Module 4- Maintaining Computer systems and networks
Module 4- Maintaining Computer systems and networks
COMPETENCY BASED
LEARNING MATERIAL
Sector:
INFORMATION AND COMMUNICATION TECHNOLOGY
Qualification:
COMPUTER HARDWARE SERVICING NC II
Unit of Competency:
MAINTAIN COMPUTER SYSTEMS AND NETWORKS
Module Title:
MAINTAINING COMPUTER SYSTEMS AND NETWORK
You may already have some of the knowledge and skills covered in
this module because you have:
been working for some time
already have completed training in this area.
Inside this module you will find the activities for you to complete
followed by relevant information sheets for each learning outcome. Each
learning outcome may have more than one learning activity.
LEARNING OUTCOMES:
1. Plan and prepare for the maintenance of computer systems and
networks.
2. Maintain computer systems
3. Maintain Network systems
4. Inspect and test configured/repaired computer system and networks
ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and
procedures.
2. The materials, tools, equipments and testing devices obtained and
checked.
3. Computer systems and networks checked, identified and
maintained with specifications and requirements to conform with
manufacturers.
4. The normal functions of computer systems are checked and tested.
5. The scheduled/periodic maintenance and cleaning are performed.
6. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
7. The normal functions of network systems checked and tested.
8. The scheduled/periodic maintenance and cleaning performed.
9. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
10. Computer system and network checked to ensure safe operation.
11. Final inspection and testing taken to conform with manufacturer
specifications.
12. Reports prepared and completed to company regulations.
Prerequisite: PC Operation
CONTENTS:
Plan/conduct maintenance procedures according to job
requirements.
Safety measures are observed at all times.
Identify and diagnose faulty system.
Prepare tools and test equipments.
Identify or obtain PC specifications and schematic diagrams.
Identify or obtain Network functions and specifications
ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and
procedures.
2. The materials, tools, equipments and testing devices obtained and
checked.
3. Computer systems and networks checked, identified and maintained
with specifications and requirements to conform with
manufacturers.
CONDITION:
Trainees/trainees must be provided with the following:
OHS guidelines and policies.
PC specifications
Network designs
Schematic Diagrams
Books/magazines
Manuals
EVALUATION METHOD:
Hands-on
Direct observation
Practical demonstration
Learning Outcome 1
Plan and Prepare for the Maintenance of Computer Systems and
Networks
Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to
Plan and Prepare Maintenance Procedures
Introduction:
MAINTENANCE PROGRAM
DEFINITION OF TERMS
Maintenance Program- is a comprehensive list of maintenance
and its incidents. This would include all maintenance activities to be
undertaken , manpower needed, maintenance methods to be used, all the
materials and supplies needed for the maintenance and cost involved in
the maintenance.
PLAN
= PLAN
DO
= IMPLEMENT
CHECK
= ASSESS/CORRECT
ACT
= SUSTAIN
WHO WHY
WHERE WHEN
Why Maintain?
1. General Objective:
2. Specific Objectives:
How to maintain?
Manpower
Money (Financial Resources)
Methods and System
Machines (Facilities)
Materials and Supplies
Maintenance Methods
and System
Preventive Maintenance
Corrective Maintenance
Overall, the combination of standards, methods and strategies
are elements of an integrated Planted Maintenance System.
EQUIPMENT CODE PC 1
The proper use of the training tools and equipment is the first and
foremost task in the maintenance. The proper use of tools and equipment
is a very important task of the worker in any trade. They must be able to
use them in accordance to the manufacturer‘s manuals as this would
evidently extend the life of the equipment and tools.
