PC Design and Maintenance Made Simple
PC Design and Maintenance Made Simple
PC Design and Maintenance Made Simple
Summary
This module covers topics relating to keeping computers in good condition, troubleshooting computer
problems and performing basic repairs on computers. The online instruction portion of this module
includes concepts related to computer parts, software, viruses and basic maintenance. The face-to-
face training involves hands-on sessions with troubleshooting and repair. If practical, both laptop and
desktop computers will be used for these sessions. While these materials were primarily designed for
users of Windows operating systems, open source operating systems are also discussed.
1
Module 1: Computer Maintenance, Troubleshooting and Repair
Resource Book
Author: Heidi Neff, Consultant to Zambia Pacific Trust, [email protected]
First Edition – May 2010
More information about Heidi Neff and Zambia Pacific Trust is found at the end of this module.
Acknowledgements
The Computer Lab Manager Training Course resource books were made possible due to the efforts and
encouragement provided by a variety of people around the world. Special thanks are due to two
pioneering organizations working on computers in education in Zambia who provided advice and
materials: Computers for Zambian Schools and Crescent Future Kids. Three international
development aid organizations: Camara, VVOB and IICD, also deserve special recognition for their
contributions to this document and the efforts they are making to use ICT as a tool for development
and education in Zambia and elsewhere. Many individuals also contributed their time, expertise and
advice to the crafting of this module. Key among them are Bornwell Mwewa, Anne Johnson, Nick Lew,
Rachel Muchenje, Lumai Mubanga and Annel Silungwe. In addition, none of Zambia Pacific Trust’s
work toward improving computer education at schools in Lusaka, Zambia would have been possible
without the support, advice and equipment provided by Seattle Academy in Seattle, Washington, USA.
The five pictures found in section 5.7.3 are used with permission of FonerBooks.com.
Licensing
This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 United
States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-
sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco,
California, 94105, USA.
Zambia Pacific Trust welcomes and encourages organizations to use any of the modules of the
Computer Lab Manager Training Course in a manner they deem appropriate, excluding making a profit
from the sale or distribution of the material. Organizations are welcome to use portions of these
modules in other documents, but they should attribute the material that is used to Zambia Pacific
Trust. Zambia Pacific Trust also appreciates knowing who is benefiting from this material, and requests
that individuals and organizations please email Bornwell Mwewa ([email protected]), Heidi
Neff ([email protected]) and Zambia Pacific Trust ([email protected]) and describe how the
material is being used.
2
Module 1 Table of Contents
1. Introduction
1.1. Introduction to the Computer Lab Manager Training Course
1.2. Importance of Practical Learning
1.3. Importance of Self Study
1.4. Introduction to Module 1
1.5. Assignments/Activities
2. Basic Computer Technical Knowledge
2.1. How a Computer Works
2.2. Hardware
2.3. Software
2.4. Assignments/Activities
3. Computer Maintenance
3.1. Why Maintain?
3.2. Updating Software
3.3. Virus and Malware Prevention and Removal
3.4. Computer Hardware Maintenance
3.5. Peripheral Hardware Use and Maintenance
3.6. Assignments/Activities
4. Setting Up or Customizing a Computer
4.1. When a Computer Arrives
4.2. Partitioning a Hard Drive
4.3. Installing Operating Systems
4.4. Installing and Uninstalling Other Software
4.5. Setting Up User Accounts
4.6. Assignments/Activities
5. Computer Troubleshooting and Repair Basics
5.1. Improving Slow Performance
5.2. Stepwise guides for Common Problems
5.3. Understanding Error Messages
5.4. How to Search for Information
5.5. How to Distinguish a Software Issue from a Hardware Issue
5.6. Fixing Software Problems
5.7. Fixing Hardware Problems
5.8. Troubleshooting and Repairing Printers
5.9. Managing E-Waste
5.10. Assignment/Activities
6. Overall Assignments/Activities
7. List of Internet Resources
8. Bibliography
3
Module 1 Text
1. Introduction
1.1. Introduction to the Computer Lab Manager Training Course
The Computer Lab Manager Training Course was developed by Zambia Pacific Trust in
collaboration with a variety of organizations working on IT related development projects in
Zambia. While these projects are in several different sectors (health, education, agriculture and
community), all of the organizations recognized the need to increase the number of people
who have training in computers past the standard level of a computer user. A particular need
that was identified was for individuals who could maintain dynamic and well functioning
computer labs and other centers for IT use within a particular project. Therefore, a multi-
faceted training course was developed to meet these needs including both the “hard skills” of
computer maintenance, repair, and networking and the “soft skills” of management,
leadership, communication and instruction. Readers may find more emphasis shown on
educational projects, since that is the area of Zambia Pacific Trust’s experience. However, most
topics discussed apply equally well in the other sectors where IT is used.
The resource books for these modules are designed to be used as a part of an
instructor-led four module course, with each course including both a distance (online)
instruction component and a one week face-to-face workshop. This resource book is written to
accompany the first of the four modules listed below.
The target audience for this training course is adult learners who already have
intermediate computer user skills and significant experience using computers. Ideally,
participants are already employed as computer lab managers, computer project coordinators or
Internet café managers. While the course is tailored to those working in educational or
community organizations, the course is still valuable for those working in a similar capacity in
the private sector.
These learning materials are also valuable for people who are not involved in a formal
course, but instead are studying independently to become computer lab managers or improve
their skills as computer lab managers. Learners who are using these materials for self study are
encouraged to make the training as hands-on as possible, performing as many of the
assignments and activities as they can practically achieve.
4
1.2. Importance of “Hands-On” Learning
Throughout the computer lab manager training course, a strong emphasis is placed on
practical learning. Learners will find that theoretical topics are covered quite briefly and more
attention is paid to topics that relate to activities that the learners will perform in their
computer labs. In the distance learning portion of each module, the majority of the
assignments require the learners to think and then act. This includes using a local computer lab
(both the computers and the community of people found there) as an opportunity to try out
skills, test out ideas and implement improvements. The face-to-face workshops also will
emphasize active learning. Learners are asked to participate in discussions and role plays, and
are given many opportunities to learn and practice technical skills using the available
computers.
There are some areas where lab managers in Zambia and other developing countries are
likely to need more training compared to their counterparts in countries where individuals have
had more experience using computers and reading and writing in English. These three areas
are listed below:
Touch typing – including proper typing posture, home keys, knowing which fingers
press which keys, using capital letters and punctuation, typing without looking, and
significant speed-building practice
English Reading and Writing – including reading comprehension, proper spelling,
grammar and punctuation, communicating clearly in writing, and
formulating/organizing letters, essays and other documents.
Computer User Skills – Including significant skill and practice with use of an operating
system, file management, and standard office software (word processing,
spreadsheets and presentation software)
Learners are encouraged to identify their own strengths and weaknesses in these areas and self
study to improve as needed. Participants in the course will be provided with suggested
resources to assist their learning (via instructors or the assignments at the end of this chapter).
No one likes to see scenarios such as the one described above, but sadly this sort of
situation is very common in new computer projects. If the computers are not well maintained,
they easily fall prey to problems caused by heat, dust, viruses, misuse and fluctuating electrical
supplies. Therefore, a computer lab manager needs to be well trained in ways to maintain
computers and then repair them when unavoidable problems do occur. Thus the emphasis of
this module is on computer maintenance and basic repairs. Although the theory of how a
computer works is not emphasized, the module does begin with the background knowledge
that is most helpful for people involved in hands on work in a computer lab. Some time is also
spent discussing the initial setup and customization of computers.
1.5. Assignments/Activities
1.5.1. Self Assessment: Touch Typing. Go to the website www.typingtest.com and take a few
typing speed tests (using different texts each time). Report your scores to your instructor.
1.5.2. Self Study: Touch Typing. Based on your typing test results and your ability to access the
Internet, your instructor will recommend to you a self study strategy for touch typing. If
you do not have an instructor, here are a couple of suggestions: 1. Find a free touch typing
training program that you can use on your computer (without an Internet connection). One
option is the Rapid Typing Tutor, available at www.rapidtyping.com/typing-tutor.html. 2.
