LO1 and LO2
LO1 and LO2
INFORMATION
TECHNOLOGY SUPPORT
SERVICE
Level II
Information Sheet
Unit of Competence: Care for Network and Computer
Hardware
Hardware
Computer hardware refers to the physical parts of a computer and related devices. Internal hardware
devices include motherboards, hard drives, and RAM. External hardware devices include monitors,
keyboards, mice, printers, and scanners etc.
The internal hardware parts of a computer are often referred to as components, while external
hardware devices are usually called peripherals. Together, they all fall under the category of
computer hardware. Software, on the other hand, consists of the programs and applications that run
on computers. Because software runs on computer hardware, software programs often have system
requirements that list the minimum hardware required for the software to run.
Note: Peripheral devices are the devices that are attached to the computer’s system unit
Introduction
Computer Hardware is the physical part of a computer, as distinguished from the computer software
that executes or runs on the hardware. The hardware of a computer is infrequently changed, while
software and data are modified frequently. The term soft refers to readily created, modified, or erased.
These are unlike the physical components within the computer which are hard.
The Central Processing Unit (CPU; sometimes just called processor) is a machine that can execute
computer programs. It is sometimes referred to as the brain of the computer.
Inside a custom-built computer: the power supply at the bottom has its own cooling fan.
A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power
for the internal components of the computer.
Floppy disk
Secondary storage
Hardware that keeps data inside the computer for later use and remains persistent even when the computer has
no power.
Sound card
Monitor
A monitor, also known as a visual display unit (VDU) or screen, is like
a television screen. It is measured diagonally in inches — the distance
from one corner of the screen area to the opposite corner. The quality
of a monitor is determined by its resolution. Resolution is calculated
based on the number of pixels, which are individual dots that create
the images you see on your monitor. Flat panel monitors are now
becoming a popular choice due to their portability and compactness.
Keyboard
A combination of a typewriter keyboard and numeric keypad,
a keyboard enables you to enter data into a computer.
Computer keyboards are similar to electric typewriter
keyboards but include additional keys.
Printers
A printer is a device that allows you to obtain hard copies of the data you have created on your
computer system. Printers are classified by:
1 their quality
2 the speed of printing — pages per minute
3 the print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better. There are
different types of printers due to the different methods of transferring ink to paper. Two common types
for the home and office are inkjet and laser.
Web cam
Web cams are small cameras that plug into your computer which allow the
user to share a moving image of themselves with others on other computers
through the Internet.
Digital camera
Digital cameras store images digitally onto a storage device, either a memory card or a floppy disk,
rather than recording them on film. Once a picture has been taken, it can be downloaded to a
computer system, and then manipulated or printed.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.
Column A Column B
1. Mouse A. Internal hardware peripherals
2. Speakers B. External hardware peripherals
3. Keyboard
4. Web cam
5. Monitor
6. Power supply
7. Digital Camera
8. Data projectors
9. External modems
10. Printers
11. Microphones
12. Mother board
13. CPU
14. Power supply
15. Storage Device Drives
16. Removable Medias
If the manufacturer produces substances that may be deemed hazardous, then additional obligations
apply. There are documents known as Material Safety Data Sheets or MSDS. A MSDS should be
prepared by the manufacturer and include information on the recommended use of a substance, its
physical and chemical properties, relevant health hazard information and information concerning the
precautions to be followed in relation to the safe use and handling of the substance.
In a more general context, with virtually all equipment produced, the manufacturer is required to
provide relevant safety information. This information is often provided as part of the user
instruction/manual for safe operation. The following is a typical set of Safety Instructions for a
combined Printer/Scanner/Copier.
Read all of the instructions on this section when setting up and using the product.
Avoid places subject to rapid changes in temperature and humidity. Also, keep the product away from
direct sunlight strong light and heat sources.
Avoid places subject to dust, shocks and vibrations
Leave enough room around the product to allow for sufficient ventilation.
Place the product near a wall outlet where the plug can be easily unplugged.
Place the product on a flat, stable surface that extends beyond this product base in all directions. If
you place the product near the wall, leave more than 10cm between the back of the product and the
wall. The product will not operate properly if it is tilted at an angle.
When storing or transporting the product, do not tilt it, stand it on its side, or turn it upside down;
otherwise, ink my leak from the cartridge.
