0% found this document useful (0 votes)
16 views28 pages

LO1 and LO2

Uploaded by

bitaniyaabebe10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views28 pages

LO1 and LO2

Uploaded by

bitaniyaabebe10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 28

ADAMA POLYTECHNIC COLLEGE

INFORMATION
TECHNOLOGY SUPPORT
SERVICE
Level II

Information Sheet
Unit of Competence: Care for Network and Computer
Hardware

LO1: Identify computer hardware components

Date: 9-2012 Page 1 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
LO1- Introduction to computer
Instruction hardware

Information Sheet – 1 Internal and External hardware peripherals

Overview of Internal and External hardware peripherals

Hardware

Computer hardware refers to the physical parts of a computer and related devices. Internal hardware
devices include motherboards, hard drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners etc.

The internal hardware parts of a computer are often referred to as components, while external
hardware devices are usually called peripherals. Together, they all fall under the category of
computer hardware. Software, on the other hand, consists of the programs and applications that run
on computers. Because software runs on computer hardware, software programs often have system
requirements that list the minimum hardware required for the software to run.

Note: Peripheral devices are the devices that are attached to the computer’s system unit

1. Internal hardware peripherals

Introduction

Computer Hardware is the physical part of a computer, as distinguished from the computer software
that executes or runs on the hardware. The hardware of a computer is infrequently changed, while
software and data are modified frequently. The term soft refers to readily created, modified, or erased.
These are unlike the physical components within the computer which are hard.

Date: 9-2012 Page 2 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Inside Computer

The motherboard is the body or mainframe of the computer,


through which all other components interface. It is the central
circuit board making up a complex electronic system. A
motherboard provides the electrical connections by which the
other components of the system communicate. The mother
board includes many components such as: central processing
unit (CPU), random access memory (RAM), firmware, and
internal and external buses.

Central Processing Unit¶

The Central Processing Unit (CPU; sometimes just called processor) is a machine that can execute
computer programs. It is sometimes referred to as the brain of the computer.

Date: 9-2012 Page 3 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Power supply

Inside a custom-built computer: the power supply at the bottom has its own cooling fan.

A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power
for the internal components of the computer.

Removable media devices

Date: 9-2012 Page 4 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
CD (compact disc)

The most common type of removable media, suitable for music


and data.

o CD-ROM Drive - a device used for reading data from a


CD.
o CD Writer - a device used for both reading and writing
data to and from a CD.

DVD (digital versatile disc)

A popular type of removable media that is the same dimensions


as a CD but stores up to 12 times as much information. It is the
most common way of transferring digital video, and is popular for
data storage.

o DVD-ROM Drive - a device used for reading data from a


DVD.
o DVD Writer - a device used for both reading and writing
data to and from a DVD.

o DVD-RAM Drive - a device used for rapid writing and


reading of data from a special type of DVD.
Blu-ray Disc

a high-density optical disc format for data and high-definition


video. Can store 70 times as much information as a CD.

o BD-ROM Drive - a device used for reading data from a


Blu-ray disc.
o BD Writer - a device used for both reading and writing
data to and from a Blu-ray disc.

Date: 9-2012 Page 5 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
HD DVD (short for High-Definition/Density DVD)

Is a discontinued high-density optical disc format for storing data and


high-definition video. Supported principally by Toshiba.

Floppy disk

an outdated storage device consisting of a thin disk of a flexible


magnetic storage medium. Floppies are used today mainly for loading
device drivers not included with an operating system release.

Secondary storage
Hardware that keeps data inside the computer for later use and remains persistent even when the computer has
no power.

A hard disk drive (HDD

also hard drive or hard disk)[2] is a non-volatile,


random access digital magnetic data storage
device. It features rotating rigid platters on a
motor-driven spindle within a protective
enclosure. Data is magnetically read from and
written to the platter by read/write heads that float
on a film of air above the platters. Introduced by
IBM in 1956, hard disk drives have decreased in
cost and physical size over the years while
dramatically increasing in capacity.