Find a free online touch typing training program that you can participate in. Some options
are the typing courses and tutorials offered at http://alison.com, www.sense-lang.org,
www.typeonline.co.uk and www.goodtyping.com.
1.5.3. Assessment: Computer User Skills. Discuss your computer user skills with your
instructor, and demonstrate your skills by performing a practical activity that your instructor
develops. For example, he or she might ask you to type and format a small document using
a word processing program, or enter some information into a spreadsheet and do some
simple calculations using that data. If you do not have an instructor, find an IT literate
individual in your community who can assess your skills. You can also perform a self
assessment by attempting suggested activities in an IT user skills curriculum that is available
in your area. You can also download sample test papers for the ICDL/ECDL certification
(International/European Computer Driving License) from www.icdl.org.
1.5.4. Self Study: Computer User Skills. Discuss with your instructor to determine the best
course of study for you to continue to improve your computer user skills. If you do not have
an instructor, find an appropriate IT curriculum that you can work through on your own.
Many community computer projects will have access to the Microsoft Unlimited Potential
or Microsoft Digital Literacy learning materials. You can also study the Microsoft Digital
Literacy course and other IT courses online for free through http://alison.com.
6
1.5.5. Assessment: English Reading and Writing. Discuss your English reading and writing
skills with your instructor, and demonstrate your skills by performing practical activities that
your instructor develops. For example, he or she might ask you to read and explain a short
document or write a professional letter. Alternatively, you can take an online business
English test at http://alison.com/courses/Business-English-Test-LT-E. A simpler English test
can be taken at www.busuu.com/quiz. The English-Online website (http://www.english-
online.org.uk/course.htm) provides a variety of tests to help users asses their level of
English understanding.
1.5.6. Self Study: English Reading and Writing. Discuss with your instructor to determine the
best course of study for you to continue to improve your English reading and writing skills.
If you do not have an instructor, there are some free online options to help you improve
your English including basic online courses and tutorials through www.busuu.com and
www.gcflearnfree.org. Some intermediate level courses are available online through
http://alison.com. Some more advanced quizzes and activities (but not full courses) are
available through www.bbc.co.uk/worldservice/learningenglish/, http://a4esl.org,
www.usingenglish.com, www.englishlearner.com and www.englishcafe.com. The last site
also provides opportunities to practice and learn through conversation. For all English
learners, the most important thing to do is practice your skills. Read, write and speak
English as frequently as is possible.
Table of Contents
All of the equipment (hardware) and the instructions (software) needed to complete the
Inputabove steps are described in
Processing
the next section. Storage
The information is digitized, The information is
Via keyboard, mouse
Amazingly, the information that the user
becoming a simple code thatinputs into a computer isaprocessed
stored as part of the so that it
or microphone
becomes a simple code made up of only
thecomputer cantwo
storedigits: zero and one!computer’s
For all itsmemory
complexity, a
computer is only able to handle these two choices. This is because it is based on electrical
signals that have only two options (such as either on or off). But computers compensate for
this very simple code by using it in huge quantities.
Output Further AProcessing
single unit of this zero/one code is called
a bit. Grouping 8 bits together makes a unit of information called a byte. Typing a single page
Information is shared via If instructed to do so, the
ofmonitor,
typed text on a computer
printer, speakers or
requires a minimum of about 20 kilobytes (20 KB or 20,000 bytes)
information is edited or enhanced
ofprojector
information to be stored. Good quality digital photographs are usually 1 megabyte (1 MB or
with input from the user
1,000,000 bytes) or larger. So a computer is a very “busy” machine indeed!
7
2.2. Hardware
2.2.1. Basic Hardware Components
Hardware is the physical equipment needed for a computer to function properly. The
basic hardware parts are briefly described here. Many computer lab managers will already
have been exposed to computer hardware through other courses, but those desiring additional
information can find it in a variety of texts and online sources. A desktop computer is used in
the photos, but all of this equipment is also found (in a more compact arrangement) in a laptop
computer.
Case. The computer case (also called a tower or housing) is the box that encloses many of
the parts shown below. It has attachment points, slots and screws that allow these parts to
be fitted onto the case. The case is also sometimes called the CPU, since it houses the CPU
(central processing unit or processor), but this designation can lead to confusion. Please
see the description of the processor, below.
Power Supply. The power supply is used to connect all of the parts of the computer
described below to electrical power. It is usually is found at the back of the computer case.
Fan. A fan is needed to disperse the significant amount of heat that is generated by the
electrically powered parts in a computer. It is important for preventing overheating of the
various electronic components. Some computers will also have a heat sink (a piece of fluted
metal) located near the processor to absorb heat from the processor.
Motherboard. The motherboard is a large electronic board that is used to connect the
power supply to various other electronic parts, and to hold these parts in place on the
computer. The computer’s memory (RAM, described below) and processor are attached to
the motherboard. Also found on the motherboard is the BIOS (Basic Input and Output
System) chip that is responsible for some fundamental operations of the computer, such as
linking hardware and software. The motherboard also contains a small battery (that looks
like a watch battery) and the chips that work with it to store the system time and some
other computer settings.
Drives. A computer’s drives are the devices used for long term storage of information. The
main storage area for a computer is its internal hard drive (also called a hard disk). The
computer should also have disk drives for some sort of removable storage media. A floppy
F
disk drive was very common until recent years, and is still found on many older desk top
computers. It was replaced by CD-ROM and DVD drives, which have higher storage
capacities. The current standard is a DVD-RW drive, which can both read and write
information using both CD and DVD disks. The USB ports (described later) on a computer
can also be used to connect other storage devices such as flash drives and external hard
drives.
8
Cards. This term is used to describe important tools that allow your computer to connect
and communicate with various input and output devices. The term “card” is used because
these items are relatively flat in order to fit into the slots provided in the computer case. A
computer will probably have a sound card, a video card, a network card and a modem.
RAM. RAM is the abbreviation for random access memory. This is the short term memory
that is used to store documents while they are being processed. The amount of RAM in a
computer is one of the factors that affect the speed of a computer. RAM attaches to the
motherboard via some specific slots. It is important to have the right type of RAM for a
specific computer, as RAM has changed over the years.
Processor. The processor is the main “brain” of a computer system. It performs all of the
instructions and calculations that are needed and manages the flow of information through
a computer. It is also called the CPU (central processing unit), although this term can also
be used to describe a computer case along with all of the hardware found inside it. Another
name for the processor is a computer “chip” although this term can refer to other lesser
processors (such as the BIOS). Processors are continually evolving and becoming faster and
more powerful. The speed of a processor is measured in megahertz (MHz) or gigahertz
(GHz). An older computer might have a processor with a speed of 1000 MHz (equivalent to
1 GHz) or lower, but processors with speeds of over 2 GHz are now common. One
processor company, Intel, made a popular series of processors called Pentium. Many
reconditioned computers contain Pentium II, Pentium III and Pentium 4 processors, with
Pentium 4 being the fastest of these.
Peripheral hardware. Peripheral hardware is the name for the computer components that
are not found within the computer case. This includes input devices such as a mouse,
microphone and keyboard, which carry information from the computer user to the
processor, and output devices such as a monitor, printer and speakers, which display or
transmit information from the computer back to the user.
Serial Port. This port for use with 9 pin connectors is no longer commonly used, but is
found on many older computers. It was used for printers, mice, modems and a variety of
other digital devices.
9
Parallel Port. This long and slender port is also no longer commonly used, but was the most
common way of attaching a printer to a computer until the introduction of USB ports (see
below). The most common parallel port has holes for 25 pins, but other models were also
manufactured.
VGA. The Video Graphics Array port is found on most computers today and is used to
connect video display devices such as monitors and projectors. It has three rows of holes,
for a 15 pin connector.
PS/2. Until recently, this type of port was commonly used to connect keyboards and mice
to computers. Most desktop computers have two of these round ports for six pin
connectors, one for the mouse and one for the keyboard.
USB. The Universal Serial Bus is now the most common type of port on a computer. It was
developed in the late 1990s as a way to replace the variety of ports described above. It can
be used to connect mice, keyboards, printers, and external storage devices such as DVD-RW
drives and flash drives. It has gone through three different models (USB 1.0, USB 2.0 and
USB 3.0), with USB 3.0 being the fastest at sending and receiving information. Older USB
devices can be used in newer model USB ports.