Leave more than 22cm between the base of the product and the edge of the surface on which it is
placed; otherwise, the product may fall if tipped forward possibly causing injury.
Do not open the ink cartridge packages until just before you install them.
Do not shake used ink cartridges; this can cause leakage.
Keep ink cartridges out of the reach of children. Do not allow children to drink from or otherwise
handle the cartridges.
Be careful when you handle used ink cartridges as there may be some ink remaining around the ink
supply port. If ink gets on your skin, wash the area thoroughly with soap and water. If ink gets into
your eyes, flush them immediately with water. If discomfort or vision problems remain after a thorough
flushing, see a doctor immediately.
Do not touch the circuitry that is located on the back of the cartridge.
Do not remove or tear the label on the cartridge; this can cause leakage.
Store each ink cartridge so that the bottom of its packaging faces down.
Do not put your hand inside the product or touch the ink cartridges during printing.
Do not block or cover the openings on the product.
Do not attempt to service the product yourself.
Unplug the product and refer servicing to qualified service personnel under the following conditions:
The power cord or plug is damaged.
Liquid has entered the product.
The product has been dropped or the cover damaged.
The product does not operate normally or exhibits a distinct change in performance.
Do not insert objects into the slots on the product.
Take care not to spill liquid on the product.
Leave the ink cartridges installed. Removing the cartridges can dehydrated the print head and may
prevent the product from printing.
Use only a dry, soft cloth to clean the display. Do not use liquid or chemical cleansers.
If the display on the product is damaged, contact your dealer.
Date: 9-2012 Page 12 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
If the liquid crystal solution contained in the LCD panel leaks out and gets on your hands, wash them
thoroughly with soap and water, if the liquid crystal solution gets into you eyes, flush them
immediately with water, if discomfort or vision problems remain after a though flushing, see a doctor
immediately.
The manufacturer’s recommendations for operating a specific computer hardware device will be
found in the user manual or specifications.
Temperature
The ambient temperature of the environment is the temperature at which computer hardware should
be maintained and should fall within the recommended range. If the temperature exceeds the upper
limit of this range, the life of the electronic components will be shortened, and the reliability of the
device decreased. The optimum temperature range for computer hardware is usually from 15 to 24
deg C.
To maintain the ambient temperature within an acceptable range, the room containing the computer
hardware is often air conditioned. Air conditioning will also maintain the relative humidity levels in the
room, and also improve the air quality by filtering out dust particles.
If the relative humidity where computer hardware devices are operated is too high, problems can
occur through water condensation. If the relative humidity is too low, the devices are much more
susceptible to electrostatic discharge.
Computer hardware devices should be located away from sources of moisture such as open
windows. Eating and drinking should not be allowed anywhere near a computer hardware device.
Date: 9-2012 Page 13 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Dust
As discussed above, it is important hardware devices operate within a set temperature range. Over
time fans and ventilation vents become clogged with dust reducing their cooling efficiency. If the
hardware device is to be operated in a dusty area such as an industrial environment, the device will
need to be cleaned more frequently than a device in an office environment. Shields and housings are
available to reduce the intake of dust in a dusty environment.
Physical security
Physical security refers to making sure only authorized people have physical access to computer
hardware. Examples of physical security include:
Servers located in a server room secured with locks, key cards or keypad access.
Workstations protected by a key lock on the system case and/or a cable lock between the
system case and the desk.
Electrical problems
Blackout – total loss of electrical power. Hardware devices will not operate.
Brownout – the electrical power is delivered below the set conditions for the computer hardware.
Computer hardware may turn off without notice or may not operate.
Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a
short period of time. Surges and spikes commonly occur when there is lightning. Computer hardware
(and other electronic equipment) may be damaged.
Electrical noise – the electrical power is delivered with additional electrical signals which may affect
the correct operation of computer hardware. One source of electrical noise is electrical machinery
such as welders.
Protection devices
To provide protection for computer hardware devices from electrical problems, the following devices
can be installed.
Surge protectors – a device designed to protect against electrical surges and spikes. It provides no
protection against blackouts or brownouts.
Date: 9-2012 Page 14 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts. A UPS
provides power automatically during a blackout and is designed to provide battery power for a
relatively short period of time – around ten to twenty minutes. This provides time to save all data and
shut down the computer correctly.
Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.
Generators – where an organization requires the computer hardware to be powered for an extended
length of time, a generator may be installed in addition to a UPS. This is a relatively costly option and
would be considered where the operation of the computer hardware is considered critical to the
organization.
These devices should be regularly tested and maintained to ensure they will function correctly in the
event of an electrical problem. Refer to the user manual for the device.
System protection
Once the hardware device is installed, the device (and data stored on it) can be further protected by
the following system protection measures.
User accounts
Users should be given individual user accounts with enough rights and permissions to be able to
perform their work duties and no more.
For example, users in a Microsoft Windows environment may be a standard user or an administrator.
Administrators can change security settings, install software and hardware, and access all files on the
computer. Administrators can also make changes to other user accounts. Standard users have
limited access.
An Access Control List (ACL) is a list of permissions for objects such as files or folders. This list tells
the computer operating system which access rights each user has to the file or folder. Depending on
the operating system, these access rights include:
Read – users can open a folder, list the files in the folder, open a file and view the contents
Write – as for Read and in addition users can create new files and modify existing files
Full – users have all rights
Execute – users can execute (run) files if they are scripts or program files
Users should only be given enough rights to files and folders that are necessary for them to be able to
perform their work duties and no more.
Date: 9-2012 Page 15 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Antivirus software
Antivirus software should be installed and the software and virus definitions should be regularly
updated. Computers with an internet connection can be set up to download these updates
automatically.
Firewalls
A firewall is a hardware or software device designed to block unauthorised access to or from a private
computer network.
Data backup
To protect against data loss, it is important that a data backup and recovery plan is developed and
implemented. The backup plan can protect against accidental loss of user data, database corruption,
hardware failures and natural disasters. Typically two copies of the backup are made. One copy is
stored on-site and the other copy is stored off-site to protect against a disaster such as a fire
happening at the site.
Software updates
Updates for operating systems and application software are regularly released by the manufacturers
to update features or fix problems with the software. The most recent versions of operating systems
have built-in facilities which automate the process of checking for updates.
Redundancy
Redundancy helps protect an information system against the failure of a hardware device. A
secondary hardware device is installed and this secondary hardware device will take over the function
of the primary device if it fails.
An example of redundancy is the use of Redundant Array of Independent (or Inexpensive) Disks,
commonly known as RAID.
Preventive maintenance is maintenance which is carried out, usually at regular intervals, to prevent
equipment failures or the slowing of a service.
Date: 9-2012 Page 16 of 28
Compiled by:- Tewodros Aklilu ICT Trainer
Corrective maintenance is maintenance which is carried out to correct a failure which has occurred.
Preventive maintenance
Cleaning materials
One of the main preventive maintenance tasks for computer hardware devices is cleaning to remove
dust and debris build up.
Computer cleaning supplies in a cleaning kit should include:
a lint-free cloth
Ammonia-free glass cleaner. (Products with ammonia are suitable for CRT monitors which
have a glass screen but are not suitable for LCD monitors).
a small brush for cleaning dust
a can of compressed air for blowing away dust
antistatic wrist strap for use when working inside a computer case
mild detergent
There are also specialised computer cleaning kits available. For information about the different types
of kits available use the internet to search for “computer cleaning kit”.
Cleaning
keyboard
mouse
monitor
optical drives
printers
Computer hard drives are sealed devices and the hard drive assembly is designed to exclude dust
particles. They do not require any cleaning.
For all devices refer to the user manual for any specific manufacturer’s cleaning instructions.
Read the instructions on any specialized computer cleaning kits before use.
Remove unused files - For a Windows computer use Disk Cleanup. This utility searches for
unnecessary files such as Temporary Internet files and the Recycle bin and then deletes them.
Defrag the hard drive - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Defrayment Now
button in the Defragmentation frame.
One of the most cost effective upgrades which can be made to a computer is to install additional
memory (RAM). Consult your computer user manual to determine the correct RAM type for your
computer.
Corrective maintenance
Corrective maintenance is performed when a component or system is not working as expected.
Possible causes include:
hardware faults
software faults and issues
user error
Before proceeding with any maintenance, it is important you are aware of the conditions of any
warranty or service level agreements. With hardware devices you may void the warranty if you
attempt to replace internal hardware components.