Hard disk drives have been the dominant device


for secondary storage of data in general purpose
computers since the early 1960s.[3] They have
maintained this position because advances in
their recording density have kept pace with the
requirements for secondary storage.[3] Today's

Date: 9-2012 Page 6 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
HDDs operate on high-speed serial interfaces;
i.e., serial ATA (SATA) or serial attached SCSI
(SAS).

Sound card

Enables the computer to output sound to audio


devices, as well as accept input from a
microphone. Most modern computers have sound
cards built-in to the motherboard, though it is
common for a user to install a separate sound
card as an upgrade. Most sound cards, either
built-in or added, have surround sound
capabilities.

2. External hardware peripherals


Examples of External hardware peripheral devices include:

Monitor
A monitor, also known as a visual display unit (VDU) or screen, is like
a television screen. It is measured diagonally in inches — the distance
from one corner of the screen area to the opposite corner. The quality
of a monitor is determined by its resolution. Resolution is calculated
based on the number of pixels, which are individual dots that create
the images you see on your monitor. Flat panel monitors are now
becoming a popular choice due to their portability and compactness.

Keyboard
A combination of a typewriter keyboard and numeric keypad,
a keyboard enables you to enter data into a computer.
Computer keyboards are similar to electric typewriter
keyboards but include additional keys.

Date: 9-2012 Page 7 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Mouse
A mouse is a device that controls the movement of the cursor on a
screen. A mouse is a small object you can roll along a flat surface, to help
you navigate your computer. Mice also have a variety of buttons, which
can have different purposes depending on what program is running.
There is usually a left mouse button (which is used to select an object and
perform an action), right mouse button (which typically displays a shortcut
menu of options) and a scroll wheel (to help a user scroll through
documents).

Printers

A printer is a device that allows you to obtain hard copies of the data you have created on your
computer system. Printers are classified by:
1 their quality
2 the speed of printing — pages per minute
3 the print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better. There are
different types of printers due to the different methods of transferring ink to paper. Two common types
for the home and office are inkjet and laser.

Inkjet printer — sprays ink onto a sheet of paper, and can


produce high-quality text and photo images.

Laser printer — produces very high quality text and graphics,


using a process similar to a photocopier to produce print. It
creates dot-like images on a drum, using a laser beam light
source.

Date: 9-2012 Page 8 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Scanner
A scanner is a device that captures text or illustrations on paper and
converts the information into a form the computer can use. One of the
most common kinds of scanners is called a flatbed scanner. It has a glass
surface on which you lay paper, magazines, or other documents that you
want to scan. Sometimes scanners can be manufactured so that they are
combined with a printer thus can also be used as a photocopier and fax
machine.

USB flash drive


A small, portable device that plugs into a computer’s USB port and
operates as a portable hard drive. USB flash drives are considered to be
an ideal method to transport data, as they are small enough to be carried in
a pocket and can plug into any computer with a USB drive. Other names
for flash drives are thumb drives, pen drives or USB drives.

Web cam
Web cams are small cameras that plug into your computer which allow the
user to share a moving image of themselves with others on other computers
through the Internet.

Digital camera

Digital cameras store images digitally onto a storage device, either a memory card or a floppy disk,
rather than recording them on film. Once a picture has been taken, it can be downloaded to a
computer system, and then manipulated or printed.

Date: 9-2012 Page 9 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Self Check 1 Written Test

Name:____________________ Date:_________________

Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.

Match the most appropriate peripheral device to A column from B column.