TRS. TRS (tip, ring and sleeve) ports are also known as ports for mini-jacks or audio jacks.
They are commonly used to connect audio devices such as headphones and microphones to
computers. Figure 2 - Back of Desktop Computer Showing
Ports version of a port for a phone jack, is
Ethernet. This port, which looks like a slightly wider
used to network computers via category 5 (CAT5) network cable. Although many
computers now connect wirelessly, this port is still the standard for wired networked
computers. Some computers also have the narrower port for an actual phone jack. These
are used for modem connections over telephone lines.
2.3. Software
2.3.1. Software Types and Categories
As mentioned in section 2.1, computer software is the term used for the instructions
that have been programmed to allow a computer to process information. Software comes in
three main categories, described below:
Operating Systems. These are the basic software programs that are needed to for a
computer to work. They give a computer the basic information needed for it to process and
store information. Currently all common operating systems are also graphical user
interfaces (GUIs) which means they use graphics to help the user to easily input
instructions, and open other programs. The most common operating systems (OS) are the
Windows family of operating systems, from Microsoft. A computer lab manager is likely to
encounter Windows 2000, Windows XP, Windows Vista and Windows 7 (the most recent
Microsoft OS) in a computer lab. Other operating systems are described in the next section.
10
Utility Software. This is a broad category of programs that allow a computer to perform
tasks that aren’t a part of the operating system, but are still practical and useful. For
example, a utility might instruct a computer on how to copy (burn) information to a CD-
ROM disk, or it might be an anti-virus program (see section 3.3).
Productivity Software. This is one term used to describe the type of software used to
perform standard office computer tasks. Word processing, presentation, spreadsheet and
database software are all common examples of productivity programs. The most common
set of productivity programs is Microsoft Office, offered by the Microsoft Corporation.
Users who cannot afford proprietary software or prefer software that can be locally
modified, can choose to use open source (often called free and open source or FOSS) software.
For most of the standard computer uses, an open source software option is available. This
includes the Linux family of operating systems (which includes Ubuntu, a common operating
system in African countries) and the OpenOffice.org productivity programs. The Source Forge
website (www.sourceforge.net) is a good resource for finding and downloading open source
programs. While open source software often does not come with professional support
available, there are user groups found on the Internet who can offer assistance to puzzled
users. This training module does describe how to perform some tasks using the Ubuntu
operating system, but does not provide thorough coverage. Further assistance with Ubuntu is
available through the website: http://help.ubuntu.com.
When first setting up a computer lab, the steering committee for a computer project
should discuss the benefits of both proprietary and open source software and make an
informed and intentional choice on which way to go. The computer lab manager should then
make sure that he or she is aware of all policies related to software choices.
It is possible that a computer project will choose to use proprietary software for some
purposes and open source software for others. For example, a project might be able to obtain
used computers that have a Windows operating system legally installed (such as through a
Microsoft Authorized Refurbisher) but these computers do not include other Microsoft
11
programs. In this case the organization might choose to continue to run Windows on its
computers, but choose open source options for all utility and productivity software.
2.4. Assignments/Activities
Please Note: Throughout this module there are assignments that require a learner to have
access to computers and the Internet. Students who are not already working as computer lab
managers may find performing these assignments to be difficult. These learners are
encouraged to consult with the staff of a local computer project or Internet café to gain access
to equipment and the Internet. It is even possible that short term internships could be arranged
that would be beneficial to both the learner and the computer project.
2.4.1. Study the exterior of a particular computer. See if you can identify the power supply,
the drives, and all of the ports described in this chapter.
2.4.2. Find a broken or disused desktop computer. Figure out how to open up the case.
Identify all of the hardware components that have been described in this chapter.
2.4.3. What type of software is used on the computer you use most frequently? Identify the
operating system, the productivity software, the Internet browser and the anti-virus
software. For each of these also state whether they are proprietary or open source. If you
are having trouble finding out information about some of your programs, here are some
tips: To find out about your computer’s operating system, right click on the Computer or
My Computer icon from your desktop or Start menu. Choose Properties. To find out about
a productivity program, open that program and then find a menu that includes the word
“About”. To find the About screen in Microsoft Office 2007, click on the Microsoft Office
Button, then click on Options Resources About.
2.4.4. How much RAM does the computer you use most frequently have? Also how fast is the
processor on this computer? To find this information, right click on the Computer or My
Computer icon from your desktop or Start menu. Choose Properties.
2.4.5. Have a discussion with a manager of a local computer lab about computer operating
systems. What operating systems are being used in that computer lab and why? What
factors went into the decision to choose an operating system?
2.4.6. Workshop Activity: In a group, observe the exterior of computer. How many ports and
hardware devices can your group identify? Ask the instructor for assistance with any items
that cannot be identified.
2.4.7. Workshop Activity: In a group, open up the case of a computer. Identify all of the
hardware components that have been described in this chapter.
2.4.8. Workshop Activity: Participate in a group discussion or a debate on the advantages and
disadvantages of using open source software.
2.4.9. Workshop Activity: Experiment with an operating system that you are not familiar with.
See if you can figure out how to change the background, open and close windows, open and
close programs, and perform any other computer tasks that you frequently perform with
other operating systems.
Table of Contents
12
3. Computer Maintenance
3.1. Why Maintain?
Think of a computer as being like a human body. We are advised to perform certain
tasks to keep our body in good shape. These maintenance tasks such as eating well, avoiding
some harmful activities and getting exercise keep our body in good condition. If we don’t
maintain our bodies, we might end up in the hospital with problems that result from the abuse
such as high blood pressure from eating too much salt, obesity from not exercising or lung
problems from smoking. Similarly, if we allow our computers to intake harmful materials (such
as dust) and programs (such as viruses) and we don’t keep our software in good condition
(updated) then the computer may also end up with significant problems that are then harder to
deal with. Proper maintenance of a computer, on the other hand, can keep it running smoothly
for years and years. Some of the different categories of computer maintenance are described
below.
13
Offline Updating. If a computer is in a location that never has access to the Internet, a
computer lab manager will need to download updates from a computer that is
connected to the Internet and then transfer them (via a disk or flash drive) to the
computer in question to be installed. This option is also useful if a computer lab has
several computers that all need the same update. Instead of having each computer
download the update separately, one computer could download the update and then it
could be shared amongst all of the computers. Offline updates for operating systems
can easily be found through Internet searches. Updates to download for Windows
computers can also be found through www.microsoft.com/downloads.
The computer lab manager also needs to have strict policies in place to prevent virus
infection. Since viruses are easily spread by the use of flash drives, the policy could prohibit the
use of flash drives, or require them to be scanned by a staff member before use. Another
policy to consider is the prohibition of downloading, since unsuspecting users can accidentally
download malware. A firewall that blocks dangerous downloads can also be useful.
Tips for Using Anti-Virus Software
1. 3.4.
You can get very good
Computer antivirusMaintenance
Hardware protection using the free edition of AVG, available
online at http://free.avg.com.
There are some commonanti-virus
No hardwaresoftware
problemsis that
perfect,
can however,
be avoided, sooryouat might
least made less
choose to have
frequent a back-up
by taking antivirus
particular programmeasures
preventive as well. Avast antivirus, available
with computers. at
These preventive measures
www.avast.com
are listed below. will work well and will not conflict with AVG if it is not set up to scan
automatically. Another good back-up program is Malwarebytes’ Anti-Malware
program, Dustavailable at www.malwarebytes.org.
Control. Dust is very harmful for computer parts. Excess dust can cause
2. After installing antivirus software, make
mechanical failures, particularly sure that
on computer you have selected
components the settings
with moving parts. Minimizing dust
needed for the software
in a computer lab is anto automatically
important part ofdownload
computerand install updates
maintenance. from thelab cleaning advice
Computer
Internet. This allows
is discussed furtherthe software2.toThe
in Module protect againstthemselves
computers newer viruses.
should Tobechange the dusted (wiped
regularly
settings
with afordryAVG
clothchoose Update
or duster) andManager from theare
if the computers Overview
housed screen.
in a particularly dusty area, the use
3. Whenof dust covers (when the computers are turned off) is advised.the
setting up antivirus software, make sure that you choose In proper
addition, settings
when so a computer
that theiscomputer
case opened for is other
automatically scanned
repairs, the for viruses
dust that on up
has built a regular basis
inside the (such
case as every
should be blown out.
day at 12:00).