1. T
2. F
3. T
4. T
5. T
Steps/ Procedure:
Assessment Method:
Demonstration , Performance Criteria checklist
2. Defragging
Trainer/ X
hard disk
trainees
3. Removing
Trainer/
unwanted
trainees x
files
4. Managing Trainer/
trainees x
files
5. Scanning Trainer/t
rainees
computers x
for viruses
6. Fixing Trainer/
trainees
registry X
problems
7. Cleaning Trainer/
trainees
internal X
parts
8. Cleaning Trainer/
trainees
external x
parts
CRITERIA
Yes No
Did you…
Used the template in maintenance schedule
Prepared materials and equipment
CONTENTS:
Procedures in maintaining computer systems are followed
Safety measures are observed.
Diagnose and identify faulty systems.
Run diagnostics software.
Repair or replace faulty system
Burn-in or test repaired or replaced computer system
ASSESSMENT CRITERIA:
1. The normal functions of computer systems are checked and tested.
2. The scheduled/periodic maintenance and cleaning are performed.
3. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures
CONDITION:
Trainees must be provided with the following:
1. WORKPLACE LOCATION
2. EQUIPMENT
3. Tools
PC specification Chamois or rags Long nosed pliers
Schematic Diagrams Basin/ water Allen bit wrench
Gloves and goggles Diagnostics software‘s Multi-tester
Masks and CDROMs Spare parts
Anti-static wrist wraps Slotted head
Contact cleaners/ soap screwdriver
or detergents Philips head
Dust brush screwdriver
EVALUATION METHOD:
1. Hands-on
2. Direct observation
3. Practical demonstration
Learning Outcome 2
MAINTAIN COMPUTER SYSTEMS
Learning Objective:
(If you’re not sure what you are deleting select the category and then Click
“View Files”)
--------------------------------------------------------------------------------
3. Click ―OK‖
--------------------------------------------------------------------------------
4. Click ―OK‖
--------------------------------------------------------------------------------
Select the ―Screen Saver‖ Tab>>Change the Screen Saver Drop Menu to
your preferred screen saver
Click OK
Computer Virus
It corrupts files
It slows down the speed of the computer system
It causes the system to hang frequently
It deletes various files
A virus can enter the system and infect it through various sources. Some
of the sources are
Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.
Removing the virus – When the virus can be easily identified and can be
removed without affecting other files, then the antivirus removes it from
the host place.
Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if
the computer tries to read the disk while it is booting.
Polymorphic viruses: A virus that can encrypt its code in different ways
so that it appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus
101
Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
As our world becomes more digitized, the files we store on our computers
are becoming increasingly more important. Instead of keeping
handwritten letters in a shoebox, we correspond with family members
using e-mail. If we use digital cameras, we often keep our photo albums
on our computers.
Unfortunately, computers (and particularly the hard disk drives that hold
your files) can fail. Your computer might run for a decade with no
problems, or it could fail tomorrow—there's no way to tell. To make sure
you don't lose important files if your computer stops working, you should
back up your computer on a regular basis. The backup process copies
your files to a safe place so that even if your computer fails, you won't
lose them.
It doesn't make sense to back up your files to the hard disk drive inside
your computer, because if your computer were to fail, you would also lose
your backup. Instead, you should back up your files to an external hard
disk drive or removable disk drive, such as a CD. If your computer does
fail, you can then connect the external hard disk drive or use the CDs to
restore your files to your new or repaired computer. (This article
describes how to back up your files to an external hard disk drive, which
is the easiest way to do a full backup of all your files. If you decide to use
CDs, you'll need to choose which files to back up and then manually
insert and remove CDs as they are filled.)
If you decide to get an external hard disk drive, choose one that is at
least as large as the hard disk drive inside your computer. For example, if
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 21 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
your computer has a 100-gigabyte (GB) hard disk drive, choose a 100-GB
or larger external hard disk drive. Then connect the external hard disk
drive to your computer. Make a note of the drive letter (such as E:, F:, or
G:) assigned to your new hard disk drive.
With an external hard disk drive, you can manually back up your files, or
you can schedule automatic weekly backups.