Column A Column B
1. Mouse A. Internal hardware peripherals
2. Speakers B. External hardware peripherals
3. Keyboard
4. Web cam
5. Monitor
6. Power supply
7. Digital Camera
8. Data projectors
9. External modems
10. Printers
11. Microphones
12. Mother board
13. CPU
14. Power supply
15. Storage Device Drives
16. Removable Medias

Date: 9-2012 Page 10 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Hardware requirements with specified manufacturers
Information Sheet – 2

Determine any requirements as specified by the hardware manufacturer

If the manufacturer produces substances that may be deemed hazardous, then additional obligations
apply. There are documents known as Material Safety Data Sheets or MSDS. A MSDS should be
prepared by the manufacturer and include information on the recommended use of a substance, its
physical and chemical properties, relevant health hazard information and information concerning the
precautions to be followed in relation to the safe use and handling of the substance.
In a more general context, with virtually all equipment produced, the manufacturer is required to
provide relevant safety information. This information is often provided as part of the user
instruction/manual for safe operation. The following is a typical set of Safety Instructions for a
combined Printer/Scanner/Copier.

Example: Safety instructions

Read all of the instructions on this section when setting up and using the product.

When choosing a place for the product

Avoid places subject to rapid changes in temperature and humidity. Also, keep the product away from
direct sunlight strong light and heat sources.
Avoid places subject to dust, shocks and vibrations
Leave enough room around the product to allow for sufficient ventilation.
Place the product near a wall outlet where the plug can be easily unplugged.
Place the product on a flat, stable surface that extends beyond this product base in all directions. If
you place the product near the wall, leave more than 10cm between the back of the product and the
wall. The product will not operate properly if it is tilted at an angle.
When storing or transporting the product, do not tilt it, stand it on its side, or turn it upside down;
otherwise, ink my leak from the cartridge.
Leave more than 22cm between the base of the product and the edge of the surface on which it is
placed; otherwise, the product may fall if tipped forward possibly causing injury.

When choosing a power source

Date: 9-2012 Page 11 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Use only the type of power source indicated on the label on the back of the product.
Be sure your AC power cord meets the relevant local safety standards.
Do not use a damaged or frayed power cord.

When handling ink cartridges

Do not open the ink cartridge packages until just before you install them.
Do not shake used ink cartridges; this can cause leakage.
Keep ink cartridges out of the reach of children. Do not allow children to drink from or otherwise
handle the cartridges.
Be careful when you handle used ink cartridges as there may be some ink remaining around the ink
supply port. If ink gets on your skin, wash the area thoroughly with soap and water. If ink gets into
your eyes, flush them immediately with water. If discomfort or vision problems remain after a thorough
flushing, see a doctor immediately.
Do not touch the circuitry that is located on the back of the cartridge.
Do not remove or tear the label on the cartridge; this can cause leakage.
Store each ink cartridge so that the bottom of its packaging faces down.

When using the product

Do not put your hand inside the product or touch the ink cartridges during printing.
Do not block or cover the openings on the product.
Do not attempt to service the product yourself.
Unplug the product and refer servicing to qualified service personnel under the following conditions:
 The power cord or plug is damaged.
 Liquid has entered the product.
 The product has been dropped or the cover damaged.
 The product does not operate normally or exhibits a distinct change in performance.
Do not insert objects into the slots on the product.
Take care not to spill liquid on the product.
Leave the ink cartridges installed. Removing the cartridges can dehydrated the print head and may
prevent the product from printing.

If the product has a LCD panel

Use only a dry, soft cloth to clean the display. Do not use liquid or chemical cleansers.
If the display on the product is damaged, contact your dealer.
Date: 9-2012 Page 12 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
If the liquid crystal solution contained in the LCD panel leaks out and gets on your hands, wash them
thoroughly with soap and water, if the liquid crystal solution gets into you eyes, flush them
immediately with water, if discomfort or vision problems remain after a though flushing, see a doctor
immediately.

LO2- Establish location requirements for hardware and peripherals


Establishing location requirements
Information Sheet – 1

Establish location requirements


Environmental considerations
Computer hardware is designed for operation within a set range of environmental conditions, and
operation of computer hardware outside these conditions will damage the hardware or reduce the
working life of the hardware.

The manufacturer’s recommendations for operating a specific computer hardware device will be
found in the user manual or specifications.