This works bestAlsowith
make sure air.
forced thatDifferent
you havemechanical
selected forand
theelectrical
scheduled scans
tools aretoavailable
“run to
oncompress
computerair. startup if task has been missed”. In other
These tools are described in section 5.7.1. words, if you have chosen to
have scans run at 8:00, but the computer isn’t turned on until 10:00, it will still run a
scan. In AVG these options are chosen by choosing Manage Scheduled Scans from the
Computer Scanner screen.
14
4. Make sure that your computer has the proper date and time set. If it is not set
properly, the update managerand schedule scans may not run at the time you desire.
If your computer does not keep proper time, this is a sign that the small (watch style)
battery on the motherboard needs to be replaced.
Heat Control. Computer parts, in particular the CPU, produce a large amount of heat
while operating. It is important for this heat to dissipate, so that the computer is not damaged
by overheating. Computers do have fans and heat sinks, but these will only work well if the air
flow to the computer is not blocked. This means, for example, that a laptop computer should
not be left running for any length of time on a soft surface (like a sofa) that conforms around it,
and a desktop computer case should not be used while in an enclosed cabinet. In addition, it is
ideal that the computer lab temperature be kept low. Using air conditioners is a good option,
since the windows can also be kept closed to minimize dust, but many computer projects
cannot afford air conditioners or the associated electricity costs. Therefore curtains (to reduce
the heat of the sunlight), open windows and fans are often the best alternatives, although their
use requires increased vigilance against dust.
Surge Protection. In many countries, the electrical supply does not have a uniform (well
controlled) voltage. Voltage is also variable due to surges that occur, particularly during
thunderstorms and when power is returning after an outage. Voltage surges can be very
damaging to computers and other electrical components, and it is important to protect against
these events. The simplest form of surge protection is to purchase surge protecting power
(adaptor) strips. These devices contain 4 or 5 outlets that are protected by a fuse that is blown
in case of a power surge. The quality of these power strips varies, though, and they cannot be
guaranteed to be the safest form of surge protection. A second form of surge protection is a
surge suppressor that is installed where the main power enters a computer lab. These devices,
though more expensive, are of higher quality and will protect all of the electrical components
plugged in to electrical sockets within the room. A third option to consider is to purchase
uninterrupted power supplies (UPSs) to share between every two computers in a computer lab
(since a UPS includes six to ten electrical sockets). A UPS regulates the voltage sent to the
sockets located on the UPS itself, and also contains a battery that allows for continued
operation of a computer after a power outage. Depending on the UPS model and the amount
of equipment attached to the UPS, the battery might last for an hour or for just a few minutes,
but even just a few minutes allows enough time for the user to save their work and shut the
computer down properly.
Laptop Maintenance Issues. For computer labs using laptop computers, there are a
couple of additional issues to be aware of that can affect the lifespan of the computer.
Because laptop computers are moved around from place to place and handled more roughly
than desktop computers, they are more likely to have hardware problems develop. One
problem area, for example, is in the AC adaptor port. If it is found in the back of a laptop
computer, it is easy for the computer user to tilt the laptop backwards and unintentionally
place pressure on the AC adaptor as it is forced against the table top. The AC port (and any
other port located on the back of a laptop) can be easily damaged from this stress. Therefore
computer users should be instructed on the proper technique to use when picking up a laptop
computer. A second problem area for laptop computers is that the screws on the laptop body
gradually become loosened as the computer is moved about. A computer lab manager should
periodically (perhaps twice a year) tighten the screws on all laptop computers.
15
3.5. Peripheral Hardware Use and Maintenance
Peripheral hardware will also last longer if it is well maintained. For peripheral
hardware such as printers, projectors and external drives, all of the advice above about heat,
dust and power surge control is still relevant and important. In addition, there are some tips
below for using printers and projectors that will help these pieces of equipment work efficiently
and last a long time.
Proper Use of an LCD Projector. An LCD projector is a valuable tool for making
presentations and assisting in training courses. However, these projectors are very expensive
to purchase. If a computer project has had the good fortune of being able to purchase a
projector, it is important that every effort be taken to make sure that the projector is kept in
good repair. Some suggestions are shown here:
Store and carry the projector in a padded case. This will keep dust out of the projector
and cushion it in case of rough handling.
Keep a designated surge protecting power strip (adaptor strip) with the projector, and
make sure that all projector users know the importance of using the projector with
surge protector.
Make sure that the appropriate procedure for shutting down the projector is used, and
inform all projector users about the procedure. For most projectors, the proper shut
down procedure includes not unplugging the projector until the cooling process is
complete. This is indicated by a status light changing color, or a fan turning itself off. It
is important to allow the projector bulb to cool completely in order to extend the life of
the bulb.
It is particularly important to note that the projector bulb, which is the most expensive part in a
projector, will wear out and need to be replaced eventually. Projector bulbs can cost half the
price of buying a new projector! A computer project will need to make a plan for bulb
replacement, ideally even keeping a spare bulb on hand.
Efficient Use of a Printer. Most computer labs will have at least one printer for the use
of the computer lab manager and selected computer lab users. Printers are a great resource,
but if not controlled well they can be overused. This puts unnecessary wear on the printer, and
also uses up expensive ink and paper. It would be wise for a computer lab manager to have in
place some policies about what sort of material can be printed, and when color ink use is
allowed. Users should also be instructed to preview their work before printing, to avoid
printing unnecessary pages. In addition, many printers have different printing settings that
control the quality of the printouts and thus the amount of ink used. Inkjet printers, for
example, usually have an option for “draft” or “fast” printing that uses significantly less ink, but
still looks reasonably good. To find this option when printing a document, select Print from the
File menu (or the Office Button in MS Word 2007). When the print menu opens, there will be a
Properties button next to the selected printer. Clicking here will bring up choices such as the
print quality and whether the printout should be in color or black and white.
16
3.6. Assignments/Activities
3.6.1. Find and open the anti-virus software on a computer. Check to see if the virus database
is up to date. If it isn’t, update the software and also see if there is an option to setup the
program to automatically look for updates. Also see if there is an option that allows you to
schedule regular (daily) scans.
3.6.2. Go to a local computer lab and ask the computer lab manager about maintenance tasks.
What tasks does he or she do to keep the computers in good condition, and how often are
these tasks performed (daily, weekly, monthly or yearly)? If the computer lab manger does
not have any maintenance systems in place, instead report your recommendations for
computer maintenance.
3.6.3. Open the case of a computer and observe the dust inside. What tools do you have at
hand that could be used to safely remove that dust without damaging the equipment?
Experiment with the equipment that is available to you and report your findings.
3.6.4. Figure out how to set up a printer so that the default print settings are black and white
(not color) and “draft” or “fast” printing.
3.6.5. Workshop Activity: Observe a demonstration on how to properly set up and shut down
an LCD projector. Make sure that you have an opportunity to practice these techniques
yourself sometime during the workshop.
3.6.6. Workshop Activity: Using provided tools, find and tighten all of the screws on a laptop
computer.
3.6.7. Workshop Activity: Participate in a role play (and follow up discussion) in which a lab
manager tries to convince a person with a home computer to bring it in to the lab for
updates.
Table of Contents
17
Does the computer have separate user accounts with passwords? This is a good way to
control what access some users have to particular programs, files or settings. See
section 4.5 for more information. Another option to consider is installing and using
Microsoft SteadyState as a way to control what part of a computer certain users can
access (see Module 2, section 6.2.4 for more information).