Schedule backups
If you're busy, you might not have time to manually back up your files
every week. Fortunately, you can schedule backups to occur
automatically. This takes a few minutes to set up, but once you've done
so, you'll be protected indefinitely.
10. On the When to Back Up page, click Later. In the Job name box,
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 28 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
type Backup. Then click Set Schedule.
11. On the Schedule tab in the Schedule Job dialog box, click the
Schedule Task list, and then click Weekly.
12. In the Start time box, specify a time of day when your computer will
not be used for several hours, such as 3:00 AM. In the Schedule
Task Weekly area, select the day of the week you want to back up
your files. If you are backing up files overnight, remember to leave
your computer running the night before.
15. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.
17. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.
You can use this feature to change the installation of Windows Installer-
based programs such as Microsoft Office XP. Windows Installer-based
programs include a Maintenance Mode option. With this option, you can
add or remove features, change the installation state of the program or of
individual components, or repair and restore the installation.
Troubleshooting
Make sure that the program that you click in the Add or Remove
Programs tool is the program that you want to remove from your
computer. Some programs may not prompt you to confirm the
removal before the program is removed from the computer.
You can only remove a program with the Add or Remove Programs
tool if the program is written for Windows. If you do not see the
program that you want to remove in the Currently installed
programs box, view the program documentation for instructions
about how to remove it.
_____ Accessories
_____ Programs
3. Click ―OK‖
1. Start Menu
2. Programs
3. Accessories
4. System Tools
5. Scan Disk
Steps/ Procedure:
1. Shut down computer
2. Be sure to unplug it from power source
3. Remove cables and other peripheral devices
4. Clean Inside and outside parts of the system
5. Connect cables and peripherals
6. Start the computer
7. Install/Update anti-virus program
8. Scan computer for viruses
9. Remove unnecessary programs
10. Clear Internet history and temporary files
11. Run disk cleanup
12. Run desk defragment tool
13. Perform scandisk
14. Let your trainer check your work.
Assessment Method:
Demonstration , Performance Criteria checklist
CRITERIA
Yes No
Did you…
Shut down computer
Unplug from power source
Removed cables and other peripheral device
Cleaned Inside and outside parts of the system
Re-connected cables and peripherals
Started the computer
Installed/Updated anti-virus program
Scanned computer for viruses
Removed unnecessary programs
Cleared Internet history and temporary files
Ran disk cleanup
Ran desk defragment tool
Performed scandisk
Followed safety procedures
EVALUATION METHOD:
Hands-on
Direct observation
Practical demonstration
Learning Outcome 3
MAINTAIN NETWORK SYSTEMS
Learning Objective:
I want to do this!
This guide will show the user how to set up a static IP address in
Windows XP.
By default most broadband internet service providers automatically
assign your computer a new IP address every time it boots up. This is
called a Dynamic IP address.
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 41 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
A static IP address assigns one permanent IP to your computer. This is
useful if you want to host a website, access your computer remotely, or
run any kind of server.
Instructions
PC with Windows XP
Broadband Internet Access
Pencil and paper
6. If you had to shut down your computer to get to the USB port,
you can now turn on your computer. Windows detects and
installs the new hardware, and then displays a notification
informing you that the hardware has been successfully
installed.
Instructions
Opening the command shell
4. Type the following into the command shell: "ipconfig /all" Doing this
will give you a list of network adapters. Use the scroll bar to read
through the adapter names. Find the adapter you want to work with.
5. Type in the following: ipconfig /release "adapter" Replace "adapter"
with the name of the adapter you want to work with. Make sure to
include the quotes around the name of the adapter.
Once you've run the release operation, the adapter will be without any
network info.
6. Run the following: ipconfig /renew "adapter" Again, replace "adapter"
with the name of the adapter you are working with. This will tell the
adapter to look for new network info.
