0% found this document useful (0 votes)
25 views

Module 4- Maintaining Computer systems and networks

css nc2

Uploaded by

Marwin Alvarez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Module 4- Maintaining Computer systems and networks

css nc2

Uploaded by

Marwin Alvarez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

CHS II C4-C1

COMPETENCY BASED
LEARNING MATERIAL

Sector:
INFORMATION AND COMMUNICATION TECHNOLOGY
Qualification:
COMPUTER HARDWARE SERVICING NC II
Unit of Competency:
MAINTAIN COMPUTER SYSTEMS AND NETWORKS
Module Title:
MAINTAINING COMPUTER SYSTEMS AND NETWORK

TECHNICAL EDUCATION AND SKILLS DEVELOPMENT


AUTHORITY
Region 02
ISABELA SCHOOL OF ARTS AND TRADES
City of Ilagan, Isabela
SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

No. Unit of Competency Module Title Code

1. Install computer systems and Installing computer ELC724318


networks systems and networks
Diagnosing and
2. Diagnose and troubleshoot ELC724319
troubleshooting
computer systems
computer systems
3. Configure computer systems Configuring computer ELC724320
and networks systems and networks
Maintaining
4. Maintain computer systems ELC724321
computer systems
and networks
and networks

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 1 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
HOW TO USE THIS MODULE

Welcome to the Module “Maintaining of Computer System and


Networks”. This module contains training materials and activities for you to
complete.

The unit of competency “Maintain Computer System and


Networks” contains knowledge, skills and attitudes required for a Computer
Hardware Servicing NC II Qualification.

You are required to go through a series of learning activities in order


to complete each of the learning outcomes of the module. In each learning
outcome there are Information Sheets, Job Sheets, Operation Sheets,
and Activity Sheets. Follow these activities on your own and answer the
Self-Check at the end of each learning activity.

If you have questions, don‘t hesitate to ask your facilitator for


assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in
this module because you have:
been working for some time
already have completed training in this area.

If you can demonstrate to your trainer that you are competent in a


particular skill or skills, talk to him/her about having them formally
recognized so you don‘t have to do he same training again. If you have a
qualification or Certificate of Competency from previous trainings show it to
your trainer. If the skills you acquired are still current and relevant to this
module, they may become part of the evidence you can present for RPL. If
you are not sure about the currency of your skills, discuss it with your
trainer.

After completing this module ask your trainer to assess your


competency. Result of your assessment will be recorded in your competency
profile. All the learning activities are designed for you to complete at your
own pace.

Inside this module you will find the activities for you to complete
followed by relevant information sheets for each learning outcome. Each
learning outcome may have more than one learning activity.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 2 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
MODULE CONTENT

Qualification COMPUTER HARDWARE SERVICING NC II


Unit of
Maintain Computer Systems and Networks
Competency
Module Title Maintaining Computer Systems and Networks
INTRODUCTION:
This unit covers the outcomes required in maintaining computers
systems and networks.

LEARNING OUTCOMES:
1. Plan and prepare for the maintenance of computer systems and
networks.
2. Maintain computer systems
3. Maintain Network systems
4. Inspect and test configured/repaired computer system and networks
ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and
procedures.
2. The materials, tools, equipments and testing devices obtained and
checked.
3. Computer systems and networks checked, identified and
maintained with specifications and requirements to conform with
manufacturers.
4. The normal functions of computer systems are checked and tested.
5. The scheduled/periodic maintenance and cleaning are performed.
6. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
7. The normal functions of network systems checked and tested.
8. The scheduled/periodic maintenance and cleaning performed.
9. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
10. Computer system and network checked to ensure safe operation.
11. Final inspection and testing taken to conform with manufacturer
specifications.
12. Reports prepared and completed to company regulations.

Prerequisite: PC Operation

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 3 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
TECHNICAL TERMS

 OHS – Occupational Health and Safety


 LAN Card – Local area network interface card.
 Server – is a part of a network. It is a special computer that users on
the network can asses to carry out a particular job.
 Port hub /Port – is a connector on the back of a computer or other
device. A port is either a serial port or a parallel port.
 Modem - (Modulator-Demodulator) The modem is a device that
allows a given computer to share data or otherwise a device which let
computers exchange information
 USB – (Universal Serial Port)
 Scanner- it is an input device that read text or illustration printed on
paper, translates the information into a form that a computer can use.
 Printer - It is a piece of hardware that produces a paper copy (also
known as ‗hardcopy‘) of the information generated by the computer.
 Flash drive – a portable storage device which is plug directly to the
USB port.
 Network – a group of computers and associated devices that are
connected by communications facilities.
 OS (Operating system) software that controls the allocation and use
of programs and data that a computer uses.
 Software – programs and data that a computer uses.
 Motherboard – contains the CPU, BIOS, Memory, mass storage
interfaces, serial and parallel ports, expansion slot and all the
controllers required to control standard peripheral devices such as the
display screen, keyboard and disk drive
 UTP – (Unshielded Twisted Pair) least expensive and most popular
network media.
 LAN – Local Area Network, the connection of computers within an
organization or a building.
 MAN – Metropolitan Area Network, the establishment of connection
among computers within a country or municipality.
 WAN – Wide Area Network, global connection of networked computers.
Otherwise known as the internet.
 Maintenance - is the testing and cleaning of equipment.
 Planning – is both the organizational process of creating and
maintaining a plan; and the psychological process of thinking about
the activities required to create a desired future on some scale

