the
workplace, complete team projects smoothly and build posi ve and strong rela onships with co-
workers.
256
Field Technician - Computing and Peripherals
Notes
257
Participant Handbook
All employees follow the same rules which helps establish uniformity and equality
in the workplace
Managers and supervisors have defined guidelines on what accon to take while
ini atg disciplinary y aon
Maintaining an organized and cohesive workforce requires maintaining discipline in both personal and
professional behaviour. It is important to follow the appropriate measures to keep employees in line
without affecting their morale.
258
Field Technician - Computing and Peripherals
Defining Discipline
The first and crucial step in maintaining workplace discipline is to define what is meant by discipline. It
helps to evaluate common discipline problems and devise guidelines for handling them effectively.
According to demography and local issues, it may also include substance use and related issues.
It is vital for a workplace to have an employee handbook or company policy guide, to serve as a
rulebook for employees to follow. The employee handbook/ company policy guide should be reviewed
and updated periodically according to any issues or areas, or concerns identified concerning workplace
discipline. Such manuals should also cover all the laws and regulations governing workplace behaviour.
Defining and documenting workplace rules aids in their implementation, ensuring little or no
ambiguity. All employees in a workplace should also have easy access to the workplace guidelines so
that they can refer to them to get clarity whenever required. To maintain discipline at work, it is also
critical to ensure uniform application of workplace guidelines to all employees without exception.
259
Participant Handbook
then written warning, temporary suspension or eventual termination of service in case of repeated non-
compliance with the employee code of conduct. Employees should know what the company rules are and
what will happen if they break the rules. However, disciplinary action should be initiated only when
reasonably required to avoid its misuse for employee harassment.
There should also be an effective mechanism for employees to raise their concerns/ grievances and have
them addressed while maintaining privacy, as required, e.g. raising concerns regarding the behaviour of a
co-worker.
The employee code of conduct manual must be duly reviewed and approved by the concerned
stakeholders, such as the Human Resources (HR) department and company executives.
260
Field Technician - Computing and Peripherals
b. Pseudo-conflicts
Pseudo-conflict arises when two people or groups want different things and cannot reach an
agreement. Pseudo-conflicts usually involve trivial disagreements that tend to hide the root of
the issue.
261
Participant Handbook
Ÿ Active Listening - One should patiently listen to what the other person is saying without interrupting
or talking over them. It helps one display empathy and get to the root of the issue. Asking questions
to seek clarification when required helps in clear communication and conveys to the other person
that one is listening to them. Practising active listening is a great way to improve one's
communication skills.
Ÿ Displaying Empathy - Listening attentively and identifying the anxieties/ issues of co-workers is a
great way to show empathy and concern. It is essential to understand their feelings and actions to
encourage honesty and avoid future conflict.
Ÿ Not Holding Grudges - With different types of people and personalities in a workplace, it is common
for co-workers to have conflicts. It is best to accept the difference in opinions and move on. Being
forgiving and letting go of grudges allows one to focus on the positive side of things and perform
better at work.
Work-related interpersonal conflicts can be complicated because different people have different
leadership styles, personality characteristics, job responsibilities and ways in which they interact. One
should learn to look above interpersonal conflicts, resolving them to ensure work goals and
environment are not affected.
With well-defined organizational guidelines in place, no individual can act arbitrarily, irrespective of
their position in the organization. All individuals will know the pros and cons of taking certain actions
and what to expect in case of unacceptable behaviour. Benefits of following organizational guidelines:
262
Field Technician - Computing and Peripherals
Different organizations may have different guidelines on dress code, time schedules, language usage,
etc. For example – certain organizations in a client-dealing business requiring employees to meet
clients personally follow a strict dress code asking their employees to wear formal business attire.
Similarly, organizations operating in specific regions may require their employees to use the dominant
regional language of the particular region to build rapport with customers and serve them better.
Certain organizations, such as banks, often give preference to candidates with knowledge of the
regional language during hiring.
Working hours may also differ from one organization to another, with some requiring employees to
work extra compared to others. One should follow the organizational guidelines concerning all the
aspects of the employment to ensure a cohesive work environment.
263
Participant Handbook
7.2.5 Workflow
Workflow is the order of steps from the beginning to the end of a task or work process. In other words,
it is the way a particular type of work is organised or the order of stages in a particular work process.
Workflows can help simplify and automate repeatable business tasks, helping improve efficiency and
minimise the room for errors. With workflows in place, managers can make quick and smart decisions
while employees can collaborate more productively.
Other than the order that workflows create in a business, these have several other benefits, such as:
Ÿ Identifying Redundancies - Mapping out work processes in a workflow allows one to get a clear, top-
level view of a business. It allows one to identify and remove redundant or unproductive processes.
Workflow gives greater insights into business processes. Utilizing such useful insights, one can
improve work processes and the bottom line of the business. In many businesses, there are many
unnecessary and redundant tasks that take place daily. Once an organization has insight into its
processes while preparing workflow, it can determine which activities are really necessary.
Identifying and eliminating redundant tasks creates value for a business. With redundant tasks and
processes eliminated, an organization can focus on what's important to the business.
However, the need for micromanagement can be minimized by clearly mapping out the workflow.
This way, every individual in a team knows what tasks need to be completed and by when and who
is responsible for completing them. This makes employees more accountable also.
With clearly defined workflow processes, managers don't have to spend much time
micromanaging their employees, who don't have to approach the manager to know what the
further steps are. Following a workflow, employees know what is going on and what needs to be
done. This, in turn, may help increase the job satisfaction of everyone involved while improving the
relationships between management and employees.
Ÿ This highlights why workflow is important. Workplace communication dramatically can increase
with the visibility of processes and accountability. It helps make the daily operations smoother
overall.
264
Field Technician - Computing and Peripherals
Ÿ Better Customer Service - Customers or clients are central to a business. Therefore, it is imperative
to find and improve ways to improve customer experience. Relying on outdated manual systems
may cause customer requests or complaints to be overlooked, with dissatisfied customers taking
their business elsewhere. However, following a well-researched and defined workflow can help
improve the quality of customer service.
By automating workflows and processes, an organization can also reduce the likelihood of human error.
This also helps improve the quality of products or services over time, resulting in a better customer
experience.
It is also important to be vigilant and identify problems at work or with the organizational work
processes. One should deal with the identified within their limits of authority and report out of
authority problems to the manager/ supervisor or the concerned person for a prompt resolution to
minimise the impact on customers/clients and business.
One should access certain data only if authorised to do so. The same is applicable when sharing data
which must be shared only with the people authorised to receive it to use it for a specific purpose as
per their job role and organizational guidelines. For example – one should be extra cautious while
sharing business data with any third parties to ensure they get access only to the limited data they
need as per any agreements with them. It is also critical to monitor how the recipient of the data uses
it, which should strictly be as per the organizational guidelines. It is a best practice to share appropriate
instructions with the recipient of data to ensure they are aware of the purpose with which data is
being shared with them and how they are supposed to use and handle it. Any misuse of data must be
identified and reported promptly to the appropriate person to minimise any damage arising out of data
misuse.
265
Participant Handbook
These days most organizations require their employees and business partners or associated third
parties to sign and accept the relevant agreement on the non-disclosure of business-sensitive
information. In simple terms, business-sensitive information is confidential information. It is
proprietary business information collected or created during the course of conducting business,
including information about the business, e.g. proposed investments, intellectual property, trade
secrets, or plans for a merger and information related to its clients. Business-sensitive information may
sometimes also include information regarding a business's competitors in an industry.
The release of business-sensitive information to competitors or the general public poses a risk to a
business. For example, information regarding plans for a merger could be harmful to a business if a
competitor gets access to it.
For example – any concern related to sexual harassment at the workplace should be escalated to the
concerned spokesperson, such as Human Resources (HR) representative, and if not satisfied with the
action taken, it should be reported to the senior management for their consideration and prompt
action.
266
Field Technician - Computing and Peripherals
Ÿ Deep breathing and relaxation – Deep breathing helps with anxiety, worry, frustration and anger.
One should take deep breaths, slowly count to ten - inhaling and exhaling until one calms down.
One can also take a walk to calm down or listen to relaxing music. Talking to someone and sharing
concerns also helps one calm down.
Ÿ The 10-second rule - This is particularly helpful in controlling anger and frustration. When one feels
their temper rising, they should count to 10 to calm down and recompose. If possible, one should
move away to allow temper to come down.
Ÿ Clarify - It is always good to clarify before reacting, as it may be a simple case of misunderstanding
or miscommunication.
Ÿ Physical activity - Instead of losing temper, one should plan to exercise, such as running or going to
the gym, to let the anger out. Exercise is also a great way to enhance mood and release any physical
tension in the body.
Ÿ Practising restraint - One should avoid replying or making a decision when angry, not allowing anger
or unhappiness to cloud one's judgement. It may be best to pause any communication while one is
angry, e.g. not communicating over email when angry or upset.
Ÿ Knowing one's triggers - It helps when one is able to recognise what upsets or angers them. This
way, one can prepare to remain calm and plan their reaction should a situation occur. One may even
be able to anticipate the other party's reaction.
Ÿ Be respectful - One should treat their colleagues the same way one would like to be treated. If the
other person is rude, one need not reciprocate. It is possible to stay gracious, firm and assertive
without being aggressive. Sometimes, rude people back away when they don't get a reaction from
the person they are arguing with.
Ÿ Apologise for any emotional outburst – Sometimes, one can get overwhelmed by emotions,
reacting with an emotional outburst. In such a case, one should accept responsibility and apologise
immediately to the affected persons without being defensive.
Ÿ Doing away with negative emotions - It is recommended to let go of anger, frustration and
unhappiness at the end of every workday. Harbouring negative emotions affects one emotionally,
affecting their job performance also. Engaging in enjoyable activities after work is a good stress
reliever.