Temperature

The ambient temperature of the environment is the temperature at which computer hardware should
be maintained and should fall within the recommended range. If the temperature exceeds the upper
limit of this range, the life of the electronic components will be shortened, and the reliability of the
device decreased. The optimum temperature range for computer hardware is usually from 15 to 24
deg C.

To maintain the ambient temperature within an acceptable range, the room containing the computer
hardware is often air conditioned. Air conditioning will also maintain the relative humidity levels in the
room, and also improve the air quality by filtering out dust particles.

Humidity and moisture

If the relative humidity where computer hardware devices are operated is too high, problems can
occur through water condensation. If the relative humidity is too low, the devices are much more
susceptible to electrostatic discharge.

Computer hardware devices should be located away from sources of moisture such as open
windows. Eating and drinking should not be allowed anywhere near a computer hardware device.
Date: 9-2012 Page 13 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Dust

As discussed above, it is important hardware devices operate within a set temperature range. Over
time fans and ventilation vents become clogged with dust reducing their cooling efficiency. If the
hardware device is to be operated in a dusty area such as an industrial environment, the device will
need to be cleaned more frequently than a device in an office environment. Shields and housings are
available to reduce the intake of dust in a dusty environment.

Physical security

Physical security refers to making sure only authorized people have physical access to computer
hardware. Examples of physical security include:

 Servers located in a server room secured with locks, key cards or keypad access.
 Workstations protected by a key lock on the system case and/or a cable lock between the
system case and the desk.

Electrical system protection devices


The correct operation of computer hardware devices is dependent on a continuous supply of
electrical power within set conditions. If the electrical supply is outside those conditions, the operation
of computer hardware can be adversely affected.

Electrical problems

Common electrical problems are listed below:

Blackout – total loss of electrical power. Hardware devices will not operate.

Brownout – the electrical power is delivered below the set conditions for the computer hardware.
Computer hardware may turn off without notice or may not operate.

Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a
short period of time. Surges and spikes commonly occur when there is lightning. Computer hardware
(and other electronic equipment) may be damaged.

Electrical noise – the electrical power is delivered with additional electrical signals which may affect
the correct operation of computer hardware. One source of electrical noise is electrical machinery
such as welders.

Protection devices

To provide protection for computer hardware devices from electrical problems, the following devices
can be installed.

Surge protectors – a device designed to protect against electrical surges and spikes. It provides no
protection against blackouts or brownouts.
Date: 9-2012 Page 14 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts. A UPS
provides power automatically during a blackout and is designed to provide battery power for a
relatively short period of time – around ten to twenty minutes. This provides time to save all data and
shut down the computer correctly.

Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.

Generators – where an organization requires the computer hardware to be powered for an extended
length of time, a generator may be installed in addition to a UPS. This is a relatively costly option and
would be considered where the operation of the computer hardware is considered critical to the
organization.

Maintenance and testing

These devices should be regularly tested and maintained to ensure they will function correctly in the
event of an electrical problem. Refer to the user manual for the device.

System protection
Once the hardware device is installed, the device (and data stored on it) can be further protected by
the following system protection measures.

User accounts

Users should be given individual user accounts with enough rights and permissions to be able to
perform their work duties and no more.
For example, users in a Microsoft Windows environment may be a standard user or an administrator.
Administrators can change security settings, install software and hardware, and access all files on the
computer. Administrators can also make changes to other user accounts. Standard users have
limited access.

Access control lists

An Access Control List (ACL) is a list of permissions for objects such as files or folders. This list tells
the computer operating system which access rights each user has to the file or folder. Depending on
the operating system, these access rights include:

 Read – users can open a folder, list the files in the folder, open a file and view the contents
 Write – as for Read and in addition users can create new files and modify existing files
 Full – users have all rights
 Execute – users can execute (run) files if they are scripts or program files

Users should only be given enough rights to files and folders that are necessary for them to be able to
perform their work duties and no more.
Date: 9-2012 Page 15 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Antivirus software
Antivirus software should be installed and the software and virus definitions should be regularly
updated. Computers with an internet connection can be set up to download these updates
automatically.