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 4 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
LEARNING OUTCOME SUMMARY

Learning PLAN AND PREPARE FOR THE MAINTENANCE OF


Outcome #1 COMPUTER SYSTEMS AND NETWORKS.

CONTENTS:
 Plan/conduct maintenance procedures according to job
requirements.
 Safety measures are observed at all times.
 Identify and diagnose faulty system.
 Prepare tools and test equipments.
 Identify or obtain PC specifications and schematic diagrams.
 Identify or obtain Network functions and specifications

ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and
procedures.
2. The materials, tools, equipments and testing devices obtained and
checked.
3. Computer systems and networks checked, identified and maintained
with specifications and requirements to conform with
manufacturers.

CONDITION:
Trainees/trainees must be provided with the following:
 OHS guidelines and policies.
 PC specifications
 Network designs
 Schematic Diagrams
 Books/magazines
 Manuals

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 5 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Learning Experiences

Learning Outcome 1
Plan and Prepare for the Maintenance of Computer Systems and
Networks

Learning Activities Special Instructions


1. Read information sheet 4.1- If you have some problem on the
1 ―Plan and Prepare content of the information sheets don‘t
Maintenance Procedures‖ hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheets, you can now
answer Self Check provided in the
module.
2. Answer self-check 4.1-1 Compare your answer to the answer
key 4.1-1. If you got 100% correct
answer in this self-check, you can now
Perform task Sheet 4.1-1. If not review
the information sheet and go over the
self-check again.
3. Perform Task Sheet 4.1-1 Compare your work to the performance
―Prepare an Equipment checklist. If you got 100% correct
Maintenance Schedule‖ answer in this task, you can now move
to the next Learning Outcome. If not
review the information sheet and go
over the task again.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 2 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
INFORMATION SHEET 4.1-1

Plan and Prepare Maintenance Procedures

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to
Plan and Prepare Maintenance Procedures

Introduction:

Planning and preparing systematic maintenance procedure will


save time, money and frustration. It is a good idea and opportunity to
learn the proper care and maintenance of your computer.
PC maintenance is an important topic for anyone who owns a PC.
Looking after your PC properly ensures you of trouble-free use. Regular
PC maintenance also keeps the machine‘s
performance optimal.

A. Plan Maintenance Procedures for Computer System and


Networking.

1. Design a systematic maintenance plan for hardware.


 Monitoring, evaluating and updating plan.
 Place your computer in a well ventilated area.
 Schedule use of computers for its longer life.
 Move computers only when it is turned off and unplugged.
 Treat your computer properly.
 Maintain your hard disk
2. Design a systematic maintenance plan for your software.
 Backup your files
 Install or secure passwords
 Delete temporary files
 Update antivirus and spy ware

MAINTENANCE PROGRAM
DEFINITION OF TERMS
Maintenance Program- is a comprehensive list of maintenance
and its incidents. This would include all maintenance activities to be
undertaken , manpower needed, maintenance methods to be used, all the
materials and supplies needed for the maintenance and cost involved in
the maintenance.

Maintenance Schedule- Is a list allocating specific maintenance of an


area. Equipment and tools to a specific period. The maintenance
schedule is just a part of the maintenance program.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 3 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Quality management- is a method for ensuring that all the activities
necessary to design, develop and implement a product or service are
effective with respect to the system and its performance.

The following diagram is the Shewhart cycle (PDCA) for quality


improvements. Made popular by Dr. Deming.

The Quality Management Cycle(delete)

PLAN
= PLAN

DO
= IMPLEMENT

CHECK
= ASSESS/CORRECT

ACT
= SUSTAIN

The philosophy is to keep improving the quality of an organization. It is


defined by the four key steps:

 Plan: Design and revised business process components to improve


results.
 Do: Implement the plan and measure its performance
 Check: Assess the measurements and report the results to
decisions makers
 Act: Decides on changes needed to improve the process.