7. Run "ipconfig /all" to confirm the adapter has picked up new network
info -- including a valid IP address
Instructions
Instructions
IP address
A. Modem
B. Video card
C. LAN card
D. Hub
1. D
2. A
3. B
4. D
5. B
Steps/ Procedure:
1. Start Computer
2. Change workgroup and computer name based on the servers
Workgroup.
3. Assign Static IP Address
4. Check the connectivity
Assessment Method:
Demonstration , Performance Criteria checklist
Performance Criteria
Did you… Yes No
ASSESSMENT CRITERIA:
1. Computer system and network checked to ensure safe operation.
2. Final inspection and testing taken to conform with manufacturer
specifications.
3. Reports prepared and completed to company regulations.
CONDITION:
Trainees must be provided with the following:
a. PC specification
b. Schematic Diagrams
c. Diagnostics software‘s and CDROMs
d. Books/manuals/magazines
e. Tools and test equipments
i. Slotted head screwdriver
ii. Philips head screwdriver
iii. Long nosed pliers
iv. Allen bit wrench
EVALUATION METHOD:
Hands-on
Direct observation
Practical demonstration
Learning Outcome 4
Inspect And Test Configured/Repaired Computer System And Networks
INSPECTION CHECKLIST
____3. The cmd command is the basic tool for testing TCP/IP
connectivity.
1. T
2. T
3. F
4. F
5. T
Steps/ Procedure:
1. Start Computer
2. Using the inspection checklist template check the configured
computer system and network.
3. Let your trainer check your work
Assessment Method:
Demonstration , Performance Criteria checklist
Performance Criteria
Did you… Yes No
TRAINEES NAME
FACILATATORS
NAME
Demonstrat
Witten Test
Ways in which evidence will be collected:
Interview
[tick the column]
ion
The evidence must show that the candidate……
1. Planned and prepared Maintenance with OHS policies
X
and procedures.
2. Obtained and checked materials, tools, equipments
X
and testing devices
3. Checked, identified and maintained computer systems
and networks with specifications and requirements to X
conform with manufacturers.
4. Checked and tested the normal functions of computer
X
systems.
5. Performed the scheduled/periodic maintenance and
X
cleaning.
6. Responded the repairs/replacements and sudden
breakdowns in accordance with established X
procedures.
7. Checked and tested the normal functions of network
X
systems.
8. Performed the scheduled/periodic maintenance and
X
cleaning.
9. Checked computer system and network to ensure safe
X
operation.
10. Prepared and completed reports to company
X
regulations.
TRAINEE‘S NAME
TRAINER‘S NAME
QUALIFICATION COMPUTER HARDWARE SERVICING NC
II
UNIT OF COMPETENCY Maintain Computer Systems and
COVERED Networks
DATE OF EVALUATION
TIME OF EVALUATION
INSTRUCTIONS FOR DEMONSTRATION
Given the necessary materials, tools and equipment, the trainee must be
able to perform the following within four (4) hours
Maintain Computer Systems and Networks
Materials & Equipment
Observation: / to show if evidence
is demonstrated
Yes No N/A
1. Planned and prepared Maintenance with OHS
policies and procedures.
2. Obtained and checked materials, tools,
equipments and testing devices
3. Checked, identified and maintained computer
systems and networks with specifications
and requirements to conform with
manufacturers.
4. Checked and tested the normal functions of
computer systems.
5. Performed the scheduled/periodic
maintenance and cleaning.
6. Responded the repairs/replacements and
sudden breakdowns in accordance with
established procedures.
7. Checked and tested the normal functions of
network systems.
8. Performed the scheduled/periodic
maintenance and cleaning.
9. Checked computer system and network to
ensure safe operation.
10. Prepared and completed reports to company
regulations.
Duration: 1 hour
TRAINEE‘S NAME
FACILITATOR‘S NAME
DATE OF EVALUATION
TIME OF EVALUATION
The Performance of the Trainee in the
Not
following assessment methods [ Please Tick Satisfactory
Satisfactory
appropriate box]
A. Demonstration
Recommendation