267
Participant Handbook
Notes
268
Field Technician - Computing and Peripherals
Women are an important source of labour in many sectors, yet they have limited access to resources
and benefits. Women should receive the same benefits and access to resources as men. A business can
improve its productivity and quality of work by providing better support and opportunities to women.
Important Terms
Ÿ Gender Sensitivity- Gender sensitivity is the act of being sensitive to the ways people think about
gender.
Ÿ Gender Equality - It means persons of any gender enjoy equal opportunities, responsibilities, and
rights in all areas of life.
Ÿ Gender Discrimination – It means treating an individual unequally or disadvantageously based on
their gender, e.g. paying different wages to men and women for similar or equal job positions.
269
Participant Handbook
Although, understanding and maturity vary from person to person, even between these genders, based
on their knowledge, education, experience, culture, age, and upbringing, as well as how one's brain
functions over a thought or problem.
In order to bridge the gap, one should:
Ÿ Not categorize all men and women in one way.
Ÿ Be aware of the verbal and non-verbal styles of communication of every gender to avoid any
miscommunication and work better.
Ÿ Be aware of partial behaviour and avoid it.
Ÿ Encourage co-workers of different genders to make room by providing space to others.
270
Field Technician - Computing and Peripherals
Important Terms
·Persons with Disabilities (PwD) – Persons with Disabilities means a person suffering from not less
than 40% of any disability as certified by a medical authority.
·Types of Disability:
a. Blindness – Visually impaired
b. Low Vision
c. Leprosy Cured
d. Hearing impairment
e. Locomotor disability
f. Mental retardation
g. Mental illness
PwD Sensitivity
PwD sensitivity promotes empathy, etiquette and equal participation of individuals and organizations
while working with individuals with a disability, e.g. sensory, physical or intellectual.
271
Participant Handbook
As part of appropriate verbal communication with all genders and PwD, one should:
Ÿ Talk to all genders and PwD respectfully, maintaining a normal tone of voice with appropriate
politeness. It is important to ensure one's tone of voice does not have hints of sarcasm, anger, or
unwelcome affection.
Ÿ Avoid being too self-conscious concerning the words to use while also ensuring not to use words that
imply one's superiority over the other.
Ÿ Make no difference between a PwD and their caretaker. Treat PwD like adults and talk to them
directly.
Ÿ Ask a PwD if they need any assistance instead of assuming they need it and offering assistance
spontaneously.
272
Field Technician - Computing and Peripherals
Ÿ Gestures - One should be very careful with their gestures, e.g. waving, pointing, beckoning, or using
one's hands while speaking. One should use appropriate and positive gestures to maintain respect
for the other person while being aware that a gesture may have different meanings in different
cultures.
Ÿ Eye contact - Eye contact is particularly significant in non-verbal communication. The way someone
looks at someone else may communicate many things, such as interest, hostility, affection or
attraction. Eye contact is vital for maintaining the flow of conversation and for understanding the
other person's interest and response. One should maintain appropriate eye contact, ensuring not to
stare or look over the shoulders. To maintain respect, one should sit or stand at the other person's
eye level to make eye contact.
Ÿ Touch - Touch is a very sensitive type of non-verbal communication. Examples are - handshakes,
hugs, pat on the back or head, gripping the arm, etc. A firm handshake indicates interest, while a
weak handshake indicates the opposite. One should be extra cautious not to touch others
inappropriately and avoid touching them inadvertently by maintaining a safe distance.
Rights of PwD
PwD have the right to respect and human dignity. Irrespective of the nature and seriousness of their
disabilities, PwD have the same fundamental rights as others, such as:
Ÿ Disabled persons have the same civil and political rights as other people
Ÿ Disabled persons are entitled to the measures designed to enable them to become as self-
dependent as possible
Ÿ Disabled persons have the right to economic and social security
Ÿ Disabled persons have the right to live with their families or foster parents and participate in all
social and creative activities.
Ÿ Disabled persons are protected against all exploitation and treatment of discriminatory and abusive
nature.
Ÿ One should not make PwD feel uncomfortable by giving too little or too much attention
Ÿ One should use a normal tone while communicating with a PwD and treat them as all others keeping
in mind their limitations and type of disability
Ÿ Any help should be provided only when asked for by a PwD
Ÿ One should help in ensuring the health and well-being of PwD.
273
Participant Handbook
274
Field Technician - Computing and Peripherals
Exercise
1. List down three examples of workplace ethics.
2. List down three examples of interpersonal skills.
3. Identify two reasons for workplace conflicts.
4. Identify two ways of resolving interpersonal conflicts
5. List down two ways of dealing with heightened emotions at work.
6. List down two types of non-verbal communication.
275
Participant Handbook
Notes
276
Field Technician - Computing and Peripherals
ELE/N1002
277
1
Participant Handbook
278
Field Technician - Computing and Peripherals
279
Participant Handbook
Ÿ Chemical: Chemical hazard is the hazard of inhaling various chemicals, liquids and solvents. Skin
irritation, respiratory system irritation, blindness, corrosion, and explosions are all possible health
and physical consequences of these dangers.
Ÿ Mechanical: Mechanical Hazards comprise the injuries that can be caused by the moving parts of
machinery, plant or equipment.
Ÿ Psychological: Psychological hazards are occupational hazards caused by stress, harassment, and
violence.
Ÿ Physical: The threats that can cause physical damage to people is called physical hazard. These
include unsafe conditions that can cause injury, illness and death.
Ÿ Ergonomic: Ergonomic Hazards are the hazards of the workplace caused due to awkward posture,
forceful motion, stationary position, direct pressure, vibration, extreme temperature, noise, work
stress, etc.
Ÿ Substitution: Substitution is the process of replacing something harmful with something less
hazardous. While substituting the hazard may not eliminate all of the risks associated with the
process or activity, it will reduce the overall harm or health impacts.
Ÿ Administrative Controls: To reduce exposure to hazards, administrative controls limit the length of
time spent working on a hazardous task that might be used in combination with other measures of
control.
Ÿ Personal Protective Equipment: Personal protective equipment protects users from health and
safety hazards at work. It includes items like safety helmets, gloves, eye protection, etc.
280
Field Technician - Computing and Peripherals
1. Prohibition Signs: A "prohibition sign" is a safety sign that prohibits behaviour that is likely to
endanger one's health or safety. The colour red is necessary for these health and safety signs. Only
what or who is forbidden should be displayed on a restriction sign.
281
Participant Handbook
2. Mandatory Signs:
Mandatory signs give clear directions that must be followed. The icons are white circles that have been
reversed out of a blue circle. On a white background, the text is black.
3. Warning Signs
Warning signs are the safety informa oncommunicaa osigns. They are shown as a ‘yellow colour
triangle’.
282
Field Technician - Computing and Peripherals
4. Emergency Signs
The loca onor routes to emergency ffacili eare indicated by emergency signs. These signs have a
green backdrop with a white emblem or wri ng.These signs convey basic informaa oand frequently
refer to housekeeping, company procedures, or logis cs.
283
Participant Handbook
284
Field Technician - Computing and Peripherals
Preparing to lift
A load that appears light enough to bear at first will grow increasingly heavier as one carries it further.
The person carrying the weight should be able to see over or around it at all times.
The amount of weight a person can lift, depends on their age, physique, and health
It also depends on whether or not the person is used to lifting and moving hefty objects.
Technique Demonstraton
285
Participant Handbook
286
Field Technician - Computing and Peripherals
287
Participant Handbook
288
Field Technician - Computing and Peripherals
289
Participant Handbook
Notes
290
Field Technician - Computing and Peripherals
291
Participant Handbook
4. Carbon Dioxide (CO2): Class B and electrical fires are extinguished with
carbon dioxide extinguishers, which suffocate the flames by removing
oxygen from the air. They are particularly beneficial for workplaces and
workshops where electrical fires may occur since, unlike conventional
extinguishers, they do not leave any toxins behind and hence minimise
equipment damage.
292
Field Technician - Computing and Peripherals
5. Wet Chemical: Wet chemical extinguishers are designed to put out fires
that are classified as class F. They are successful because they can put out
extremely high-temperature fires, such as those caused by cooking oils
and fats.
293
Participant Handbook
Notes
294
Field Technician - Computing and Peripherals
295
Participant Handbook
296
Field Technician - Computing and Peripherals
Ÿ Vomiting.
Ÿ Numbness, aching or tingling in the arm (usually the left arm, but the right arm may be affected
alone, or along with the left).
Ÿ Shortness of breath
Ÿ Weakness or fatigue, especially in older adults and in women.
297
Participant Handbook
Notes
298
Field Technician - Computing and Peripherals
299
Participant Handbook
3. Composting: Composting is a simple and natural bio-degradation process that converts organic
wastes, such as plant remnants, garden garbage, and kitchen waste, into nutrient-rich food for
plants.
4. Incineration: Incineration is the process of combusting garbage. The waste material is cooked to
extremely high temperatures and turned into materials such as heat, gas, steam, and ash using this
technology.
Pollution Prevention
Pollution prevention entails acting at the source of pollutants to prevent or minimise their production.
It saves natural resources, like water, by using materials and energy more efficiently.
300
Field Technician - Computing and Peripherals
301
Participant Handbook
Exercise
1. Name all five types of fire extinguishers.
2. Explain PPE in brief.
3. List the common workplace hazards.
4. Fill in the blacks:
i. A "_________ sign" is a safety sign that prohibits behaviour that is likely to endanger one's health
or safety.
ii. ____________ entails acting at the source of pollutants to prevent or minimise their production.
iii. __________ is the treatment or care given to someone who has sustained an injury or disease
until more advanced care can be obtained or the person recovers.
iv. The threats caused by biological agents like viruses, bacteria, animals, plants, insects and also
humans, are known as ________________.
v. The workplace has to be administered as per the rules of the ___________________.