Firewalls

A firewall is a hardware or software device designed to block unauthorised access to or from a private
computer network.

Data backup

To protect against data loss, it is important that a data backup and recovery plan is developed and
implemented. The backup plan can protect against accidental loss of user data, database corruption,
hardware failures and natural disasters. Typically two copies of the backup are made. One copy is
stored on-site and the other copy is stored off-site to protect against a disaster such as a fire
happening at the site.

Software updates

Updates for operating systems and application software are regularly released by the manufacturers
to update features or fix problems with the software. The most recent versions of operating systems
have built-in facilities which automate the process of checking for updates.

Redundancy

Redundancy helps protect an information system against the failure of a hardware device. A
secondary hardware device is installed and this secondary hardware device will take over the function
of the primary device if it fails.

An example of redundancy is the use of Redundant Array of Independent (or Inexpensive) Disks,
commonly known as RAID.

Maintain computer hardware


It is important that computer hardware devices are regularly maintained. Computer maintenance can
be loosely classified as one of two types.

Preventive maintenance is maintenance which is carried out, usually at regular intervals, to prevent
equipment failures or the slowing of a service.
Date: 9-2012 Page 16 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Corrective maintenance is maintenance which is carried out to correct a failure which has occurred.

Preventive maintenance
Cleaning materials

One of the main preventive maintenance tasks for computer hardware devices is cleaning to remove
dust and debris build up.
Computer cleaning supplies in a cleaning kit should include:

 a lint-free cloth
 Ammonia-free glass cleaner. (Products with ammonia are suitable for CRT monitors which
have a glass screen but are not suitable for LCD monitors).
 a small brush for cleaning dust
 a can of compressed air for blowing away dust
 antistatic wrist strap for use when working inside a computer case
 mild detergent

There are also specialised computer cleaning kits available. For information about the different types
of kits available use the internet to search for “computer cleaning kit”.

Cleaning

Devices which need regular cleaning include:

 keyboard
 mouse
 monitor
 optical drives
 printers

Computer hard drives are sealed devices and the hard drive assembly is designed to exclude dust
particles. They do not require any cleaning.

For all devices refer to the user manual for any specific manufacturer’s cleaning instructions.

Read the instructions on any specialized computer cleaning kits before use.

Hard drive maintenance

Hard drive maintenance tasks include:

Uninstall unwanted programs - For a Windows computer use Add/Remove Programs.

Remove unused files - For a Windows computer use Disk Cleanup. This utility searches for
unnecessary files such as Temporary Internet files and the Recycle bin and then deletes them.

Date: 9-2012 Page 17 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Check for disk errors - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Check Now
button in the Error-checking frame.

Defrag the hard drive - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Defrayment Now
button in the Defragmentation frame.

Installing additional memory

One of the most cost effective upgrades which can be made to a computer is to install additional
memory (RAM). Consult your computer user manual to determine the correct RAM type for your
computer.

1. The computer should be on a flat location, clear of clutter.


2. Turn off the computer.
3. At the power point, turn off the switch and unplug the power cord.
4. Disconnect and remove peripheral devices.
5. Remove the computer cover.
6. Put the antistatic wrist strap on your wrist and connect the alligator clip to a metallic surface on
the computer case.
7. Hold the RAM module by the edges at each end, being careful not to touch the gold electrical
contacts on the bottom edge.
8. Align the notches in the memory module with the memory slot, and press down firmly at both
ends of the modules until the module is locked in.
9. Replace the computer cover.
10. Connect peripheral devices.
11. Turn power on at the power point.
12. Boot the computer.
13. Use an operating system utility to check that the new memory has been recognised. For a
windows computer use System Information.