User accounts can be easily set up by a lab manager who is logged into a computer using
an administrator account. For a Windows computer the lab manager would select
StartControl PanelUser Accounts. On a computer running the Ubuntu operating system
the lab manager would go to the main menu and choose SystemAdministrationUsers and
Groups. Once there, the lab manager will able to set up the account and choose the privileges
for those users. For Windows computers, the “standard” account type should be chosen for all
users that the lab manger does not want to have administrative privileges. The lab manager
can also log in to his or her administrative account on a computer to remove users or change
the passwords on user accounts as needed to control access.
4.6. Assignments/Activities
4.6.1. Is the computer you usually use partitioned? Follow the instructions in the “Tips for
Partitioning a Hard Drive” tip box to the point where you can see what partitions are
already there and what their sizes are. If your computer is already partitioned, what sorts
of files or programs are stored on each partition? See if you can find this out by opening My
Computer.
4.6.2. Following the steps in “Tips for Uninstalling Software” tip box, find and uninstall a bit of
unnecessary software that you find on your computer. If the computer is not yours, or if
you aren’t sure which software is unnecessary, ask for assistance and permission first.
4.6.3. Explore the www.download.com website. Can you tell the difference between
sponsored (paid advertising) links and the programs that are recommended by CNET?
Summarize your findings. Also browse through the different categories of programs. See if
you can find some that would be useful for a computer project in your area.
4.6.4. Set up a new user account on a computer and then log into the computer using this
account. How is the appearance different and how are the privileges different?
4.6.5. Workshop Activity: As a group, find a list of installed software on a computer (for
Windows computers this can be done through the Add/Remove Software tool in the Control
Panel). Review the list and discuss what each software program does. Determine whether
or not any of these programs should be removed from the computer.
4.6.6. Workshop Activity: As a group, install a new operating system on a test computer.
4.6.7. Workshop Activity: As a group, discuss what types of software are needed for a new
computer. Develop a list of software that would work well in a computer project in your
area. If time allows and the software is available, install all of these programs on the
computer used in the previous activity.
20
Table of Contents
Sometimes there are other files, such as temporary Internet files, that are stored on a
computer without the user knowing it. To delete these sorts of files, perform both of the
following techniques:
Disk Cleanup. In a Windows computer the Disk Cleanup utility is found in StartAll
ProgramsAccessories System Tools. It scans a hard disk for unnecessary files, and
then (with the user’s permission) removes these files.
Deleting Browsing History. When using the Internet, the browser stores the recent
history of the web pages that the user has viewed, in order to make it easier to find and
load these web pages again. The browser also stores other small bits of information
such as data entered into forms and usernames or passwords if a user has asked a web
page to “remember me” (although this is not a good idea for shared computers). This
stored information can be easily deleted. In Mozilla Firefox, choose Clear Recent
History from the Tools menu. In Internet Explorer, choose Delete Browsing History
from the Tools menu.
5.1.6. Overheating
Excessive heat can cause a significant decrease in computer performance. In order to
cool down an overheated computer processor, the first step to take is to try to cool the
environment around the computer. Avoid operating the computer if the case is in an enclosed
space (such as a drawer or cupboard). Also try to cool the room with fans or air-conditioning.
The next step is to verify that all of the fans in the computer case are functioning properly.
Check around the computer vents to see if the spinning of the fans can be observed or if airflow
can be detected. If neither of these steps address the problem, the computer lab manager
could consider installing additional fans or replacing the existing fans with higher quality ones.
Another option is to add more RAM to the computer. Before taking this step, the
computer lab manager would need to find out the answers to the following questions:
How much RAM does the computer already have? (This information is available from
right clicking on My Computer from the Start menu.)
23
What kind of RAM does the computer take? And how much RAM can be added to the
computer? The answers to these questions are going to depend on the number of
memory slots available, and the capacity of the type of RAM that is compatible with the
computer. The best way to find the answers to these questions is via an Internet search
using the brand and model of the computer, “memory” and “upgrade” as search terms,
or by visiting the website for an online RAM sales company (see section 5.7.3). This
should result in the necessary information to make sure that the right kind of memory is
purchased (such as size and type – for example is it SDRAM or DDR2 SDRAM?). It will
also be important to note whether or not the memory needs to be installed in pairs or if
a single strip of RAM will suffice.
Does the computer have enough slots to add in the desired memory? It is possible that
a computer will already have all of the memory slots filled (for example, there are only
two slots and each is already filled with 128 MB RAM strips). In this case, it would not
be possible to upgrade to 512 MB of RAM by adding a single strip of 256 MB RAM. The
lab manager instead would need to purchase two 256 MB strips of RAM, and take out
both of the 128 MB strips.
The actual replacement of RAM will be discussed in section 5.7.3 of this module.
24
It is relatively
common for a computer Tips for Troubleshooting the “Frozen” Computer
to freeze. When a
computer “freezes” it 1. Take a deep breath and wait a minute. You should do this to
might look like help prevent you from panicking, but it also is a good way to see
everything on the if the program can fix itself. Perhaps it was engaged in a task
screen has gone still, or that was using significant memory and just needed extra time.
the computer may no 2. See if some windows or programs are still functioning and active.
longer responding to If so, save any changes in the functioning programs you are
working on and then close those programs. This might free up
the inputs (such as
memory so that the computer can finish whatever task it was
mouse clicks) of the
working on.
user. It is also possible 3. If a program is still frozen, but the computer is functioning in
that a single program other ways, simultaneously press the Ctrl, Alt and Del (Delete)
will freeze while the rest keys. In a Windows computer this brings up a small program
of the computer called the Task Manager, or gives you options including starting
remains functional. the Task Manager. Start the Task Manager and click on the
These problems are not Applications tab. Click on the names of any programs that you
something to panic know are not functioning or say they are “Not Responding”.
over, since often they Then click on End Task. If you are asked to confirm ending the
are not a sign of a major task, do so. Then wait a bit, because it can take some time for
the computer to end the task.
hardware problem but
4. If step 3 doesn’t work, or the entire computer is frozen, the only
instead a sign of a small
step left is to turn off the computer “the wrong way”, by holding
glitch that can be easily down the power button until the computer turns off. This
fixed by restarting a method can be harmful to running programs or open files, so it is
program or the best to be avoided if at all possible. After shutting down in this
computer. The tip box manner, the next time the computer is started it will alert the
here shows some simple user to the fact that the computer was not shut down properly,
steps that the computer and will scan for any files that need to be repaired or recovered
lab manager can follow. due to the improper shut down.
If a computer lab manager doesn’t find the needed answers using Help and Support on
the computer, the next step is to find answers on the Internet. In most cases, the computer
problems that a lab manager encounters will not be new or unique. Someone else would have
had the same problem and would have written a description of how they solved the problem.
It is important that the computer lab manager give very specific search terms and try different
terms if not successful at first. For example, if a lab manager is having problems getting the
sound to work on a specific computer, “sound problems” would not be a specific enough
search. The lab manager would be better trying “sound problem Dell D600” or “sound failure
Dell D600”. If the lab manager knows that the problem is due to the device driver, an even
better search would be “sound device driver problem Dell D600”.
27
It isn’t always easy Tips for Distinguishing Between Hardware Problems and
to know the source of a
Software Problems
computer problem, but
determining whether the 1. Make sure you reduce possible “external” problems before
problem is with hardware proceeding. This means unplug any external devices (such as
or software will help give hard drives, scanners or printers), and remove any floppy, CD or
a computer lab manager DVD disks from their drives.
some direction for action 2. Were there any loud noises or smoke when the problem first
in troubleshooting and appeared? Then it is probably a hardware problem, with the
repair. Some general most likely culprit being the power supply unit.
3. Is the computer entirely dead? Or the screen blank? Or the
guidelines for
screen showing a poor/incomplete picture? These faults are
distinguishing between probably also due to hardware problems.
hardware problems and 4. Does the computer produce a series of beeps? This is a code
software problems are in that can be used to distinguish some hardware problems.
the tip box here, but one 5. Does the system give any error codes or descriptions while
general bit of advice is booting? These can be due to hardware or software problems.
important for all Take careful note of all information given in the error code.
computer 6. Does the computer produce error information after it has booted
troubleshooters: think or only when you open specific programs? These error codes are
about what was probably due to software problems.
happening just before the 7. Have any recent changes been made to hardware or software
(including BIOS settings)? If so, these are likely culprits.
problem occurred. If new
8. Has the computer been exposed to viruses or other malware?
software was just
This could be a cause of software problems.
installed, it is quite likely 9. Use the Device Manager, which can found on many Windows
that the problem is computers (for Windows XP go to StartControl Panel
caused by that new System Device Manager). The Device Manager will list all of
software. If a power the hardware devices installed on a PC. Any device with a
surge occurred, it is problem will have a warning symbol next to it, and double
possible that hardware clicking on that device would give details and suggested
problems were caused by remedies for the problem.
that power surge.