302
Field Technician - Computing and Peripherals
Notes
303
Participant Handbook
304
Field Technician - Computing and Peripherals
9. Employability &
Entrepreneurship Skills
305
Participant Handbook
306
Field Technician - Computing and Peripherals
41. Describe how you will sell a product or service on an e-commerce platform
42. Discuss the importance of saving money
43. Discuss the benefits of saving money
44. Discuss the main types of bank accounts
45. Describe the process of opening a bank account
46. Differentiate between fixed and variable costs
47. Describe the main types of investment options
48. Describe the different types of insurance products
49. Describe the different types of taxes
50. Discuss the uses of online banking
51. Discuss the main types of electronic funds transfers
52. Discuss the steps to prepare for an interview
53. Discuss the steps to create an effective Resume
54. Discuss the most frequently asked interview questions
55. Discuss how to answer the most frequently asked interview questions
56. Discuss basic workplace terminology
57. Discuss the concept of entrepreneurship
58. Discuss the importance of entrepreneurship
59. Describe the characteristics of an entrepreneur
60. Describe the different types of enterprises
61. List the qualities of an effective leader
62. Discuss the benefits of effective leadership
63. List the traits of an effective team
64. Discuss the importance of listening effectively
65. Discuss how to listen effectively
66. Discuss the importance of speaking effectively
67. Discuss how to speak effectively
68. Discuss how to solve problems
69. List important problem-solving traits
70. Discuss ways to assess problem solving skills
71. Discuss the importance of negotiation
72. Discuss how to negotiate
73. Discuss how to identify new business opportunities
74. Discuss how to identify business opportunities within your business
75. Explain the meaning of entrepreneur
76. Describe the different types of entrepreneurs
77. List the characteristics of entrepreneurs
78. Recall entrepreneur success stories
79. Discuss the entrepreneurial process
80. Describe the entrepreneurship ecosystem
81. Discuss the purpose of the Make in India campaign
82. Discuss key schemes to promote entrepreneurs
307
Participant Handbook
308
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, participant will be able to:
1. Explain the meaning of health
2. List common health issues
3. Discuss tips to prevent common health issues
4. Explain the meaning of hygiene
5. Discuss the purpose of Swacch Bharat Abhiyan
6. Explain the meaning of habit
7. Discuss ways to set up a safe work environment
8. Discuss critical safety habits to be followed by employees
9. Explain the importance of self-analysis
10. Discuss motivation with the help of Maslow’s Hierarchy of Needs
11. Discuss the meaning of achievement motivation
12. List the characteristics of entrepreneurs with achievement motivation
13. List the different factors that motivate you
14. Discuss the role of attitude in self-analysis
15. Discuss how to maintain a positive attitude
16. List your strengths and weaknesses
17. Discuss the qualities of honest people
18. Describe the importance of honesty in entrepreneurs
19. Discuss the elements of a strong work ethic
20. Discuss how to foster a good work ethic
21. List the characteristics of highly creative people
22. List the characteristics of highly innovative people
23. Discuss the benefits of time management
24. List the traits of effective time managers
25. Describe effective time management technique
26. Discuss the importance of anger management
27. Describe anger management strategies
28. Discuss tips for anger management
29. Discuss the causes of stress
30. Discuss the symptoms of stress
31. Discuss tips for stress management
309
Participant Handbook
310
Field Technician - Computing and Peripherals
How many of these health standards do you follow? Tick the ones that apply to you.
2. Avoid checking email first thing in the morning and right before you
go to bed at night.
3. Don’t skip meals – eat regular meals at correct meal times.
7. Drink a glass of water first thing in the morning and have at least 8
glasses of water through the day.
8. Go to the doctor and dentist for regular check-ups.
9. Exercise for 30 minutes at least 5 days a week.
For instance, think about the kitchen in your home. Good hygiene means ensuring that the
kitchen is always spick and span, the food is put away, dishes are washed, and dustbins are
not overflowing with garbage. Doing all this will reduce the chances of attracting pests like
rats or cockroaches, and prevent the growth of fungus and other bacteria, which could
spread disease.
311
Participant Handbook
How many of these health standards do you follow? Tick the ones that apply to you.
1. Have a bath or shower every day with soap – and wash your hair with
shampoo 2-3 times a week.
8. Stay home when you are sick, so other people don’t catch what you have.
9. Wash dirty clothes with laundry soap before wearing them again.
10. Cover your nose with a tissue/your hand when coughing or sneezing.
See how healthy and hygienic you are, by giving yourself 1 point for every ticked statement!
Then take a look at what your score means.
Your Score
• 0-7/20: You need to work a lot harder to stay fit and fine! Make it a point to practice
good habits daily and see how much better you feel!
• 7-14/20: Not bad, but there is scope for improvement! Try and add a few more good
habits to your daily routine.
• 14-20/20: Great job! Keep up the good work! Your body and mind thank you!
The ‘Swachh Bharat Abhiyan’ (Clean India Mission) launched by Prime Minister Shri
Narendra Modi on 2nd October 2014, believes in doing exactly this. The aim of this mission
is to clean the streets and roads of India and raise the overall level of cleanliness. Currently
this mission covers 4,041 cities and towns across the country. Millions of our people have
taken the pledge for a clean India. You should take the pledge too, and do everything possible
to keep our country clean!
312
Field Technician - Computing and Peripherals
Some good habits that you should make part of your daily routine are:
• Always having a positive attitude
• Making exercise a part of your daily routine
• Reading motivational and inspirational stories
• Smiling! Make it a habit to smile as often as possible
• Making time for family and friends
• Going to bed early and waking up early
Tips
• Following healthy and hygienic practices every day will make you feel good mentally and
physically.
• Hygiene is two-thirds of health – so good hygiene will help you stay strong and healthy!
313
Participant Handbook
Tips
• Be aware of what emergency number to call at the time of a workplace emergency
• Practice evacuation drills regularly to avoid chaotic evacuations
314
Field Technician - Computing and Peripherals
These needs are usually shown as a pyramid with five levels and are known as Maslow’s
Hierarchy of Needs.
The lowest level depicts the most basic needs. According to Maslow, our behaviour is driven
by our basic needs, until those needs are fulfilled. Once they are fulfilled, we move to the
next level and are motived by the next level of needs. Let’s understand this better with an
example.
Rupa comes from a very poor family. She never has enough food, water, warmth or rest.
According to Maslow, until Rupa is sure that she will get these basic needs, she will not even
think about the next level of needs – her safety needs. But, once Rupa is confident that her
basic needs will be met, she will move to the next level, and her behaviour will then be
motivated by her need for security and safety. Once these new needs are met, Rupa will
once again move to the next level, and be motivated by her need for relationships and
friends. Once this need is satisfied, Rupa will then focus on the fourth level of needs – her
esteem needs, after which she will move up to the fifth and last level of needs – the desire
to achieve her full potential.
315
Participant Handbook
What are the things that really motivate you? List down five things that really motivate you.
Remember to answer honestly!
I am motivated by:
316
Field Technician - Computing and Peripherals
When you start a business, you are sure to encounter a wide variety of emotions, from
difficult times and failures to good times and successes. Your attitude is what will see you
through the tough times and guide you towards success. Attitude is also infectious. It affects
everyone around you, from your customers to your employees to your investors. A positive
attitude helps build confidence in the workplace while a negative attitude is likely to result in
the demotivation of your people.
Strengths Weaknesses
317
Participant Handbook
Tips
• Achievement motivation can be learned.
• Don’t be afraid to make mistakes.
• Train yourself to finish what you start.
• Dream big.
Honesty is an extremely important trait because it results in peace of mind and builds
relationships that are based on trust. Being dishonest, on the other hand, results in anxiety
and leads to relationships full of distrust and conflict.
They are trusted by their peers. They are seen as people who can be counted on for
truthful and objective feedback and advice.
• Honesty and employees: When entrepreneurs build honest relationships with their
employees, it leads to more transparency in the workplace, which results in higher work
performance and better results.
• Honesty and investors: For entrepreneurs, being honest with investors means not only
sharing strengths but also candidly disclosing current and potential weaknesses,
problem areas and solution strategies. Keep in mind that investors have a lot of
experience with startups and are aware that all new companies have problems. Claiming
that everything is perfectly fine and running smoothly is a red flag for most investors.
318
Field Technician - Computing and Peripherals
• Honesty with oneself: The consequences of being dishonest with oneself can lead to
dire results, especially in the case of entrepreneurs. For entrepreneurs to succeed, it is
critical that they remain realistic about their situation at all times, and accurately judge
every aspect of their enterprise for what it truly is.
Let’s look at how being honest would lead to great benefits for entrepreneurs.
• Honesty and customers: When entrepreneurs are honest with their customers it leads
to stronger relationships, which in turn results in business growth and a stronger
customer network.
319
Participant Handbook
• Accountability: This means taking responsibility for your actions and the consequences
of your actions, and not making excuses for your mistakes.
• Humility: This means acknowledging everyone’s efforts and had work, and sharing the
credit for accomplishments.
Tips
• Don’t get angry when someone tells you the truth and you don’t like what you hear.
• Always be willing to accept responsibility for your mistakes.
Creativity means thinking outside the box. It means viewing things in new ways or from
different perspectives, and then converting these ideas into reality. Creativity involves two
parts: thinking and producing. Simply having an idea makes you imaginative, not creative.
However, having an idea and acting on it makes you creative.
320
Field Technician - Computing and Peripherals
What is Innovation?
There are many different definitions of innovation. In simple terms, innovation means
turning an idea into a solution that adds value. It can also mean adding value by
implementing a new product, service or process, or significantly improving on an existing
product, service or process.
Tips
• Take regular breaks from your creative work to recharge yourself and gain fresh
perspective.
• Build prototypes frequently, test them out, get feedback, and make the required
changes.