Date: 9-2012 Page 18 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Figure 1 – Adding additional memory

Corrective maintenance
Corrective maintenance is performed when a component or system is not working as expected.
Possible causes include:

 hardware faults
 software faults and issues
 user error

Before proceeding with any maintenance, it is important you are aware of the conditions of any
warranty or service level agreements. With hardware devices you may void the warranty if you
attempt to replace internal hardware components.

Troubleshooting

Identify the possible cause of the problem


Ask questions to help you identify the possible cause. Questions to ask include:

 What are the symptoms?


 Are there any error messages or error tones? Some devices may report the fault and the
action to take.
 Has any new software or hardware been added recently?

Date: 9-2012 Page 19 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Basic checks
some basic checks to perform first include:

 Is the device powered on – check power point is on and power leads are securely seated. If
the device has a power indicator, check it is on.
 Check that signal cables are securely seated.
 If the device is networked, check that the network cable is securely seated.

Hardware faults
If you suspect the problem is with a faulty hardware component, the most common method of testing
is to replace the component with a known good component.

Diagnostic tools

There is a range of diagnostic tools which can aid in troubleshooting. One of the best “tools” is a good
understanding of the processes which occur within a computer system, particularly the boot process
from turning the power switch on, to loading the operating system and software applications.

Power On Self Test (POST)


During POST, the BIOS performs testing of hardware components. If a device is faulty an error
message may be displayed. At this stage you can also check the computer’s BIOS settings to see if
the settings are the cause of the problem.

Operating system diagnostics


Once the operating system is loaded, it will also perform its own hardware test and load device
drivers for peripheral devices. If you are using a Windows operating system, Device Manager reports
on devices connected and their status.

Date: 9-2012 Page 20 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Select computer hardware
When considering the purchase of computer hardware, it is important to firstly identify the needs of
the business. Once the business requirements have been identified, the technical specifications for
the computer hardware device can be used to compare different products.

Business requirements

When selecting computer hardware it is important to firstly identify the tasks the computer hardware is
required to perform. For example, a workstation required for video editing will have different
requirements to a workstation required for standard office applications, such as word processing.
Another example is a server - the processing power and storage capacity of the server will be
determined by the number of users it is required to service.

Warranty

When computer hardware devices are purchased, the supplier provides a guarantee that if a fault
develops in the equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business
needs will be met. Common warranty conditions include:

 The length of the warranty – typically one or more years.


 The actions needed to have the repairs undertaken. Either the repairs will be done on-site or
the equipment will need to be returned to the supplier, known as return-to-base.
 How long the supplier has to make good any required repairs
 Any exclusions to the warranty, such as damage caused to hardware by accidental damage.

Many computer hardware suppliers offer extended warranties at additional cost. For example, the
extended warranty may extend the period of cover from one year to three years. The level of service
purchased by an organisation will depend on how critical the device is to the IT system.

A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.

Organizational policies

Some organizations have a policy of using preferred suppliers for computer hardware purchases.
This ensures the quality and consistency of computer hardware devices is maintained throughout an
organization.

A standard operating environment is a specification for computer hardware and software which
organizations develop to maintain consistency and reduce support costs. Many organizations such
as universities, publish their standard operating environment policies on the internet. For an example,
visit the Edith Cowan University Standard Operating Environment website

Total cost of ownership

Date: 9-2012 Page 21 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
The initial purchase price of a computer hardware device is only part of the total cost of the device,
over the lifetime of the device. Additional costs will include:

 costs of hardware and software upgrades


 costs of consumables. For devices such as printers, the cost of replacement print cartridges
over the lifetime of the device can often be greater than the initial purchase price.
 maintenance costs
 cost of technical support
 cost of training

Support

Technical support is provided by manufacturers for users after the purchase of a computer hardware
device. Access to this support is commonly limited to users who have registered the purchase of the
product. Forms of technical support include:

 telephone support
 email support (usually with a guaranteed response time)
 access to support on internet such as:
o frequently asked questions (FAQs)
o troubleshooting guide
o downloads of latest drivers and software updates

Compatibility

Compatibility is the ability of a system or a product to work with other systems or products without
special effort on the part of the customer. One way products achieve interoperability is to comply with
industry interface standards. For example, a memory module is compatible with a motherboard
because the manufacturer of the memory module and the motherboard both work to the same
industry standard.