The consolidation phase enables the organization to take stock of


what has been taking place and to ensure made to processes that require
documentation (both to allow processes to be repeatable and to facilitate
recognition of the achievement of some form of quality standard).

1. Plan. Here in this stage an organization must be able to prepare a


good maintenance program which will define the standards for
Best Management Practices. The maintenance program must
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 4 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
clearly answer the question on WHY,WHO,WHAT,WHEN, WHERE
and HOW.

WHO WHY

WHAT Facilities Maintenance How

WHERE WHEN

Why Maintain?

1. General Objective:

To maintain the optimum condition of physical facilities at acceptable


levels and minimum cost to satisfy the expected demands of TVET
programs and activities.

2. Specific Objectives:

 To extend the useful life of physical facilities


 To assure the operational readiness of installed equipment
and maximum possible return on investments.
 To properly discard hazardous wastes
 To ensure the safety of personnel using the facilities,
physical properties and the environment.

What can we gain from maintaining our facilities?

 Ensured SAFE environment


 Improve MORALE of human resources
 Reduced operational COST
 Increased PRODUCTION
 Prolonged LIFE facilities
 Prompt DELIVERY of services/ product

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 5 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
WHO?

 Who will manage the activities?


 Who will monitor and evaluate the operations?
 Who will prepare the maintenance schedule?
 Who will implement the program?
 Who will keep the records?
 Who will conduct inspection?
 Who will certify and accept the work?
 Who will prepare the report?

What, Where, When?

 What routine actions must be done to keep the device on


working order?
 Where is the maintenance activity to be carried out?
 When do you perform the maintenance activities?

How to maintain?

The question on how do we implement the maintenance program


will center on the 5Ms are as follows:

 Manpower
 Money (Financial Resources)
 Methods and System
 Machines (Facilities)
 Materials and Supplies

2. DO. Here in this stage the organization through the clearly


identified Maintenance Program, must be able to practice the
Methods and System defined in order to meet the standards
(measurable performance levels of maintenance execution)
established.
5S

Maintenance Methods
and System
Preventive Maintenance
Corrective Maintenance
Overall, the combination of standards, methods and strategies
are elements of an integrated Planted Maintenance System.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 6 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
SAMPLE EQUIPMENT MAINTENANCE SCHEDULE
In order to perform the maintenance of specific equipment, a
Maintenance Schedule is drawn to guide the personnel in the proper
methods system . One best source of the list of the maintenance activities
of equipment is its manufacturer‘s manual, In the absence of it, the plan
can be derived from the known maintenance methods of the equipment.

Below is the sample Equipment Maintenance Schedule for Welding


Machine in the Practical Work area of a Training Center for SMAW NCII.
You may see that that this maintenance schedule is for a specific
equipment only, denoted by unique property code.
SAMPLE TEMPLATE NO. 2 EQUIPMENT MAINTENANCE SCHEDULE

EQUIPMENT TYPE Personal Computer

EQUIPMENT CODE PC 1

LOCATION Practical Work Area


Schedule for the Month of September 2010
ACTIVITIES MANPOWER
Every Every
Weekl Month Remar
Daily Other 15th
y ly ks
Day Day
1. Clean PC Trainer/utility/traine
x
es
2.Check
Trainer/utility x
Hardisk
3.Check power
Trainer x
source and lines

3. CHECK. To determine if the maintenance program is


implemented according to what is planned, an assessment must be
done. The result of the assessment will then be recorded and recorded
to the proper authorities for the immediate action.

Regular inspections are conducted to assure that the maintenance


activities are done on the date and time it was planned and that the
performance levels adhered to the defined standard.

SAMPLE EQUIPMENT INSPECTION CHECKLIST

Below is a sample Maintenance Inspection Checklist. You may note that


this checklist pertains to the same equipment with the Maintenance
Schedule (see sample). This checklist will confirm if the maintenance
activities have been performed in order to prolong the life of this
particular equipment. The Inspection items are stated in a question form
as these serve as the criteria or standards of maintenance.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 7 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Sample Template No. 3 : MAINTENANCE INSPECTION CHECKLIST

Equipment Type : PERSONAL COMPUTER


Property Code : ISAT-TESDA PC 003
Number : PC1
Location : Practical Work Area

YES NO INSPECTION ITEMS


√ 1. Is the machine turned off after use?
√ 2. Are accessories checks for damage?
√ 3. Are terminals, connections check for loose?
√ 4. Is the machine regularly cleaned?
5. Is the machine used properly according to

manufacturers spec?

4. ACT. The inspection will allow the organization to determine if the


standards of maintenance are met. This will also allow the
identification of further improvement in the process and procedures.
Hence, the results of the inspection must be properly documented and
reported to the proper authorities for immediate action or correction
needed.