Effective time management leads to an efficient work output, even when you are faced with
tight deadlines and high pressure situations. On the other hand, not managing your time
effectively results in inefficient output and increases stress and anxiety.
321
Participant Handbook
322
Field Technician - Computing and Peripherals
Tips
• Always complete the most important tasks first.
• Get at least 7 – 8 hours of sleep every day.
• Start your day early.
• Don’t waste too much time on small, unimportant details.
• Set a time limit for every task that you will undertake.
• Give yourself some time to unwind between tasks.
Anger is a perfectly normal human emotion. In fact, when managed the right way, anger can
be considered a healthy emotion. However, if it is not kept in check, anger can make us act
inappropriately and can lead to us saying or doing things that we will likely later regret.
323
Participant Handbook
Strategy 1: Relaxation
Something as simple as breathing deeply and looking at relaxing images works wonders in
calming down angry feelings. Try this simple breathing exercise:
1. Take a deep breath from your diaphragm (don’t breathe from your chest)
2. Visualize your breath coming up from your stomach
3. Keep repeating a calming word like ‘relax’ or ‘take it easy’ (remember to keep breathing
deeply while repeating the word)
4. Picture a relaxing moment (this can be from your memory or your imagination)
Follow this relaxation technique daily, especially when you realize that you’re starting to feel
angry.
Cognitive restructuring means changing the manner in which you think. Anger can make you
curse, swear, exaggerate and act very dramatically. When this happens, force yourself to
replace your angry thoughts with more logical ones. For instance, instead of thinking
‘Everything is ruined’ change your mindset and tell yourself ‘It’s not the end of the world and
getting angry won’t solve this’.
Getting angry about a problem that you cannot control is a perfectly natural response.
Sometimes, try as you may, there may not be a solution to the difficulty you are faced with.
In such cases, stop focusing on solving the problem, and instead focus on handling and
facing the problem. Remind yourself that you will do your best to deal with the situation, but
that you will not blame yourself if you don’t get the solution you desire.
324
Field Technician - Computing and Peripherals
When you’re angry, it is very easy to jump to inaccurate conclusions. In this case, you need
to force yourself to stop reacting, and think carefully about what you want to say, before
saying it. Avoid saying the first thing that enters your head. Force yourself to listen carefully
to what the other person is saying. Then think about the conversation before responding.
If you find that your environment is the cause of your anger, try and give yourself a break
from your surroundings. Make an active decision to schedule some personal time for
yourself, especially on days that are very hectic and stressful. Having even a brief amount of
quiet or alone time is sure to help calm you down.
Causes of Stress
Stress can be caused by internal and external factors.
Internal causes of stress
• Constant worry
• Rigid thinking
• Unrealistic expectations
• Pessimism
• Negative self-talk
• All in or all out attitude
325
Participant Handbook
326
Field Technician - Computing and Peripherals
327
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Identify the basic parts of a computer
2. Identify the basic parts of a keyboard
3. Recall basic computer terminology
4. Recall the functions of basic computer keys
5. Discuss the main applications of MS Office
6. Discuss the benefits of Microsoft Outlook
7. Discuss the different types of e-commerce
8. List the benefits of e-commerce for retailers and customers
9. Discuss how the Digital India campaign will help boost e-commerce in India
10. Describe how you will sell a product or service on an e-commerce platform
328
Field Technician - Computing and Peripherals
4. Desktop: The first screen displayed after the operating system loads.
5. Background: The image that fills the background of the desktop.
6. Mouse: A hand-held device used to point to items on the monitor.
7. Speakers: Devices that enable you to hear sound from the computer.
8. Printer: A device that converts output from a computer into printed paper documents.
9. Icon: A small picture or image that visually represents something on your computer.
10. Cursor: An arrow which indicates where you are positioned on the screen.
11. Program Menu: A list of programs on your computer that can be accessed from the Start
menu.
12. Taskbar: The horizontal bar at the bottom of the computer screen that lists applications
that are currently in use.
13. Recycle Bin: A temporary storage for deleted files.
Tips
• When visiting a .com address, there no need to type http://or even www. Just type the
name of the website and then press Ctrl + Enter. (Example: Type ‘apple’ and press Ctrl +
Enter to go to www.apple.com)
• Press the Ctrl key and press the + or - to increase and decrease the size of text.
• Press F5 or Ctrl + R to refresh or reload a web page.
329
Participant Handbook
Some of the most popular and universally used MS Office applications are:
• Microsoft Word: Allows users to type text and add images to a document.
• Microsoft Excel: Allows users to enter data into a spreadsheet and create calculations
and graphs.
• Microsoft PowerPoint: Allows users to add text, pictures and media and create
slideshows and presentations.
• Microsoft Outlook: Allows users to send and receive email.
• Microsoft OneNote: Allows users to make drawings and notes with the feel of a pen on
paper.
• Microsoft Access: Allows users to store data over many tables.
Tips
• Press Ctrl+R as a shortcut method to reply to email.
• Set your desktop notifications only for very important emails.
• Flag messages quickly by selecting messages and hitting the Insert key.
• Save frequently sent emails as a template to reuse again and again.
• Conveniently save important emails as files.
330
Field Technician - Computing and Peripherals
9.2.3 E-Commerce
What is E-Commerce?
E-commerce is the buying or selling of goods and services, or the transmitting of money or
data, electronically on the internet. E-Commerce is the short form for “electronic
commerce.”
Examples of E-Commerce
Some examples of e-commerce are:
• Online shopping
• Online auctions
• Online ticketing
• Electronic payments
• Internet banking
Types of E-Commerce
E-commerce can be classified based on the types of participants in the transaction. The main
types of e-commerce are:
• Business to Business (B2B): Both the transacting parties are businesses.
• Business to Consumer (B2C): Businesses sell electronically to end-consumers.
• Consumer to Consumer (C2C): Consumers come together to buy, sell or trade items to
other consumers.
• Consumer-to-Business (C2B): Consumers make products or services available for
purchase to companies looking for exactly those services or products.
• Business-to-Administration (B2A): Online transactions conducted between companies
and public administration.
• Consumer-to-Administration (C2A): Online transactions conducted between individual
and public administration.
331
Participant Handbook
Currently, the majority of online transactions come from tier 2 and tier 3 cities. Once the
Digital India campaign is in place, the government will deliver services through mobile
connectivity, which will help deliver internet to remote corners of the country. This will help
the e-commerce market to enter India’s tier 4 towns and rural areas.
E-Commerce Activity
Choose a product or service that you want to sell online. Write a brief note explaining how
you will use existing e-commerce platforms, or create a new e-commerce platform, to sell
your product or service.
Tips
• Before launching your e-commerce platform, test everything.
• Pay close and personal attention to your social media.
332
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Discuss the importance of saving money
2. Discuss the benefits of saving money
3. Discuss the main types of bank accounts
4. Describe the process of opening a bank account
5. Differentiate between fixed and variable costs
6. Describe the main types of investment options
7. Describe the different types of insurance products
8. Describe the different types of taxes
9. Discuss the uses of online banking
10. Discuss the main types of electronic funds transfers
Benefits of Saving
Inculcating the habit of saving leads to a vast number of benefits. Saving helps you:
• Become financially independent: When you have enough money saved up to feel
secure you can start making your choices, from taking a vacation whenever you want, to
switching careers or starting your own business.
• Invest in yourself through education: Through saving, you can earn enough to pay up
for courses that will add to your professional experience and ultimately result in higher
paying jobs.
• Get out of debt: Once you have saved enough as a reserve fund, you can use your
savings to pay off debts like loans or bills that have accumulated over time.
• Be prepared for surprise expenses: Having money saved enables you to pay for
unforeseen expenses like sudden car or house repairs, without feeling financially
stressed.
• Pay for emergencies: Saving helps you deal with emergencies like sudden health issues
or emergency trips without feeling financially burdened.
333
Participant Handbook
• Afford large purchases and achieve major goals: Saving diligently makes it possible to
place down payments towards major purchases and goals, like buying a home or a car.
• Retire: The money you have saved over the years will keep you comfortable when you
no longer have the income you would get from your job.
Tips
• Break your spending habit. Try not spending on one expensive item per week, and put
the money that you would have spent into your savings.
• Decide that you will not buy anything on certain days or weeks and stick to your word.
Current Accounts
Current accounts offer the most liquid deposits and thus, are best suited for businessmen
and companies. As these accounts are not meant for investments and savings, there is no
imposed limit on the number or amount of transactions that can be made on any given day.
Current account holders are not paid any interest on the amounts held in their accounts.
They are charged for certain services offered on such accounts.
Saving Accounts
Savings accounts are meant to promote savings, and are therefore the number one choice
for salaried individuals, pensioners and students. While there is no restriction on the number
and amount of deposits made, there are usually restrictions on the number and amount of
withdrawals. Savings account holders are paid interest on their savings.
334
Field Technician - Computing and Peripherals
335
Participant Handbook
Tips
• Select the right type of account.
• Fill in complete nomination details.
• Ask about fees.
• Understand the rules.
• Check for online banking – it’s convenient!
• Keep an eye on your bank balance.
Fixed costs and variable costs together make up a company’s total cost. These are the two
types of costs that companies have to bear when producing goods and services. A fixed cost
does not change with the volume of goods or services a company produces. It always
remains the same.
A variable cost, on the other hand, increases and decreases depending on the volume of
goods and services produced. In other words, it varies with the amount produced.
Let’s take a look at some of the main differences between fixed and variable costs:
336
Field Technician - Computing and Peripherals
Tips
• When trying to determine whether a cost is fixed or variable, simply ask the following
question: Will the particular cost change if the company stopped its production
activities? If the answer is no, then it is a fixed cost. If the answer is yes, then it is
probably a variable cost.
Insurance
There are two types of insurance, Life Insurance and General Insurance.