Troubleshooting
Is the device powered on – check power point is on and power leads are securely seated. If
the device has a power indicator, check it is on.
Check that signal cables are securely seated.
If the device is networked, check that the network cable is securely seated.
Hardware faults
If you suspect the problem is with a faulty hardware component, the most common method of testing
is to replace the component with a known good component.
Diagnostic tools
There is a range of diagnostic tools which can aid in troubleshooting. One of the best “tools” is a good
understanding of the processes which occur within a computer system, particularly the boot process
from turning the power switch on, to loading the operating system and software applications.
Business requirements
When selecting computer hardware it is important to firstly identify the tasks the computer hardware is
required to perform. For example, a workstation required for video editing will have different
requirements to a workstation required for standard office applications, such as word processing.
Another example is a server - the processing power and storage capacity of the server will be
determined by the number of users it is required to service.
Warranty
When computer hardware devices are purchased, the supplier provides a guarantee that if a fault
develops in the equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business
needs will be met. Common warranty conditions include:
Many computer hardware suppliers offer extended warranties at additional cost. For example, the
extended warranty may extend the period of cover from one year to three years. The level of service
purchased by an organisation will depend on how critical the device is to the IT system.
A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.
Organizational policies
Some organizations have a policy of using preferred suppliers for computer hardware purchases.
This ensures the quality and consistency of computer hardware devices is maintained throughout an
organization.
A standard operating environment is a specification for computer hardware and software which
organizations develop to maintain consistency and reduce support costs. Many organizations such
as universities, publish their standard operating environment policies on the internet. For an example,
visit the Edith Cowan University Standard Operating Environment website
Support
Technical support is provided by manufacturers for users after the purchase of a computer hardware
device. Access to this support is commonly limited to users who have registered the purchase of the
product. Forms of technical support include:
telephone support
email support (usually with a guaranteed response time)
access to support on internet such as:
o frequently asked questions (FAQs)
o troubleshooting guide
o downloads of latest drivers and software updates
Compatibility
Compatibility is the ability of a system or a product to work with other systems or products without
special effort on the part of the customer. One way products achieve interoperability is to comply with
industry interface standards. For example, a memory module is compatible with a motherboard
because the manufacturer of the memory module and the motherboard both work to the same
industry standard.
Technical specifications
Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:
The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:
Employers have a responsibility to provide a safe and healthy workplace for all employees. It also
requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries
to themselves or other workers.
Organizations will develop procedures for safe working practices as a tool for implementing their
OH&S policies and training staff.
For further information click on the following link: Apply occupational health and safety procedures
Manual handling
Computer hardware devices and consumables such as printer paper boxes can be very heavy and
care should be taken when manually handling these objects.
Manual handling is one of the most common causes of accidents in the workplace. Workcover NSW
<<link to http://www.smartmove.nsw.gov.au >>
“any activity that involves lifting, lowering, carrying, pushing, pulling, holding or restraining. It may also
include stretching, bending, sustained and awkward postures, and repetitive movements.”
Recommendations on practices to reduce the risk of manual handling injury at work include:
To find the weight of a device refer to the device specifications in the user manual. Always check the
manufacturer’s recommendations before handling.
Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.
Use switched power boards and not double adapters or piggy backed plugs.
Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.
Testing and tagging refers to the practice of testing electrical equipment (which is designed for
connection by a flexible cord), by an appropriate person. If the equipment is compliant a tag is
attached which is marked with the name of the person or company who performed the test, and the
test date or retest date.
Any component such as a computer power supply which has a mains (240 volt) power connection
can only be opened and repaired by a qualified technician. CRT monitors can have very high
electrical potential levels even after they have been switched off and must only be opened by a
qualified technician.
Electrical circuits for fixed wiring are protected from overload by a circuit breaker. The circuit breaker
will trip if the circuit is overloaded. If this happens, it is an indication that the number of electrical
appliances on that circuit should be reduced.
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your
teacher.
Column A Column B
17. System protection
18. Preventive Maintenance A. Generator
19. Protective Device B. Antivirus Programs
20. Electrical Problem C. Anti mal ware programs
21. Environmental Problem D. Surge protector
E. User Account
F. UPS
G. Update
H. Back up
I. Cleaning
J. Firewall
K. Black out
L. Brownout
M. Temperature