A. PROPER UTILIZATION OF EQUIPMENT AND TOOLS

The proper use of the training tools and equipment is the first and
foremost task in the maintenance. The proper use of tools and equipment
is a very important task of the worker in any trade. They must be able to
use them in accordance to the manufacturer‘s manuals as this would
evidently extend the life of the equipment and tools.

USER’S MANUAL: For the Safe and Proper Operation of an Equipment


or Tools.

When using equipment and simple tools, it is best to read the


manufacturer‘s and
/or user‘s manuals. This would indicate the part of the equipment, the
functions of each part and the way to maintain it. We must always refer
to it for reference. The user‘s manuals must be kept handy and within
the Quality Control Area where the equipment is kept for immediate
reference.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 8 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Self-Check 4.1-1

TRUE OR FALSE: Write T if the statement is True and F if the statement


is False.

____1. Planning and preparing systematic maintenance procedure will


save time, money and frustration.
____2. PC maintenance is not so important topic for anyone who owns
a PC.
____3. Maintenance Program is a comprehensive list of maintenance
and its incidents.
____4. Regular inspections are conducted to assure that the
maintenance activities are done on the date and time it was
planned and that the performance levels adhered to the defined
standard.
____5. The proper use of the training tools and equipment is the first
and foremost task in the maintenance.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 9 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Answer Key 4.1-1

1. T
2. F
3. T
4. T
5. T

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 10 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
TASK SHEET NO. 4.1-1
Title : Prepare Equipment Maintenance
Schedule
Performance Objective : After reading the Information Sheet No.
4.1-1, Using the Blank Template, YOU MUST be
able to prepare EQUIPMENT MAINTENANCE
SCHEDULE of the Personal computer assigned
to you.

Supplies, Tools & Equipment :


1. Template on maintenance schedule
2. Personal Computer & peripherals
3. Computer Tools & materials

Steps/ Procedure:

1. Prepare all your reference materials and laptop/PC


2. Fill up all items in Template.
3. Tick the schedule corresponding to each given activity.
4. Call your facilitator who will guide you and check your work after
doing this activity.

Assessment Method:
Demonstration , Performance Criteria checklist

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 11 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
SAMPLE TEMPLATE NO. 1 EQUIPMENT MAINTENANCE SCHEDULE

EQUIPMENT TYPE Desktop Computer


EQUIPMENT CODE P. C. #1
LOCATION Practical Work Area
Schedule for the Month of July 2011
ACTIVITIES MANPO
Daily Every Weekl Every Mont Rema
WER
Other y 15th hly rks
Day Day
1. Checking
Trainer/
hard disk
trainees
for bad X
sector and
errors.

2. Defragging
Trainer/ X
hard disk
trainees
3. Removing
Trainer/
unwanted
trainees x
files

4. Managing Trainer/
trainees x
files

5. Scanning Trainer/t
rainees
computers x
for viruses

6. Fixing Trainer/
trainees
registry X
problems

7. Cleaning Trainer/
trainees
internal X
parts

8. Cleaning Trainer/
trainees
external x
parts

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 12 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Performance Criteria Checklist

CRITERIA
Yes No
Did you…
Used the template in maintenance schedule
Prepared materials and equipment

Observed safety procedures in accordance with the


manufacturer‘s instruction
Checked PPE condition in accordance with the manufacturer‘s
instruction
Planned Maintenance schedule properly

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 13 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
LEARNING OUTCOME SUMMARY

Learning MAINTAIN COMPUTER SYSTEMS


Outcome #2

CONTENTS:
 Procedures in maintaining computer systems are followed
 Safety measures are observed.
 Diagnose and identify faulty systems.
 Run diagnostics software.
 Repair or replace faulty system
 Burn-in or test repaired or replaced computer system

ASSESSMENT CRITERIA:
1. The normal functions of computer systems are checked and tested.
2. The scheduled/periodic maintenance and cleaning are performed.
3. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures
CONDITION:
Trainees must be provided with the following:
1. WORKPLACE LOCATION
2. EQUIPMENT
3. Tools
PC specification Chamois or rags Long nosed pliers
Schematic Diagrams Basin/ water Allen bit wrench
Gloves and goggles Diagnostics software‘s Multi-tester
Masks and CDROMs Spare parts
Anti-static wrist wraps Slotted head
Contact cleaners/ soap screwdriver
or detergents Philips head
Dust brush screwdriver

EVALUATION METHOD:
1. Hands-on
2. Direct observation
3. Practical demonstration

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 14 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Learning Experiences