337
Participant Handbook
• Endowment Policy: This offers the dual benefit of insurance and investment. Part of the
premium is allocated towards the sum assured, while the remaining premium gets
invested in equity and debt. It pays a lump sum amount after the specified duration or
on the death of the policyholder, whichever is earlier.
• Unit-Linked Insurance Plan (ULIP): Here part of the premium is spent on the life cover,
while the remaining amount is invested in equity and debt. It helps develop a regular
saving habit.
• Money Back Life Insurance: While the policyholder is alive, periodic payments of the
partial survival benefits are made during the policy tenure. On the death of the insured,
the insurance company pays the full sum assured along with survival benefits.
• Whole Life Insurance: It offers the dual benefit of insurance and investment. It offers
insurance cover for the whole life of the person or up to 100 years whichever is earlier.
General Insurance
General Insurance deals with all insurance covering assets like animals, agricultural crops,
goods, factories, cars and so on.
Taxes
There are two types of taxes:
1. Direct Taxes
2. Indirect Taxes.
Direct Tax
Direct taxes are levied directly on an entity or a person and are non-transferrable. Some
examples of Direct Taxes are:
• Income Tax: This tax is levied on your earning in a financial year. It is applicable to both,
individuals and companies.
• Capital Gains Tax: This tax is payable whenever you receive a sizable amount of money.
It is usually of two types – short term capital gains from investments held for less than
36 months and long term capital gains from investments held for longer than 36 months.
338
Field Technician - Computing and Peripherals
• Securities Transaction Tax: This tax is added to the price of a share. It is levied every
time you buy or sell shares.
• Perquisite Tax: This tax is levied is on perks that have been acquired by a company or
used by an employee.
• Corporate Tax: Corporate tax is paid by companies from the revenue they earn.
Indirect Tax
Indirect taxes are levied on goods or services. Some examples of Indirect Taxes are:
• Sales Tax: Sales Tax is levied on the sale of a product.
• Service Tax: Service Tax is added to services provided in India.
• Value Added Tax: Value Added Tax is levied at the discretion of the state government.
The tax is levied on goods sold in the state. The tax amount is decided by the state.
• Customs Duty & Octroi: Customs Duty is a charge that is applied on purchases that are
imported from another country. Octroi is levied on goods that cross state borders within
India.
• Excise Duty: Excise Duty is levied on all goods manufactured or produced in India
Tips
• Think about how quickly you need your money back and pick an investment option
accordingly.
• Ensure that you are buying the right type of insurance policy for yourself.
• Remember, not paying taxes can result in penalties ranging from fines to imprisonment.
339
Participant Handbook
Transferring funds via an electronic gateway is extremely convenient. With the help of
online banking, you can choose transferring funds:
• Into your accounts of the same bank.
• Into other people’s accounts of the same bank.
• Into accounts in different banks through NEFT.
• Into other bank accounts though RTGS.
• Into various accounts through IMPS.
NEFT
NEFT stands for National Electronic Funds Transfer. This money transfer system allows you
to electronically transfer funds from your respective bank accounts to any other account,
either in the same bank or belonging to any other bank. NEFT can be used by individuals,
firms and corporate organizations to transfer funds between accounts.
Before you can transfer funds through NEFT, you will need to register the beneficiary who
will be receiving the funds. In order to complete this registration, you will require the
following information:
• Recipient’s name
• Recipient’s account number
• Recipient’s bank’s name
• Recipient’s bank’s IFSC code
RTGS
RTGS stands for Real Time Gross Settlement. This is a real time funds transfer system
which enables you to transfer funds from one bank to another, in real time or on a gross
basis. The transferred amount is immediately deducted from the account of one bank, and
instantly credited to the other bank’s account. The RTGS payment gateway is maintained by
the Reserve Bank of India. The transactions between banks are made electronically.
RTGS can be used by individuals, companies and firms to transfer large sums of money.
Before remitting funds through RTGS, you will need to add the beneficiary and his bank
account details via your online banking account.
340
Field Technician - Computing and Peripherals
In order to complete this registration, you will require the following information:
• Name of the beneficiary
• Beneficiary’s account number
• Beneficiary’s bank address
• Bank’s IFSC code
IMPS
IMPS stands for Immediate Payment Service. This is a real-time, inter-bank, electronic funds
transfer system used to transfer money instantly within banks across India. IMPS enables
users to make instant electronic transfer payments using mobile phones through both,
Mobile Banking and SMS. It can also be used through ATMs and online banking. IMPS is
available 24 hours a day and 7 days a week. The system features a secure transfer gateway
and immediately confirms orders that have been fulfilled.
Once you have both these, you can login or make a request through SMS to transfer a
particular amount to a beneficiary.
In order to initiate a money transfer through IMPS, you will need to enter the following
information:
• The beneficiary’s mobile number
• The beneficiary’s MMID
• The transfer amount
• Your MPIN
As soon as money has been deducted from your account and credited into the beneficiary’s
account, you will be sent a confirmation SMS with a transaction reference number, for
future reference.
341
Participant Handbook
Tips
• Never click on any links in any e-mail message to access your online banking website.
• You will never be asked for your credit or debit card details while using online banking.
• Change your online banking password regularly.
342
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Discuss the steps to prepare for an interview
2. Discuss the steps to create an effective Resume
3. Discuss the most frequently asked interview questions
4. Discuss how to answer the most frequently asked interview questions
5. Discuss basic workplace terminology
343
Participant Handbook
3. Go through the most typical interview questions asked, and prepare your responses.
• Remember, in most interviews a mix of resume-based, behavioural and case study
questions are asked.
• Think about the kind of answers you would like to provide to typical questions asked
in these three areas.
• Practice these answers until you can express them confidently and clearly.
4. Plan your attire for the interview.
• It is always safest to opt for formal business attire, unless expressly informed to
dress in business casual (in which case you should use your best judgement).
• Ensure that your clothes are clean and well-ironed. Pick neutral colours – nothing
too bright or flashy.
• The shoes you wear should match your clothes, and should be clean and suitable for
an interview.
• Remember, your aim is to leave everyone you meet with the impression that you are
a professional and highly efficient person.
5. Ensure that you have packed everything that you may require during the interview.
• Carry a few copies of your resume. Use a good quality paper for your resume print
outs.
• Always take along a notepad and a pen.
• Take along any information you may need to refer to, in order to fill out an
application form.
• Carry a few samples of your work, if relevant.
6. Remember the importance of non-verbal communication.
• Practice projecting confidence. Remind yourself to smile and make eye contact.
Practice giving a firm handshake.
• Keep in mind the importance of posture. Practice sitting up straight. Train yourself
to stop nervous gestures like fidgeting and foot-tapping.
• Practice keeping your reactions in check. Remember, your facial expressions provide
a good insight into your true feelings. Practice projecting a positive image.
7. Make a list of questions to end the interview with.
• Most interviews will end with the interviewer(s) asking if you have any questions.
This is your chance to show that you have done your research and are interested in
learning more about the company.
• If the interviewer does not ask you this question, you can inform him/her that you
have some queries that you would like to discuss. This is the time for you to refer to
the notes you made while studying the company.
• Some good questions to ask at this point are:
o What do you consider the most important criteria for success in this job?
o How will my performance be evaluated?
o What are the opportunities for advancement?
o What are the next steps in the hiring process?
• Remember, never ask for information that is easily available on the company
website.
344
Field Technician - Computing and Peripherals
Tips
• Ask insightful and probing questions.
• When communicating, use effective forms of body language like smiling, making eye
contact, and actively listening and nodding. Don’t slouch, play with nearby items, fidget,
chew gum, or mumble.
The Address section occupies the top of your resume. It includes information like your name,
address, phone number and e-mail address. Insert a bold line under the section to separate
it from rest of your resume.
Example:
This part of your resume should list your overall experiences, achievements, awards,
certifications and strengths. You can make your summary as short as 2-3 bullet points or as
long as 8-10 bullet points.
Example:
When listing your academic records, first list your highest degree. Then add the second
highest qualification under the highest one and so on. To provide a clear and accurate
picture of your educational background, it is critical that include information on your
position, rank, percentage or CPI for every degree or certification that you have listed.
345
Participant Handbook
If you have done any certifications and trainings, you can add a Trainings & Certifications
section under your Educational Qualifications section.
Example:
When listing your technical skills, start with the skills that you are most confident about.
Then add the skills that you do not have as good a command over. It is perfectly acceptable
to include just one skill, if you feel that particular skill adds tremendous value to your
résumé. If you do not have any technical skills, you can omit this step.
Example:
List down all the important projects that you have worked on. Include the following
information in this section:
Example:
This is where you list all your major strengths. This section should be in the form of a
bulleted list.
346
Field Technician - Computing and Peripherals
Example:
It is very important to show that you have diverse interests and that your life consists of
more than academics. Including your extracurricular activities can give you an added edge
over other candidates who have similar academic scores and project experiences. This
section should be in the form of a bulleted list.
Example:
Example:
Tips
• Keep your resume file name short, simple and informational.
• Make sure the resume is neat and free from typing errors.
• Always create your resume on plain white paper.
347
Participant Handbook
348
Field Technician - Computing and Peripherals
Tips
• Be honest and confident while answering.
• Use examples of your past experiences wherever possible to make your answers more
impactful.
349
Participant Handbook
350
Field Technician - Computing and Peripherals
351
Participant Handbook
• Self-Employed: A person who has his or her own business and does not work in the
capacity of an employee.
• Time Sheet: A form that is submitted to an employer, by an employee, that contains the
number of hours worked every day by the employee.