28
Once a computer has been started in Safe Mode, it is possible to access the diagnostic
tools such as Chkdsk (described in section 5.1.4). Other options at this point include running
virus scans, uninstalling suspicious software, or using System Restore (see section 5.6.4).
If a particular piece of software does not have a “Check for Updates” option, the user
will need to go to the website for that software and search there for updates. This can also be
used to search for individual software patches to address the particular problem that the user
has found. It is also possible to do general web searches on a particular software problem and
find patches that have been produced by individuals or organizations other than those that
produced the software. This can result in good fixes, but can also introduce other problems
into a computer system (such as other unforeseen software conflicts or malware). A computer
lab manager should proceed very cautiously down this path, if at all.
29
utility on a Windows computer, go to Start All Programs Accessories System Tools
System Restore.
In order to boot from a disk, the computer user must have a boot disk or recovery disk
for that computer. Boot disks contain only critical startup files, and they are best prepared and
used by experienced computer technicians. They can also be used as a part of the reimaging
process, described below. Recovery disks used to come standard with all new computers. In
recent years, however, the computer manufacturers have instead set up systems for users to
create their own recovery disks when first using a new computer. If a computer lab manager
has recently received new computers, he or she would be wise to create recovery disks before
putting the computers into general use.
30
Before creating an image,
the computer lab manager Tips for Creating a Computer Image
should make sure that the
A computer that is going to serve as an image or clone,
computer is set up “perfectly”
to be used on other computers, should meet the
and free of any malware. Images
following criteria:
are best made when a computer
1. Its make, model and hardware are identical (or
is newly setup, before it has seen
nearly so) to the computers that it is going to be
much use. However the lab
used to clone. It is important that it only be used to
manager should make sure that
reimage computers that have hard drives of the
the computer that is being used
same size or larger.
to create the image has already
2. It is new or has recently had its operating system
been loaded with all the utilities,
and other software reinstalled. This reduces the
productivity software and
chance that it would have any malware or have had
educational materials that are
undesirable changes made to software settings.
commonly used in that computer
Also all of the software should have been recently
lab. The tip box here suggests
updated.
some items. The computer lab
3. It does not contain any personal files or other
manager should also make sure
unnecessary files, folders or software.
that all of the programs have
4. It does include software that is going to be
been updated fully, as discussed
commonly used on the computers that it is going to
in section 5.6.2 of this module.
be used to image. For example it should include:
a. Common utilities such as antivirus software and
Before creating an image,
printer drivers
a computer lab manager needs
b. Productivity software such as Microsoft Office or
to consider two questions: 1.
Open Office
What drive should be used to
c. Educational materials that will be useful locally.
boot the computer from while
This could include touch typing programs,
creating the image and reimaging
encyclopedias, or any locally appropriate
a computer? And 2. What media
educational content.
will be used to store the computer image? The answers to these questions will depend on the
imaging program being used and the limitations of the computer system. When using Clonezilla
Live, for example, the program can be downloaded from the Internet to fit onto a bootable CD
ROM disk. Therefore one option is to boot the computers from the Clonezilla Live CD. The
image that is created then can be easily stored on a flash drive or external hard drive, using the
USB port. For complete instructions on using Clonezilla Live, please see the www.clonezilla.org
website.
Once an image has been created, it can be stored until needed to reimage the computer
it was created from or any other computer with identical hardware. This is very useful for a
computer lab that received a donation of ten identical computers, for example. If using the
image to reimage another computer in a computer lab, however, there are some important
points that the computer lab manager needs to keep in mind. The first is computer identity.
Any cloned computers will have the same name and Security Identification (SID). The computer
31
lab manager should change the name of the computer after reimaging by right clicking on the
Computer (or My Computer)icon or menu item and then selecting Properties. The computer
SID can remain unchanged.
The second important point is that the software license keys will be the same for all
cloned computers. If the computers are running proprietary software, the computer lab
manager needs to be aware of how many computers are permitted to run on a single license. If
a license is only for an individual computer, the computer lab manager will need to buy
additional license keys for the software in question and enter the proper license keys into the
computer.
For cleaning computer parts, a computer lab manager will need some method for
blowing dust out of computer hardware. If an electric blower is available, this is a very good
option. Otherwise a hand operated blower (with a bellows or bladder attached to a narrow
outlet) will do. If affordable, a computer lab manager can also purchase compressed air in
aerosol cans. For dusting and cleaning computer and monitor cases, a lint free cloth is best.
Screens (LCD and CRT) can be cleaned with slightly damp cloths or with small amounts of mild
cleaning solutions that have been reported to be safe for computer monitors. If RAM needs to
be cleaned, isopropyl alcohol and lint free swaps can be used.
There are several safety concerns (both for the lab manager and for the computer
equipment) that need to be attended to. They are listed below.
Working Environment. The computer work room should be clean, well organized and
properly lit. Avoid hazards to the computer (such as dust or moisture) and hazards to
the workers (such as electrical cords that can be tripped over). The lab manager should
also consider good organization as a way to make repair work more efficient. It should
be easy for a worker to return to a project without any difficulty finding the parts
involved.
32
Static Electricity. Static electricity discharges (sparks) can be significantly damaging to
computer equipment such as RAM, CPUs and motherboards. Therefore it is important
for the computer lab
manager to ground him Tips for Avoiding Electrostatic Shocks
or herself before
working with computer 1. Avoid walking around as much as possible while
equipment. The tip box working on a computer. Shuffling your feet
here gives some (particularly on carpeted surfaces) can build up
suggestions. If electrostatic charges.
electrostatic mats or 2. Make sure to ground yourself before beginning a
grounding wrist straps computer repair. The simplest way to do this is to
are available locally, touch a large metal object (such as a filing cabinet
these items can also be or metal computer case).
used to prevent 3. Before picking up each new computer component,
electrostatic shocks. ground yourself again.
Electrical Shock. Before
opening up the case of a computer or any other electronic device or cleaning it with any
fluid, make sure that it is unplugged. Otherwise, electricity can be transmitted through
the electronic device and into the worker’s body. This can cause severe injury or even
death. Laptop batteries should also be removed before performing any laptop
computer repairs. It is best to avoid attempting repairs on computer monitors,
particularly CRT monitors due to a risk of a dangerous electrical discharge.
When developing a repair plan, the computer lab manager needs to know which parts
are going to be replaced and how to find and remove those parts from the computer. It is also
important to have replacement parts on hand that are known to be in good condition.
Part re-seating and part swapping are both good strategies to keep in mind when
repairing computers. Re-seating means removing or disconnecting a part, cleaning it if
appropriate, and correctly replacing the part. Sometimes a computer part can function poorly
just because a connection is loose or dirty, and re-seating will improve its performance. If this
does not solve a problem, a good next step is to try to swap the same part with one from a
33
functioning computer. This can be a useful part of troubleshooting, since it helps the lab
manager identify whether or not that part truly is the source of a computer problem, before a
purchase is made. People who are just learning about computer repair can easily practice this
with peripheral devices. If a desktop computer keyboard appears not to be working, for
example, try replacing it with a keyboard that is known to work properly.
Once it has been determined that a hard drive problem is likely, the computer lab
manager should follow the steps below to replace the hard drive with a known working hard
drive.
1. Disconnect the computer case from electricity and then open the computer case (as
described above).
2. Locate the hard drive. It will likely be found in a metal case or cage near the front of the
computer case, below the other drives. It could be mounted directly on the cage or it
could be mounted on rails that will slide out of the case (see photo).