Learning Outcome 2
MAINTAIN COMPUTER SYSTEMS

Learning Activities Special Instructions


1. Read information sheet 4.2- If you have some problem on the
1 ―Maintain Computer content of the information sheet don‘t
Systems” hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
perform Job Sheet provided in the
module.
2. Answer self-check 4.2-1 Compare your answer to the answer
key 4.2-1. If you got 100% correct
answer in this self-check, you can now
Perform task Sheet 4.2-1. If not review
the information sheet and go over the
self-check again.
3. Perform Job Sheet 4.2-1 Compare your task to the performance
―Computer System checklist. If you got 100% correct
Maintenance‖ answer in this task, you can now move
to the next learning outcome. If not
review the information sheet and go
over the task again.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 15 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
INFORMATION SHEET 4.2-1
MAINTAIN COMPUTER SYSTEM

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to


Maintain Computer System

How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk Clean Up

2. Select Drive to Clean Up and click ―OK‖

3. Place Check Marks in Items to be removed Click ―OK‖

(If you’re not sure what you are deleting select the category and then Click
“View Files”)

--------------------------------------------------------------------------------

How to Clear Internet ―History‖


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click ―Clear History‖

3. Click ―OK‖

--------------------------------------------------------------------------------

How to Clear Internet ―Temporary Internet‖ Files


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click ―Delete Files‖

3. Put check mark in ―Delete all Offline Content‖

4. Click ―OK‖

5. Click ―OK‖ again

--------------------------------------------------------------------------------

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 16 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
How to Run Scan disk and Disk Defragmenter without interruption:
Start Menu>>Run >>In Run Type ―MSCONFIG‖ then click ―OK‖
MSCONFIG will appear
Select ―Selective Startup‖ then Uncheck
―Load Startup Group Items‖
Click ―OK‖
Click Yes to Restart Computer
Upon Restart

Start Menu>>Settings>>Control Panel>>Dbl Click Display


Select the ―Screen Saver‖ Tab
Change the Screen Saver Drop Menu to ―NONE‖
Click OK

Then Perform Scan Disk:

Start Menu>>Programs>>Accessories>>System Tools>>Scan Disk

After Scan Disk Perform Disk Defragmenter

Start Menu>>Programs>>Accessories>>System Tools>>Disk


Defragmenter
Select which disk to Defragment then click ―OK‖

After Disk Defragmenter

Start Menu>>Run >>In Run Type ―MSCONFIG‖ then click ―OK‖


MSCONFIG will appear>>select ―Normal Start Up‖ and Click ―OK‖
Click Yes to Restart Computer
Upon Restart

Start Menu>>Settings>>Control Panel>>Dbl Click Display

Select the ―Screen Saver‖ Tab>>Change the Screen Saver Drop Menu to
your preferred screen saver

Click OK

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 17 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Removing viruses from infected machines

Computer Virus

 A virus is a destructive executable program that


infects the other programs in the system and
spreads by replicating itself.
 Such a program is designed to damage the victim‘s
computer files.
 Viruses are coded by malicious programmers in a
way that they can spread in the system without one's permission
and knowledge.

Different Aspects of Computer Virus


Finder- searches for the new uninfected files and the
Replicator- actually targets these files and infects it by multiplying itself.

How do Virus Affects a System?

 It corrupts files
 It slows down the speed of the computer system
 It causes the system to hang frequently
 It deletes various files

Sources of Virus Infection

A virus can enter the system and infect it through various sources. Some
of the sources are

 Infected CDs, DVDs, pen drives, etc


 E-mail
 Browsing infected sites
 Downloading files from the internet

Steps to Remove Viruses

Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.

The basic steps are:

 Buy or download an antivirus software


 Install the antivirus software

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 18 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
 Update antivirus software with the latest virus definitions
 Do a complete system scan

Methods of Eliminating Viruses

Removing the virus – When the virus can be easily identified and can be
removed without affecting other files, then the antivirus removes it from
the host place.

Quarantine – This is done when the virus cannot be easily identified


removed from the file and the removal of virus means the removal of the
complete file. In this method, although the virus is not eliminated, it is
rendered inactive by moving the file into "quarantine" and renaming it.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 19 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if
the computer tries to read the disk while it is booting.

Examples: Form, Disk Killer, Michelangelo, and Stone virus


Program viruses: These infect executable program files, such as those
with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS
(device driver). These programs are loaded in memory during execution,
taking the virus with them. The virus becomes active in memory, making
copies of itself and infecting files on disk.

Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect


program files and when the infected program is executed, these viruses
infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection.


They may either redirect the disk head to read another sector instead of
the one in which they reside or they may alter the reading of the infected
file‘s size shown in the directory listing. size given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways
so that it appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus
101

Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 20 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Antivirus Software

Software designed to cure virus infected machines. An antivirus is a


program that searches for, identifies and removes potential viruses
existing in the computer system

Examples of Anti-virus software

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus

Back up your files

As our world becomes more digitized, the files we store on our computers
are becoming increasingly more important. Instead of keeping
handwritten letters in a shoebox, we correspond with family members
using e-mail. If we use digital cameras, we often keep our photo albums
on our computers.