352
Field Technician - Computing and Peripherals
Unit Objectives
At the end of this unit, you will be able to:
1. Discuss the concept of entrepreneurship
2. Discuss the importance of entrepreneurship
3. Describe the characteristics of an entrepreneur
4. Describe the different types of enterprises
5. List the qualities of an effective leader
6. Discuss the benefits of effective leadership
7. List the traits of an effective team
8. Discuss the importance of listening effectively
9. Discuss how to listen effectively
10. Discuss the importance of speaking effectively
11. Discuss how to speak effectively
12. Discuss how to solve problems
13. List important problem solving traits
14. Discuss ways to assess problem solving skills
15. Discuss the importance of negotiation
16. Discuss how to negotiate
17. Discuss how to identify new business opportunities
18. Discuss how to identify business opportunities within your business
19. Understand the meaning of entrepreneur
20. Describe the different types of entrepreneurs
21. List the characteristics of entrepreneurs
22. Recall entrepreneur success stories
23. Discuss the entrepreneurial process
24. Describe the entrepreneurship ecosystem
25. Discuss the government’s role in the entrepreneurship ecosystem
26. Discuss the current entrepreneurship ecosystem in India
27. Understand the purpose of the Make in India campaign
28. Discuss the relationship between entrepreneurship and risk appetite
29. Discuss the relationship between entrepreneurship and resilience
30. Describe the characteristics of a resilient entrepreneur
31. Discuss how to deal with failure
353
Participant Handbook
354
Field Technician - Computing and Peripherals
Sole Proprietorship
In a sole proprietorship, a single individual owns, manages and controls the enterprise. This
type of business is the easiest to form with respect to legal formalities. The business and the
owner have no separate legal existence. All profit belongs to the proprietor, as do all the
losses the liability of the entrepreneur is unlimited.
Partnership
A partnership firm is formed by two or more people. The owners of the enterprise are called
partners. A partnership deed must be signed by all the partners. The firm and its partners
have no separate legal existence. The profits are shared by the partners. With respect to
losses, the liability of the partners is unlimited. A firm has a limited life span and must be
dissolved when any one of the partners dies, retires, claims bankruptcy or goes insane.
Tips
• Learn from others’ failures.
• Be certain that this is what you want.
• Search for a problem to solve, rather than look for a problem to attach to your idea.
355
Participant Handbook
Leaders believe in doing the right things. They also believe in helping others to do the right
things. An effective leader is someone who:
• Creates an inspiring vision of the future.
• Motivates and inspires his team to pursue that vision.
356
Field Technician - Computing and Peripherals
Tips
• Don’t get too attached to your original idea. Allow it to evolve and change.
• Be aware of your weaknesses and build a team that will complement your shortfalls.
• Hiring the right people is not enough. You need to promote or incentivize your most
talented people to keep them motivated.
• Earn your team’s respect.
It’s very important to note that listening is not the same as hearing. Hearing just refers to
sounds that you hear. Listening is a whole lot more than that. To listen, one requires focus. It
means not only paying attention to the story, but also focusing on how the story is relayed,
the way language and voice is used, and even how the speaker uses their body language.
The ability to listen depends on how effectively one can perceive and understand both,
verbal and non-verbal cues.
357
Participant Handbook
What you say, and the tone in which you say it, results in numerous perceptions being
formed. A person who speaks hesitantly may be perceived as having low self-esteem or
lacking in knowledge of the discussed topic. Those with a quiet voice may very well be
labelled as shy. And those who speak in commanding tones with high levels of clarity, are
usually considered to be extremely confident. This makes speaking a very critical
communication skill.
358
Field Technician - Computing and Peripherals
Tips
• If you’re finding it difficult to focus on what someone is saying, try repeating their words
in your head.
• Always maintain eye contact with the person that you are communicating with, when
speaking as well as listening. This conveys and also encourages interest in the
conversation.
The aim of problem solving is to recognize the obstacles and remove them in order to
achieve the goals.
359
Participant Handbook
Why Negotiate?
Starting a business requires many, many negotiations. Some negotiations are small while
others are critical enough to make or break a start-up. Negotiation also plays a big role
inside the workplace. As an entrepreneur, you need to know not only know how to
negotiate yourself, but also how to train employees in the art of negotiation.
360
Field Technician - Computing and Peripherals
How to Negotiate?
Take a look at some steps to help you negotiate:
• Step 1: Pre-Negotiation Preparation: Agree on where to meet to discuss the problem,
decide who all will be present and set a time limit for the discussion.
• Step 2: Discuss the problem: This involves asking questions, listening to the other side,
putting your views forward and clarifying doubts.
• Step 3: Clarify the Objective: Ensure that both parties want to solve the same problem
and reach the same goal.
• Step 4: Aim for a Win-Win Outcome: Try your best to be open minded when
negotiating. Compromise and offer substitute solutions to arrive at an outcome where
both win.
• Step 5: Clearly Define the Agreement: When an agreement has been reached, the
details of the agreement should be crystal clear to both sides, with no scope for
misunderstandings.
• Step 6: Implement the Agreed Upon Solution: Agree on a course of action to set the
solution in motion.
Tips
• Know exactly what you want before you work towards getting it
• Give more importance to listening and thinking, than speaking
• Focus on building a relationship rather than winning
• Remember that your people skills will affect the outcome
• Know when to walk away – sometimes reaching an agreement may not be possible
Peter Drucker
What is an Opportunity?
361
Participant Handbook
A critical question that all entrepreneurs face is how to go about finding the business
opportunity that is right for them.
It is therefore extremely important that entrepreneurs must learn how to identify new and
existing business opportunities and evaluate their chances of success.
362
Field Technician - Computing and Peripherals
Opportunity Analysis
Once you have identified an opportunity, you need to analyse it. To analyse an opportunity,
you must:
• Focus on the idea
• Focus on the market of the idea
• Talk to industry leaders in the same space as the idea
• Talk to players in the same space as the idea
363
Participant Handbook
Tips
• Remember, opportunities are situational.
• Look for a proven track record.
• Avoid the latest craze.
• Love your idea.
Types of Entrepreneurs
Characteristics of an Entrepreneur
364
Field Technician - Computing and Peripherals
Dhirubhai Ambani began his entrepreneurial career by selling “bhajias” to pilgrims in Mount
Girnar on weekends. At 16, he moved to Yemen where he worked as a gas-station
attendant, and as a clerk in an oil company. He returned to India with Rs. 50,000 and started
a textile trading company. Reliance went on to become the first Indian company to raise
money in global markets and the first Indian company to feature in Forbes 500 list.
Karsanbhai Patel made detergent powder in the backyard of his house. He sold his product
door-to door and offered a money back guarantee with every pack that was sold. He
charged Rs.3 per kg when the cheapest detergent at that time was Rs.13 per kg. Dr. Patel
eventually started Nirma which became a whole new segment in the Indian domestic
detergent market.
365
Participant Handbook
Take a look at the diagram below to get a better idea of this process.
366
Field Technician - Computing and Peripherals
The six domains and their various elements have been graphically depicted.
367
Participant Handbook
Every entrepreneurship support ecosystem is unique and all the elements of the ecosystem
are interdependent. Although every region’s entrepreneurship ecosystem can be broadly
described by the above features, each ecosystem is the result of the hundred elements
interacting in highly complex and particular ways.
368
Field Technician - Computing and Peripherals
All these initiatives are effective but there is a need to scale up and enrich the ecosystem
further in the following ways:
1. We need to review our attitude towards failures and accept them as learning
experiences.
2. We must encourage the educated to become entrepreneurs and provide students in
schools and colleges with entrepreneurship skills.
3. Universities, research labs and the government need to play the role of enablers in the
entrepreneurship support ecosystem.
4. Policymakers need to focus on reducing the obstacles such as corruption, red tape and
bureaucracy.
5. We need to improve our legal systems and court international venture capital firms and
bring them to India.
6. We must devise policies and methods to reach the secondary and tertiary towns in India,
where people do not have access to the same resources available in the cities.
Today, there is a huge opportunity in this country to introduce innovative solutions that are
capable of scaling up, and collaborating within the ecosystem as well as enriching it.
Tips
• Research the existing market, network with other entrepreneurs, venture capitalists,
angel investors, and thoroughly review the policies in place to enable your
entrepreneurship.
• Failure is a stepping stone and not the end of the road. Review yours and your peers’
errors and correct them in your future venture.
• Be proactive in your ecosystem. Identify the key features of your ecosystem and enrich
them to ensure self-sustainability of your entrepreneurship support ecosystem.
369
Participant Handbook
Entrepreneurs are inherently risk takers. They are path-makers not path-takers. Unlike a
normal, cautious person, an entrepreneur would not think twice about quitting his job (his
sole income) and taking a risk on himself and his idea.
An entrepreneur is aware that while pursuing his dreams, assumptions can be proven wrong
and unforeseen events may arise. He knows that after dealing with numerous problems,
success is still not guaranteed. Entrepreneurship is synonymous with the ability to take risks.
This ability, called risk-appetite, is an entrepreneurial trait that is partly genetic and partly
acquired.
The levels of risk appetite can be broadly categorized as “low”, “medium” and “high.” The
company’s entrepreneur(s) need to assess all possible alternatives and choose the option
most likely to succeed. Companies have varying levels of risk appetites for different
objectives. The levels depend on:
• The type of industry
• Market pressures
• Company objectives
For example, a start-up with a revolutionary concept will have a very high risk appetite. The
start-up can afford short term failures before it achieves longer term success. This type of
appetite will not remain constant and will be adjusted to account for the present
circumstances of the company.
370
Field Technician - Computing and Peripherals
Tips
• Cultivate a great network of clients, suppliers, peers, friends and family. This will not
only help you promote your business, but will also help you learn, identify new
opportunities and stay tuned to changes in the market.
• Don’t dwell on setbacks. Focus on what you need to do next to get moving again.
• While you should try, and curtail expenses, ensure that it is not at the cost of your
growth.