3. Unscrew the hard drive from the cage or slide the rails out and unscrew the hard drive
from the rails.
4. Remove the long ribbon cable from hard drive. There may have been a small amount of
glue used to hold the ribbon in place that will also need to be removed. Then remove
the smaller power cable. If it is difficult to remove, gently wiggle the connector back
and forth along its long axis as you pull. Note the orientation of the connector (which
end is the red wire on?) to make sure that the new hard drive is connected in the same
manner.
5. If there are two hard drives in a computer, one is called the master and the other the
slave. On older hard drives, an electrical connection needs to be changed to indicate
Figure 4 - Removing a Hard Drive
whether the hard drive is a master or a slave. If the hard drive being installed has not
For the complete procedure see
been used before, it will be correctly set as a master (or also on the acceptable “Cable
Select” setting, used when the ribbon cable has two connectors – one for a master and
one for a slave). If the hard drive has been previously used as a slave, however, it will
need to be changed to a master. To do this, look for a diagram on the hard drive that
shows the pattern for connecting (jumping) two of the eight pins located between the
two cable connectors on the front end of the hard drive. Then using needle nose pliers,
pull off the jumper that is connecting two of the pins and replace it to connect the
proper pair.
6. Connect the cables to the new hard drive. Then screw the hard drive back on to the
rails and slide the rails into position (or screw the hard drive directly to the cage if there
are no rails). Make sure that all of the other ribbons and cables are as they were found.
Close the case and the repair is complete. Note that if any new noises or problems
appear after the installation, it is possible that another device or cable was disrupted
during the repair and needs to be reattached or reseated.
Replacing a Hard Drive for a Laptop Computer. Hard drives for many laptop computers
can be replaced quite easily because the manufacturers have made the hard drives accessible
from hatches on the underside of the computer. To replace the hard drive on a laptop with an
accessible hard drive follow the steps below:
35
1. Remove the laptop battery before making this (or any other) laptop repair. This is
important in order to avoid electricity from the battery flowing through the computer
during repair, which could be damaging to computer components. The technique for
removing the battery depends on the make and model of the laptop, but often involves
unlocking the battery at one or two points (on the underside of the computer) and then
sliding it out.
2. With the laptop resting upside down on a table, find the hard drive compartment and
unscrew the screw or screws holding the lid in place. Remove the lid and examine how
the hard drive is attached to the computer. Most likely you will see that the hard drive
is attached to a cage or brackets that will slide out with the hard drive (see photo).
3. Slide out the assembly containing the hard drive in its cage or brackets. You may have
to push the assembly in or lift it up first in order to clear anything else used to hold the
assembly in place.
4. Remove any screws attaching the laptop to its cage/brackets, remove the damaged hard
drive, replace it with a functioning laptop hard drive and then retighten all screws.
5. Slide the assembly back into the laptop and secure it as it was previously. Make sure
that you push hard enough to reattach the hard
Figure 5 -drive to the
A Laptop Hardpower
Drive inand data
its "Cage"
connectors. Push horizontally (or as closeForasthepossible to horizontally)
complete procedure see when
reconnecting.
6. Close the hard drive compartment and replace all screws. Then replace the laptop
battery, turn the computer over and restart it.
Replacing RAM. As discussed in section 5.1.7, a lab manager may want to add RAM to
speed up a slow computer. RAM also can fail or come loose from its housing and need to be
reseated. If a lab manager has decided that a computer needs new or additional RAM, it is
important to make sure that the RAM used is compatible with the computer system. There are
several online RAM sales companies that will identify the appropriate RAM if a user inputs the
computer make and model. Two example companies are Corsair (www.corsairmemory.com)
and Crucial (www.crucial.com). Once the RAM has been obtained, the lab manager should
follow the steps below to replace the RAM. Please Note: RAM is very easily damaged by
electrostatic charges, so it is very important for the user to be grounded before picking up RAM.
Also RAM should only be handled by the edges.
1. Open the computer case as previously described. Find the RAM slots (long parallel
connectors). Note which slots are occupied and if the slots are numbered (at the ends).
If the slots are not numbered, the slots closest to the processor are probably the lower
numbered slots and should be filled first.
2. Simultaneously push down and out on both retaining clips (on each end) of a RAM slot
to remove the old RAM. Note the orientation of the RAM so that the replacement RAM
can be put in facing the same direction. There should be some notches on the bottom
edge of the RAM that can be used as a guide.
3. Gently place the new RAM in the socket and press down firmly on the top of the RAM at
both ends (see photo). When the RAM module is correctly seated, the retaining clips
will automatically close.
36
4. Close the computer case as previously described.
Replacing Laptop RAM. Laptop computers have a compartment on the back side
designed for accessing RAM. When the screws for this compartment are removed (but don’t
forget to remove the laptop battery first for safety reasons!), the RAM should be visible. For
some laptops, however, only the slot for expansion (extra) RAM is visible. In these cases the
rest of the RAM is can be accessed by removing the keyboard, a more difficult task (discussed
below). Laptop RAM rests horizontally, with the slot on one end. To install RAM, hold the RAM
by its edges, and bring it up towards its slot at about a 30 degree angle (see photo). Then
gently push the RAM in while flattening out the angle.
Other Laptop Repairs. It is possible to replace the keyboard, individual keys or the
screen on a laptop with only a moderate amount of difficulty. The challenge, however, is that
every different model of laptop requires a different method for accessing and removing these
parts. Either a lab manager should watch other people do these repairs and learn from them,
or find information on the Internet for the specific desired repair. Specific searches should
result in detailed diagrams, descriptions or videos. For example, if someone wanted to replace
a key on a Dell laptop, the search terms “replacing laptop keys Dell” will yield useful results.
Similarly, if someone wanted to replace the entire keyboard on a Toshiba laptop, the search
terms “replacing laptop keyboard Toshiba” will suffice. In general when performing laptop
repairs, the computer lab manager should rememberFigure 7these guiding
- Replacing principles:
Laptop RAM
1. Always remove the battery first for safetyForreasons.
the complete procedure see
2. Keep note of what screws are removed and in what order. Also keep track of the actual
screws!
3. When taking a laptop apart, be slow and mindful of the process. This will make it easier
to put the computer back together afterwards. For complicated repairs, consider
keeping notes of the steps performed.
37
5.9. Tips for
M Troubleshooting Printer Problems
a
1. Try restarting the printer (by turning it on and off at the switch) and the computer (using the
n
standard restart technique).
a 2. Make sure that the computer is sending the document to the right printer by checking the
g printer name in the dialog box that comes up when printing a document. To change the
i default printer (on a Windows computer) choose the Printer window in the Control Panel. If
the printer you are using is not listed, you will need to add that printer and install the drivers
n for that printer. Printer drivers are usually available online by going to the website for the
g printer manufacturer and searching for the drivers for the particular printer model.
3. Try to print a test page for the printer. If you are using MS Windows, open the Printer
E window in the Control Panel, right click on the icon for the printer you are using, choose
Properties and then select “Print Test Page”. If the test page prints successfully, the
- problem is with the application (productivity software) you are using and not the printer.
W4. If the printer does not successfully print as above, note what happens. Does it start to print
a and then stop? Does it make unusual noises? These are signs of a paper jam or a hardware
s problem. Open up the top of the printer and look for any jammed paper.
5. Does the printer print faintly or with only some colors? This is a sign that the ink cartridges
t need to be primed or that the printer is running out of ink. Look at the printer’s instruction
e book or use the menu and buttons on the printer to figure out how to prime the printer.
I
n concluding this module, it is important to recognize that not all computer problems can or
should be fixed. Sometimes computers become too old or obsolete to make the effort of
repairing them worthwhile, and some repairs (such as repairs to CRT computer monitors) are
not advisable except by experts. Due to these realities, computer labs often have a collection
of old and broken computers and peripheral equipment that develops and increases over the
years. This equipment is collectively known as electronic waste or e-waste. In many developing
countries e-waste is a problem because the equipment can contain hazardous materials and
there often are not recycling or waste facilities that are capable of managing these hazardous
materials properly.