Unfortunately, computers (and particularly the hard disk drives that hold
your files) can fail. Your computer might run for a decade with no
problems, or it could fail tomorrow—there's no way to tell. To make sure
you don't lose important files if your computer stops working, you should
back up your computer on a regular basis. The backup process copies
your files to a safe place so that even if your computer fails, you won't
lose them.

Choose backup storage

It doesn't make sense to back up your files to the hard disk drive inside
your computer, because if your computer were to fail, you would also lose
your backup. Instead, you should back up your files to an external hard
disk drive or removable disk drive, such as a CD. If your computer does
fail, you can then connect the external hard disk drive or use the CDs to
restore your files to your new or repaired computer. (This article
describes how to back up your files to an external hard disk drive, which
is the easiest way to do a full backup of all your files. If you decide to use
CDs, you'll need to choose which files to back up and then manually
insert and remove CDs as they are filled.)

If you decide to get an external hard disk drive, choose one that is at
least as large as the hard disk drive inside your computer. For example, if
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 21 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
your computer has a 100-gigabyte (GB) hard disk drive, choose a 100-GB
or larger external hard disk drive. Then connect the external hard disk
drive to your computer. Make a note of the drive letter (such as E:, F:, or
G:) assigned to your new hard disk drive.

With an external hard disk drive, you can manually back up your files, or
you can schedule automatic weekly backups.

Manually back up your files

To back up your files to an external hard disk drive

1. Click Start, point to Accessories, point to System Tools, and then


click Backup. If the Backup option does not appear on the System
Tools menu, you can install it.

2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 22 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
4. On the What to Back Up page, click All information on this
computer, and then click Next.

5. On the Backup Type, Destination, and Name page, click


Choose a place to save your backup, and select your external
hard disk drive. Then click Next.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 23 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
6. On the Completing the Backup or Restore Wizard page, click
Finish.

7. Windows Backup saves a copy of your files to your external hard


disk drive. When the backup is complete, click Close.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 24 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
If your computer stops responding, you will be able to restore your files to
the state they were in when you completed the backup. However, any
new files you have created and any changes you have made to existing
files since the backup occurred will not be saved unless you back up
your files again. For best results, back up your files every week or
immediately after creating important files, such as after you copy
pictures from your digital camera.

For an additional layer of protection, purchase a second external hard


disk drive and perform another backup of your hard disk drive. Store this
external hard disk drive in a different location, such as at a family
member's house, to protect your files from theft, fire, or natural disasters
that might damage both your computer and your backup.

Schedule backups

If you're busy, you might not have time to manually back up your files
every week. Fortunately, you can schedule backups to occur
automatically. This takes a few minutes to set up, but once you've done
so, you'll be protected indefinitely.

To schedule a weekly backup

1. Click Start, point to Accessories, point to System Tools, and then


click Backup. If the Backup option does not appear on the System
Tools menu, you can install it.
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 25 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.

4. On the What to Back Up page, click All information on this


computer, and then click Next.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 26 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
5. On the Backup Type, Destination, and Name page, click Choose a
place to save your backup, and select your external hard disk
drive. Then click Next.

6. On the Completing the Backup or Restore Wizard page, click


Advanced.

7. On the Type of Backup page, click Next.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 27 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
8. On the How to Back Up page, click Next.

9. On the Backup Options page, select Replace the existing backups.


Then click Next.

10. On the When to Back Up page, click Later. In the Job name box,
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 28 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
type Backup. Then click Set Schedule.

11. On the Schedule tab in the Schedule Job dialog box, click the
Schedule Task list, and then click Weekly.

12. In the Start time box, specify a time of day when your computer will
not be used for several hours, such as 3:00 AM. In the Schedule
Task Weekly area, select the day of the week you want to back up
your files. If you are backing up files overnight, remember to leave
your computer running the night before.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 29 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
13. Click the Settings tab. Select the Wake the computer to run this
task check box.

14. Click OK.

15. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 30 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
16. On the When to Back Up page, click Next.

17. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.

18. In the Account Information Warning dialog box, click OK.

19. On the Completing the Backup or Restore Wizard page, click


Finish.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 31 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Your computer will automatically back up your files to your external hard
disk drive every week at the time you specified.

How to change an installed program


Note You cannot use this feature to modify all programs.

You can use this feature to change the installation of Windows Installer-
based programs such as Microsoft Office XP. Windows Installer-based
programs include a Maintenance Mode option. With this option, you can
add or remove features, change the installation state of the program or of
individual components, or repair and restore the installation.