371
Participant Handbook
Shyam is a famous entrepreneur, known for his success story. But what most people don’t
know, is that Shyam failed numerous times before his enterprise became a success. Read his
interview to get an idea of what entrepreneurship is really about, straight from an
entrepreneur who has both, failed and succeeded.
Interviewer: Shyam, I have heard that entrepreneurs are great risk-takers who are never
afraid of failing. Is this true?
Shyam: Ha ha, no of course it’s not true! Most people believe that entrepreneurs need to be
fearlessly enthusiastic. But the truth is, fear is a very normal and valid human reaction,
especially when you are planning to start your own business! In fact, my biggest fear was the
fear of failing. The reality is, entrepreneurs fail as much as they succeed. The trick is to not
allow the fear of failing to stop you from going ahead with your plans. Remember, failures
are lessons for future success!
Interviewer: What, according to you, is the reason that entrepreneurs fail?
Shyam: Well, there is no one single reason why entrepreneurs fail. An entrepreneur can fail
due to numerous reasons. You could fail because you have allowed your fear of failure to
defeat you. You could fail because you are unwilling to delegate (distribute) work. As the
saying goes, “You can do anything, but not everything!” You could fail because you gave up
too easily – maybe you were not persistent enough. You could fail because you were
focusing your energy on small, insignificant tasks and ignoring the tasks that were most
important. Other reasons for failing are partnering with the wrong people, not being able to
sell your product to the right customers at the right time at the right price… and many more
reasons!
Interviewer: As an entrepreneur, how do you feel failure should be looked at?
Shyam: I believe we should all look at failure as an asset, rather than as something negative.
The way I see it, if you have an idea, you should try to make it work, even if there is a chance
that you will fail. That’s because not trying is failure right there, anyway! And failure is not
the worst thing that can happen. I think having regrets because of not trying, and wondering
‘what if’ is far worse than trying and actually failing.
Interviewer: How did you feel when you failed for the first time?
Shyam: I was completely heartbroken! It was a very painful experience. But the good news
is, you do recover from the failure. And with every subsequent failure, the recovery process
gets a lot easier. That’s because you start to see each failure more as a lesson that will
eventually help you succeed, rather than as an obstacle that you cannot overcome. You will
start to realize that failure has many benefits.
Interviewer: Can you tell us about some of the benefits of failing?
Shyam: One of the benefits that I have experienced personally from failing is that the failure
made me see things in a new light. It gave me answers that I didn’t have before. Failure can
make you a lot stronger. It also helps keep your ego in control.
Interviewer: What advice would you give entrepreneurs who are about to start their own
enterprises?
372
Field Technician - Computing and Peripherals
Shyam: I would tell them to do their research and ensure that their product is something
that is actually wanted by customers. I’d tell them to pick their partners and employees very
wisely and cautiously. I’d tell them that it’s very important to be aggressive – push and
market your product as aggressively as possible. I would warn them that starting an
enterprise is very expensive and that they should be prepared for a situation where they run
out of money. I would tell them to create long term goals and put a plan in action to achieve
that goal. I would tell them to build a product that is truly unique. Be very careful and ensure
that you are not copying another start-up. Lastly, I’d tell them that it’s very important that
they find the right investors.
Interviewer: That’s some really helpful advice, Shyam! I’m sure this will help all
entrepreneurs to be more prepared before they begin their journey! Thank you for all your
insight!
Tips
• Remember that nothing is impossible.
• Identify your mission and your purpose before you start.
• Plan your next steps – don’t make decisions hastily.
373
Participant Handbook
Unit Objectives
At the end of this unit, you will be able to:
1. Discuss how market research is carried out
2. Describe the 4 Ps of marketing
3. Discuss the importance of idea generation
4. Recall basic business terminology
5. Discuss the need for CRM
6. Discuss the benefits of CRM
7. Discuss the need for networking
8. Discuss the benefits of networking
9. Discuss the importance of setting goals
10. Differentiate between short-term, medium-term and long-term goals
11. Discuss how to write a business plan
12. Explain the financial planning process
13. Discuss ways to manage your risk
14. Describe the procedure and formalities for applying for bank finance
15. Discuss how to manage your own enterprise
16. List important questions that every entrepreneur should ask before starting an
enterprise
Market research is the process of gathering, analysing and interpreting market information
on a product or service that is being sold in that market. It also includes information on:
• Past, present and prospective customers
• Customer characteristics and spending habits
• The location and needs of the target market
• The overall industry
• Relevant competitors
374
Field Technician - Computing and Peripherals
Primary research
Primary research can be of two types:
• Exploratory: This is open-ended and usually involves detailed, unstructured interviews.
• Specific: This is precise and involves structured, formal interviews. Conducting specific
Secondary research
Secondary research uses outside information. Some common secondary sources are:
• Public sources: These are usually free and have a lot of good information. Examples are
government departments, business departments of public libraries etc.
• Commercial sources: These offer valuable information but usually require a fee to be
paid. Examples are research and trade associations, banks and other financial
institutions etc.
• Educational institutions: These offer a wealth of information. Examples are colleges,
universities, technical institutes etc.
Product
Whatever your product is, it is critical that you have a clear understanding of what you are
offering, and what its unique characteristics are, before you begin with the marketing
process.
Price
Once all the elements of Product have been established, the Price factor needs to be
considered. The Price of a Product will depend on several factors such as profit margins,
supply, demand and the marketing strategy.
375
Participant Handbook
Promotion
Once you are certain about your Product and your Price, the next step is to look at ways to
promote it. Some key elements of promotion are advertising, public relations, social media
marketing, email marketing, search engine marketing, video marketing and more.
Place
According to most marketers, the basis of marketing is about offering the right product, at
the right price, at the right place, at the right time. For this reason, selecting the best
possible location is critical for converting prospective clients into actual clients.
Importance of an IDEA
Ideas are the foundation of progress. An idea can be small or ground-breaking, easy to
accomplish or extremely complicated to implement. Whatever the case, the fact that it is an
idea gives it merit. Without ideas, nothing is possible. Most people are afraid to speak out
their ideas, out for fear of being ridiculed. However, if are an entrepreneur and want to
remain competitive and innovative, you need to bring your ideas out into the light.
376
Field Technician - Computing and Peripherals
• Being open minded and not limiting your ideas, even if the idea who have seems
ridiculous
• Not discarding ideas that you don’t work on immediately, but instead making a note of
them and shelving them so they can be revisited at a later date.
Tips
• Keep in mind that good ideas do not always have to be unique.
• Remember that timing plays a huge role in determining the success of your idea.
• Situations and circumstances will always change, so be flexible and adapt your idea
accordingly.
377
Participant Handbook
• Income Statement (Profit and Loss Statement): Shows the profitability of a business
during a period of time.
• Liabilities: The value of what a business owes to someone else.
• Marketing: The process of promoting, selling and distributing a product or service.
• Net Income/Profit: Revenues minus expenses.
• Net Worth: The total value of a business.
• Payback Period: The amount of time it takes to recover the initial investment of a
business.
• Profit Margin: The ratio of profit, divided by revenue, displayed as a percentage.
• Return on Investment (ROI): The amount of money a business gets as return from an
investment.
• Revenue: The total amount of income before expenses are subtracted.
• Sales Prospect: A potential customer.
• Supplier: A provider of supplies to a business.
• Target Market: A specific group of customers at which a company's products and
services are aimed.
• Valuation: An estimate of the overall worth of the business.
• Variable Cost: Expenses that change in proportion to the activity of a business.
• Working Capital: Calculated as current assets minus current liabilities.
CRM stands for Customer Relationship Management. Originally the expression Customer
Relationship Management meant managing one’s relationship with customers. However,
today it refers to IT systems and software designed to help companies manage their
relationships.
Customer needs change over time, and technology can make it easier to understand what
customers really want. This insight helps companies to be more responsive to the needs of
their customers. It enables them to modify their business operations when required, so that
their customers are always served in the best manner possible. Simply put, CRM helps
companies recognize the value of their clients and enables them to capitalize on improved
customer relations.
378
Field Technician - Computing and Peripherals
Benefits of CRM
Networking is an essential personal skill for business people, but it is even more important
for entrepreneurs. The process of networking has its roots in relationship building.
Networking results in greater communication and a stronger presence in the entrepreneurial
ecosystem. This helps build strong relationships with other entrepreneurs.
Business networking events held across the globe play a huge role in connecting like-minded
entrepreneurs who share the same fundamental beliefs in communication, exchanging ideas
and converting ideas into realities. Such networking events also play a crucial role in
connecting entrepreneurs with potential investors. Entrepreneurs may have vastly different
experiences and backgrounds but they all have a common goal in mind – they all seek
connection, inspiration, advice, opportunities and mentors. Networking offers them a
platform to do just that.
Benefits of Networking
Networking offers numerous benefits for entrepreneurs. Some of the major benefits are:
• Getting high quality leads
• Increased business opportunities
• Good source of relevant connections
• Advice from like-minded entrepreneurs
• Gaining visibility and raising your profile
• Meeting positive and enthusiastic people
379
Participant Handbook
• Increased self-confidence
• Satisfaction from helping others
• Building strong and lasting friendships
Tips
• Use social media interactions to identify needs and gather feedback.
• When networking, ask open-ended questions rather than yes/no type questions.
]
Medium-Term Goals
• These goals are built on your short-term goals.
• They do not need to be as specific as your short-term goals.
Example: Arranging for a service contract to ensure that your machines don’t fail again.
Long-Term Goals
A business plan is a tool for understanding how your business is put together. It can be used
to monitor progress, foster accountable and control the fate of the business. It usually offers
a 3-5year projection and outlines the plan that the company intends to follow to grow its
revenues. A business plan is also a very important tool for getting the interest of key
employees or future investors.
380
Field Technician - Computing and Peripherals
The executive summary follows the title page. The summary should clearly state your desires
as the business owner in a short and business like way. It is an overview of your business and
your plans. Ideally this should not be more than 1-2 pages.