The first step in managing e-waste is to try to reduce the amount of it that is produced
by a computer lab. A lab manager can do this by avoiding accepting donations of equipment
that is already very old or obsolete, since this equipment will not remain useful for long. A lab
manager can also make sure that existing equipment is maintained well so that it remains
useful for a longer period of time. The computer lab manager should also work with any
organizations donating computers to discuss the e-waste problem and strategize how the
computers will be disposed of properly when they are no longer useful.
Options for proper disposal of e-waste will vary from country to country. In some
countries there will be private companies that collect e-waste, and in others there will be
government projects for e-waste disposal. Larger non-profit organizations that donate used
computer equipment often have plans for collecting and managing e-waste. If no e-waste
38
options exist in a particular country, several computer projects could team together to ship a
container of e-waste to an e-waste facility in a neighboring country. One e-waste management
facility that accepts shipments is Desco Electronic Recyclers in South Africa (www.desco.co.za).
5.10. Assignments/Activities
5.10.1. Compare the start up speed between two computers, by actually starting them both up
and noting the time it takes for the desktop to be fully loaded. Then compare the factors
that can control the start up time for each computer. Which computer has more programs
that load on start up (see section 5.1.3)? Which computer has more RAM? What is the
processor speed of each computer? What operating system does each computer use?
Summarize your findings.
5.10.2. Update the operating system and productivity (office) software for a computer.
Describe the process you used in each case.
5.10.3. Practice running a disk defragmenter and disk cleanup program on a computer. Note
any change in performance from before and after defragmentation.
5.10.4. Practice finding help and support on a computer use or troubleshooting topic, both on a
computer and online. Choose a computer topic of interest to you. If you do not have a
topic in mind, here are some examples: installing a printer, changing the size of desktop
icons, using a text reader (text to voice tool), or taking a screen shot (a picture of what is on
your desktop screen). Remember to be as specific as possible in your word choice. If at first
you are not successful, try other related words.
5.10.5. Practice using diagnostic tools on a computer. For computers running Windows
operating systems, try Chkdsk (described in section 5.1.4) and the Device Manager
(described in section 5.5).
5.10.6. Investigate a laptop computer. Figure out how to replace and remove the battery. Also
identify all ports and the access panels for the hard drive and memory.
5.10.7. Observe a computer repair technician in action. Notice what techniques he or she uses
to avoid electrostatic shocks and to clean computer components. Observe at least one
software repair and one hardware repair from start to finish. Take notes on these
procedures for future use.
5.10.8. Practice properly uninstalling and reinstalling a software program. Choose something
that you have a current installer file for.
5.10.9. Practice starting a computer in Safe Mode. Take note of which features of your
computer function in Safe Mode and which have been disabled.
5.10.10. Workshop Activity: As a team, set up a computer “perfectly” so that it is ready to
produce an image or clone. Then participate in the process of preparing an image and using
it to reimage another computer.
5.10.11. Workshop Activity: Practice troubleshooting malfunctioning computers. The
instructor may intentionally produce malfunctions in computers in order to provide you
with practice
5.10.12. Workshop Activity: Replace the hard drive in a desk top computer.
5.10.13. Workshop Activity: Take apart a laptop computer, including accessing all RAM,
the keyboard and screen. Then put the laptop back together!
39
Table of Contents
6. Overall Assignments/Activities
6.1. Revisit and reflect on your own skill level after having completed this module:
6.1.1. What skills do you still feel you need in the categories covered by this module? Make a
plan for gaining those skills and (if appropriate) discuss the plan with your supervisor.
6.1.2. What skills do you still feel you need in the self-study areas (English reading/writing,
touch typing and computer user skills) presented at the beginning of this module? Make a
plan for gaining those skills and (if appropriate) discuss it with your supervisor.
6.1.3. Consider the topics covered in Modules 2, 3, and 4 of this course (as described in the
introduction to this module). Do you think that taking those courses (or studying the
learning materials for those courses independently) will help you meet your career goals?
Discuss this with your instructor and your supervisor (if appropriate) and consider your next
steps.
6.2. If you work in a project that uses Microsoft or other types of proprietary software,
consider making a shift over to an entirely open source environment. What would the benefits
and drawbacks of such a shift be? Make a list of all the FOSS software you would need,
including the names of specific programs if possible. Also what training would need to occur if
you made this switch?
6.3. Workshop Activity: Participate in a team project to overhaul an old computer. Clean
the components, add RAM to the computer, install an appropriate operating system and install
all other necessary software.
6.4. Workshop Activity: Participate in a workshop evaluation process.
Table of Contents
The table below provides a list of the Internet resources previously mentioned in this
document. The resources are listed in the order they appeared in this module.
40
Good Typing www.goodtyping.com
European/International Computer Driving License www.icdl.org
Busuu.com (language training) www.busuu.com
English Online http://www.english-online.org.uk/course.htm
Goodwill Community Foundation (free courses) www.gcflearnfree.org
BBC World Service Learning English www.bbc.co.uk/worldservice/learningenglish/
Activities for ESL Students http://a4esl.org
UsingEnglish.com www.usingenglish.com
EnglishLearner.com www.englishlearner.com
EnglishCafe.com www.englishcafe.com
Source Forge www.sourceforge.net
Official Ubuntu Documentation http://help.ubuntu.com
Microsoft Downloads www.microsoft.com/downloads
AVG Free Antivirus http://free.avg.com
Avast Antivirus www.avast.com
Malwarebytes’ Anti-Malware www.malwarebytes.org
Microsoft Community MAR Program www.microsoft.com/communitymar
CNET Download.com www.download.com
Symantec Ghost www.ghost.com
Clonezilla www.clonezilla.org
Foner Books – Replacing PC Parts www.fonerbooks.com/replace.htm
Corsair Memory www.corsairmemory.com
Crucial (computer memory) www.crucial.com
Desco Electronic Recyclers www.desco.co.za
Table of Contents
8. Bibliography
Bit. (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26, 2010, from:
http://en.wikipedia.org/w/index.php?title=Bit&oldid=339499368
Blue Screen of Death (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26, 2010, from:
http://en.wikipedia.org/w/index.php?title=Blue_Screen_of_Death&oldid=336735006
41
Computer. (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26, 2010, from:
http://en.wikipedia.org/w/index.php?title=Computer&oldid=339667990
Computer Ports (Hardware). (2010). In Wikipedia, The Free Encyclopedia. Retrieved January 26, 2010,
from: http://en.wikipedia.org/w/index.php?title=Computer_port_(hardware)&oldid=338140393
Computers for Zambian Schools. (2008). Basic Computer Maintenance and Troubleshooting. Lusaka,
Zambia.
PCTechBytes. (2009). Computer Troubleshooting Zone. Retrieved January 26, 2010, from PCTechBytes:
http://www.pctechbytes.com/troubleshooting/
Rosenthal, M. (2009). Replacing Laptop Hard Drives. Retrieved January 26, 2010, from Foner Books:
http://www.fonerbooks.com/laptop_1.htm
Rosenthal, M. (2009). Upgrading Laptop Memory. Retrieved January 26, 2010, from Foner Books:
http://www.fonerbooks.com/laptop_2.htm
Yarnold, S. (2008). Upgrading and Fixing a PC, Second Edition. Warwickshire, United Kingdom: In Easy
Steps Limited.
Table of Contents
There are many challenges for schools and community organizations in Zambia to consider when
starting or maintaining computer projects. Sourcing good quality computers is just the beginning. The
organizations also need to consider infrastructure issues, staff training, computer education curricula,
and internet connectivity. Zambia Pacific Trust (ZPT) helps institutions address these challenges
through advice, training, and a cost-sharing grant process. ZPT currently works with five schools in the
Lusaka area, but has plans to add other organizations in the future. For more information please
contact [email protected].
Heidi Neff is a former high school science teacher with 15 years of experience in the classroom. While
teaching in Seattle, Washington, she used computers extensively as a part of her curriculum. She also
assisted with computer training in Zambian schools as a part of the Seattle Academy Zambia Program.
42
Ms. Neff starting working with ZPT in 2006, assisting their efforts to support school computer projects
in Zambia. She is currently a consultant specializing in IT in Education. For more information please
contact her at [email protected].
43