To change a program, follow these steps:

1. Click Start, click Control Panel, and then double-click Add or


Remove Programs.
2. In the Currently installed programs box, click the program that
you want to remove, and then click Change or Change/Remove.
3. Follow the instructions that appear on the screen to make the
changes that you want.

How to remove an installed program


To remove a program that is installed on your computer, follow these
steps:

1. Click Start, click Control Panel, and then double-click Add or


Remove Programs.
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 32 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
2. In the Currently installed programs box, click the program that
you want to remove, and then click Remove.
3. If you are prompted to confirm the removal of the program, click
Yes.

Troubleshooting

 Make sure that the program that you click in the Add or Remove
Programs tool is the program that you want to remove from your
computer. Some programs may not prompt you to confirm the
removal before the program is removed from the computer.
 You can only remove a program with the Add or Remove Programs
tool if the program is written for Windows. If you do not see the
program that you want to remove in the Currently installed
programs box, view the program documentation for instructions
about how to remove it.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 33 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Self-Check 4.2-1

Arrange the procedures to their proper order.

1. How to perform Disk Clean Up:

_____ Start Menu>>Programs>>Accessories>>System Tools>>Disk


Clean Up

______ Place Check Marks in Items to be removed Click ―OK‖

______ Select Drive to Clean Up and click ―OK‖

2. How to Clear Internet ―History‖

______ Click ―OK‖

______ Click ―Clear History‖

______ Start Menu>>Settings>>Control Panel>>Dbl Click Internet


Options

3. Perform Scan Disk:

_____ Scan Disk

_____ Start Menu

_____ Accessories

_____ Programs

_____ System Tools

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 34 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Answer Key 4.2-1

1. How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk


Clean Up

2. Select Drive to Clean Up and click ―OK‖

3. Place Check Marks in Items to be removed Click ―OK‖

2. How to Clear Internet ―History‖

1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet


Options

2. Click ―Clear History‖

3. Click ―OK‖

3. Perform Scan Disk:

1. Start Menu
2. Programs
3. Accessories
4. System Tools
5. Scan Disk

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 35 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Job Sheet 4.2-1

Title : Computer System Maintenance


Performance Objective : Given a working personal computer you are
going external & internal parts, install/Update anti-virus, scan
computer for virus, remove unwanted files, run disk
defragmenter, scandisk, Back-up file using windows utility,
remove unnecessary software, Clear internet history &
temporary files.

Supplies, Tools & Equipment :


 Working PC
 Screw driver
 Anti-virus software
 Paint Brush
 Vacuum cleaner
 Printer

Steps/ Procedure:
1. Shut down computer
2. Be sure to unplug it from power source
3. Remove cables and other peripheral devices
4. Clean Inside and outside parts of the system
5. Connect cables and peripherals
6. Start the computer
7. Install/Update anti-virus program
8. Scan computer for viruses
9. Remove unnecessary programs
10. Clear Internet history and temporary files
11. Run disk cleanup
12. Run desk defragment tool
13. Perform scandisk
14. Let your trainer check your work.

Assessment Method:
Demonstration , Performance Criteria checklist

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 36 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Performance Criteria Checklist 4.2-1

CRITERIA
Yes No
Did you…
Shut down computer
Unplug from power source
Removed cables and other peripheral device
Cleaned Inside and outside parts of the system
Re-connected cables and peripherals
Started the computer
Installed/Updated anti-virus program
Scanned computer for viruses
Removed unnecessary programs
Cleared Internet history and temporary files
Ran disk cleanup
Ran desk defragment tool
Performed scandisk
Followed safety procedures

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 37 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 38 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
LEARNING OUTCOME SUMMARY
MAINTAIN NETWORK
LEARNING OUTCOME #3
SYSTEMS
CONTENTS:
 Procedures in maintaining network systems are followed
 Safety measures are observed.
 Diagnose and identify faulty systems and cables.
 Run diagnostics software.
 Repair or replace faulty systems and cables.
 Burn-in or test repaired or replaced network system.
ASSESSMENT CRITERIA:
1. The normal functions of network systems checked and tested.
2. The scheduled/periodic maintenance and cleaning performed.
3. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
CONDITION:
Trainees must be provided with the following:
1. PC and network specification 7. Diagnostics softwares and
2. Network Cables and peripherals CDROMs
 UTP Cat. 5 cables 8. Tools and test equipments
 UTP Cat.3 cables  Slotted head screwdriver
 RJ 45 modular plug  Philips head screwdriver
 Hubs/switches  Long nosed pliers
3. Modem/router  Allen bit wrench
4. Network layout and schematic  Crimping tool
diagrams  Cable tester
5. Personal protective equipments  Multi-tester
 Gloves and goggles 9. Spare cables
 Masks
 Anti-static wrist wraps
6. Materials
 Contact cleaners/ soap or
detergents
 Dust brush
 Chamois or rags
 Basin/ water