Business Description
The second section of your business plan needs to provide a detailed review of the different
elements of your business. This will help potential investors to correctly understand your
business goal and the uniqueness of your offering.
Market Analysis
The market analysis section usually follows the business description. The aim of this section
is to showcase your industry and market knowledge. This is also the section where you
should lay down your research findings and conclusions.
381
Participant Handbook
This section should come immediately after the Market Analysis. Your Organization &
Management section should include:
• Your company’s organizational structure
• Details of your company’s ownership
• Details of your management team
• Qualifications of your board of directors
• Detailed descriptions of each division/department and its function
• The salary and benefits package that you offer your people
The next section is the service or product line section. This is where you describe your
service or product, and stress on their benefits to potential and current customers. Explain in
detail why your product of choice will fulfil the needs of your target audience.
382
Field Technician - Computing and Peripherals
Funding Request
This section is specifically for those who require funding for their venture. The Funding
Request section should include the following information:
• How much funding you currently require.
• How much funding you will require over the next five years. This will depend on your
long-term goals.
• The type of funding you want and how you plan to use it. Do you want funding that can
be used only for a specific purpose, or funding that can be used for any kind of
requirement?
• Strategic plans for the future. This will involve detailing out your long-term plans – what
these plans are and how much money you will require to put these plans in motions.
• Historical and prospective financial information. This can be done by creating and
maintaining all your financial records, right from the moment your enterprise started, to
the present day. Documents required for this are your balance sheet which contains
details of your company’s assets and liabilities, your income statement which lists your
company’s revenues, expenses and net income for the year, your tax returns (usually for
the last three years) and your cash flow budget which lists the cash that came in, the
cash that went out and states whether you had a cash deficit (negative balance) or
surplus (positive balance) at the end of each month.
Financial Planning
Before you begin building your enterprise, you need to plan your finances. Take a look at the
steps for financial planning:
• Step 1: Create a financial plan. This should include your goals, strategies and timelines
for accomplishing these goals.
• Step 2: Organize all your important financial documents. Maintain a file to hold your
investment details, bank statements, tax papers, credit card bills, insurance papers and
any other financial records.
• Step 3: Calculate your net worth. This means figure out what you own (assets like your
house, bank accounts, investments etc.), and then subtract what you owe (liabilities like
loans, pending credit card amounts etc.) the amount you are left with is your net worth.
• Step 4: Make a spending plan. This means write down in detail where your money will
come from, and where it will go.
• Step 5: Build an emergency fund. A good emergency fund contains enough money to
cover at least 6 months’ worth of expenses.
• Step 6: Set up your insurance. Insurance provides long term financial security and
protects you against risk.
383
Participant Handbook
Risk Management
As an entrepreneur, it is critical that you evaluate the risks involved with the type of
enterprise that you want to start, before you begin setting up your company. Once you have
identified potential risks, you can take steps to reduce them. Some ways to manage risks
are:
• Research similar business and find out about their risks and how they were minimized.
• Evaluate current market trends and find out if similar products or services that launched
a while ago are still being well received by the public.
• Think about whether you really have the required expertise to launch your product or
service.
• Examine your finances and see if you have enough income to start your enterprise.
• Be aware of the current state of the economy, consider how the economy may change
over time, and think about how your enterprise will be affected by any of those changes.
• Create a detailed business plan.
Tips
• Ensure all the important elements are covered in your plan.
• Scrutinize the numbers thoroughly.
• Be concise and realistic.
• Be conservative in your approach and your projections.
• Use visuals like charts, graphs and images wherever possible.
For entrepreneurs, one of the most difficult challenges faced involves securing funds for
start-ups. With numerous funding options available, entrepreneurs need to take a close look
at which funding methodology works best for them. In India, banks are one of the largest
funders of start-ups, offering funding to thousands of start-ups every year.
384
Field Technician - Computing and Peripherals
General Credentials
This is where you, as an entrepreneur, provide the bank with background information on
yourself. Such information includes:
• Letter(s) of Introduction: This letter should be written by a respected business person
who knows you well enough to introduce you. The aim of this letter is set across your
achievements and vouch for your character and integrity.
• Your Profile: This is basically your resume. You need to give the bank a good idea of your
educational achievements, professional training, qualifications, employment record and
achievements.
• Business Brochure: A business brochure typically provides information on company
products, clients, how long the business has been running for etc.
• Bank and Other References: If you have an account with another bank, providing those
bank references is a good idea.
• Proof of Company Ownership or Registration: In some cases, you may need to provide
the bank with proof of company ownership and registration. A list of assets and liabilities
may also be required.
Financial Situation
Banks will expect current financial information on your enterprise. The standard financial
reports you should be prepared with are:
• Balance Sheet
• Cash-Flow Statement
• Business Plan
• Profit-and-Loss Account
• Projected Sales and Revenues
• Feasibility Study
Guarantees or Collaterals
Usually banks will refuse to grant you a loan without security. You can offer assets which the
bank can seize and sell off if you do not repay the loan. Fixed assets like machinery,
equipment, vehicles etc. are also considered to be security for loans.
385
Participant Handbook
The Procedure
Tips
• Get advice on funding options from experienced bankers.
• Be cautious and avoid borrowing more than you need, for longer than you need, at an
interest rate that is higher than you are comfortable with.
Step 1: Use your leadership skills and ask for advice when required.
Let’s take the example of Ramu, an entrepreneur who has recently started his own
enterprise. Ramu has good leadership skills – he is honest, communicates well, knows how
to delegate work etc. These leadership skills definitely help Ramu in the management of his
enterprise. However, sometimes Ramu comes across situations that he is unsure how to
handle. What should Ramu do in this case? One solution is for him to find a more
experienced manager who is willing to mentor him. Another solution is for Ramu to use his
networking skills so that he can connect with managers from other organizations, who can
give him advice on how to handle such situations.
Step 2: Divide your work amongst others – realize that you cannot handle
everything yourself.
Even the most skilled manager in the world will not be able to manage every single task that
an enterprise will demand of him. A smart manager needs to realize that the key to
managing his enterprise lies in his dividing all his work between those around him. This is
known as delegation. However, delegating is not enough. A manager must delegate
effectively if he wants to see results. This is important because delegating, when done
incorrectly, can result in you creating even more work for yourself. To delegate effectively,
you can start by making two lists. One list should contain the things that you know you need
to handle yourself. The second list should contain the things that you are confident can be
given to others to manage and handle.
386
Field Technician - Computing and Peripherals
Besides incorrect delegation, another issue that may arise is over-delegation. This means
giving away too many of your tasks to others. The problem with this is, the more tasks you
delegate, the more time you will spend tracking and monitoring the work progress of those
you have handed the tasks to. This will leave you with very little time to finish your own
work.
Hiring the right people goes a long way towards effectively managing your enterprise. To
hire the best people suited for the job, you need to be very careful with your interview
process. You should ask potential candidates the right questions and evaluate their answers
carefully. Carrying out background checks is always a good practice. Running a credit check is
also a good idea, especially if the people you are planning to hire will be handling your
money. Create a detailed job description for each role that you want filled and ensure that
all candidates have a clear and correct understanding of the job description. You should also
have an employee manual in place, where you put down every expectation that you have
from your employees. All these actions will help ensure that the right people are approached
for running your enterprise.
Your enterprise can only be managed effectively if your employees are motivated to work
hard for your enterprise. Part of being motivated involves your employees believing in the
vision and mission of your enterprise and genuinely wanting to make efforts towards
pursuing the same. You can motivate your employees with recognition, bonuses and
rewards for achievements. You can also motivate them by telling them about how their
efforts have led to the company’s success. This will help them feel pride and give them a
sense of responsibility that will increase their motivation. Besides motivating your people,
your employees should be constantly trained in new practices and technologies. Remember,
training is not a one-time effort. It is a consistent effort that needs to be carried out
regularly.
Your employees need to be well-versed in the art of customer management. This means
they should be able to understand what their customers want, and also know how to satisfy
their needs. For them to truly understand this, they need to see how you deal effectively
with customers.
This is called leading by example. Show them how you sincerely listen to your clients and the
efforts that you put into understand their requirements. Let them listen to the type of
questions that you ask your clients so they understand which questions are appropriate.
Also, hire a marketing agency if you feel you need help in this area. Now that you know what
is required to run your enterprise effectively, put these steps into play, and see how much
easier managing your enterprise becomes!
387
Participant Handbook
Tips
• Get advice on funding options from experienced bankers.
• Be cautious and avoid borrowing more than you need, for longer than you need, at an
interest rate that is higher than you are comfortable with.
Tips
• It is very important to validate your business ideas before you invest significant time,
money and resources into it.
• The more questions you ask yourself, the more prepared you will be to handle to highs
and lows of starting an enterprise.
388
Field Technician - Computing and Peripherals
Footnotes:
1. A mentor is a trusted and experienced person who is willing to coach and guide you.
2. A customer is someone who buys goods and/or services.
3. A competitor is a person or company that sells products and/or services similar to your
products and/or services.
4. SWOT stands for Strengths, Weaknesses, Opportunities and Threats. To conduct a SWOT
analysis of your company, you need to list down all the strengths and weaknesses of
your company, the opportunities that are present for your company and the threats
faced by your company.
5. A minimum viable product is a product that has the fewest possible features, that can be
sold to customers, for the purpose of getting feedback from customers on the product.
6. A company is said to break even when the profits of the company are equal to the costs.
7. The legal structure could be a sole proprietorship, partnership or limited liability
partnership.
8. There are two types of taxes – direct taxes payable by a person or a company, or indirect
taxes charged on goods and/or services.
9. There are two types of insurance – life insurance and general insurance. Life insurance
overs human life while general insurance covers assets like animals, goods, cars etc.
389