Technical specifications

Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:

 processing speed of the CPU


 storage capacity of the hard drive
 size of memory (RAM)
 software capabilities
 compatibility with existing systems
 upgradeability

The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:

 interface – USB or network


Date: 9-2012 Page 22 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
 resolution – measured in dots per inch
 printing speed – measured in pages per minute
 memory
 paper capacity

Occupational Health and Safety (OH&S) Requirements and safe work


practices
In NSW, the OH&S legislation includes the Occupational Health and Safety Act 2000 and the
Occupational Health and Safety Regulation 2001. Work cover NSW has the responsibility for
administering this legislation.

Employers have a responsibility to provide a safe and healthy workplace for all employees. It also
requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries
to themselves or other workers.

Organizations will develop procedures for safe working practices as a tool for implementing their
OH&S policies and training staff.

For further information click on the following link: Apply occupational health and safety procedures

Manual handling

Computer hardware devices and consumables such as printer paper boxes can be very heavy and
care should be taken when manually handling these objects.

Manual handling is one of the most common causes of accidents in the workplace. Workcover NSW
<<link to http://www.smartmove.nsw.gov.au >>

defines manual handling as:

“any activity that involves lifting, lowering, carrying, pushing, pulling, holding or restraining. It may also
include stretching, bending, sustained and awkward postures, and repetitive movements.”

Recommendations on practices to reduce the risk of manual handling injury at work include:

 hold the load close to your body


 store loads close to where they will be used
 store heavy loads near waist height
 use mechanical aids such a trolley when lifting heavy loads
 don’t lift heavy loads when sitting down

To find the weight of a device refer to the device specifications in the user manual. Always check the
manufacturer’s recommendations before handling.

Safe electrical work practices


Date: 9-2012 Page 23 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Computer hardware should be located close to a suitable electrical outlet. The use of long extension
cords is a trip hazard. If no power outlet is available, a new fixed power outlet may need to be
installed. Any fixed electrical installation is required by law to be installed by a licensed electrician.

Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.

Use switched power boards and not double adapters or piggy backed plugs.

Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.

Testing and tagging refers to the practice of testing electrical equipment (which is designed for
connection by a flexible cord), by an appropriate person. If the equipment is compliant a tag is
attached which is marked with the name of the person or company who performed the test, and the
test date or retest date.

Any component such as a computer power supply which has a mains (240 volt) power connection
can only be opened and repaired by a qualified technician. CRT monitors can have very high
electrical potential levels even after they have been switched off and must only be opened by a
qualified technician.

Electrical circuits for fixed wiring are protected from overload by a circuit breaker. The circuit breaker
will trip if the circuit is overloaded. If this happens, it is an indication that the number of electrical
appliances on that circuit should be reduced.

Date: 9-2012 Page 24 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Self Check 1 Written Test

Name:____________________ Date:_________________

Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.

Match the most appropriate peripheral device to A column from B column.

Column A Column B
17. System protection
18. Preventive Maintenance A. Generator
19. Protective Device B. Antivirus Programs
20. Electrical Problem C. Anti mal ware programs
21. Environmental Problem D. Surge protector
E. User Account
F. UPS
G. Update
H. Back up
I. Cleaning
J. Firewall
K. Black out
L. Brownout
M. Temperature

Date: 9-2012 Page 25 of 28


Compiled by:- Tewodros Aklilu ICT Trainer
Date: 9-2012 Page 26 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Date: 9-2012 Page 27 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Date: 9-2012 Page 28 of 28
Compiled by:- Tewodros Aklilu ICT Trainer

You might also like