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 39 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Learning Experiences

Learning Outcome 3
MAINTAIN NETWORK SYSTEMS

Learning Activities Special Instructions


1. Read information sheet If you have some problem on the
4.3-1 ―Maintain Network content of the information sheet don‘t
System‖ hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now answer
self check provided in the module.
2. Answer self-check 4.3-1 Compare your answer to the answer
key 4.3-1. If you got 100% correct
answer in this self-check, you can now
Perform Job Sheet 4.3-1. If not review
the information sheet and go over the
self-check again.

3. Perform Job Sheet 4.3-1 Compare your work to the Performance


Maintain Network Checklist. If you got 100% correct
System answer in this task, you can now move
to the next learning outcome. If not
review the information sheet and go
over the task again.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 40 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
INFORMATION SHEET 4.3-1
MAINTAIN NETWORK SYSTEM

Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to Maintain


Network System

Change Workgroup and Computer Name


A Windows XP workgroup connects computers in a network in order to
share files. A workgroup also connects hardware, such as printers and
scanners.
Instructions

1. Set up a Windows XP workgroup on your PC. Click the "Start" menu


in the lower left-hand corner of your WIndows XP screen and select
"My Computer."
2. Right-click on the icon for "My Computer." Click "Properties" in the
pop-up menu. A "System Properties" window will appear on the
screen.
3. Click the tab for "Computer Name." Click the "Change" button at the
bottom of the window.
4. Enter a name for the Windows XP workgroup and computer Name.
It is important to remember this name. Click "OK."
5. Restart computer.

How to change Static IP Address (Win XP)

I want to do this!
This guide will show the user how to set up a static IP address in
Windows XP.
By default most broadband internet service providers automatically
assign your computer a new IP address every time it boots up. This is
called a Dynamic IP address.
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 41 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
A static IP address assigns one permanent IP to your computer. This is
useful if you want to host a website, access your computer remotely, or
run any kind of server.

Instructions

Things You'll Need:

 PC with Windows XP
 Broadband Internet Access
 Pencil and paper

1. First you'll need to take down some IP information so if


you don't have something to write with open up
notepad.

Click on the Start Menu then select Run. A window like


this one should appear. In this window type "command" and press
enter.
2. A black DOS screen should appear. Type "ipconfig
/all" in the DOS prompt and press enter. All your IP
information should generate. This is a helpful
command to know if you ever have to find your IP
address or other info about your internet connection.
Be sure to write down your IP Address, Subnet Mask,
Default Gateway, and both DNS servers. After your are
done type "exit" and press enter to exit the DOS window.
(Note: If both DNS server addresses are the same then they are just
proxy numbers used by your router and you will have to
either log onto your router status page or call your ISP
and ask for your DNS or Name server addresses.)
3. Now click "Start" and open up the "Control Panel." Select
"Network Connections" and right click on the connection
you use and select "Properties."
4. A window like this one should appear. Select "Internet
Protocol (TCP/IP)" and click on Properties.
5. window like the one pictured will pop up. "Obtain an IP address
automatically," should be selected. If it isn't then congratulations, you
have a static IP already.
Select "Use the following IP address."
Enter the following:

IP Address -- Type in the


IP address you wrote
down but change the
last digit to a number
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 42 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
between 1 and 255. For example, if your IP address is "192.168.1.1"
you would enter "192.168.1.11" or "192.168.1.101"
Subnet Mask / Default Gateway -- Enter these exactly as you copied
them down.
6. Next click "Use the following DNS server addresses" and add the
DNS servers you copied down or found in your router settings.
After you've entered all the information your screen should look
something like the picture to the left.
7. Now make sure you can connect to the internet and congratulations!
You now have a static IP address!
If you can't connect to the internet the most common problem is the
DNS servers. Make sure your DNS servers are correct. If you can't find
your router settings just call your ISP and they should be able to give
you your DNS or Name Servers.

How to determine if you have a network adapter

Many newer computers have a network adapter


built in that you can use to connect to a wired network.
If you want to install a wired network adapter and
aren't sure whether your computer already has one, look for a network
port on the back of the computer. Network ports resemble phone jacks,
but they are slightly larger and have eight pins inside.

To see what kind of network adapters may already be installed in


your computer.

1. Click the Start, and then click Control Panel

2. Under or pick a Control Panel icon, click Network


Connections

3. Microsoft Windows XP displays your network adapters. If an


adapter has a red X over it, it is disconnected. If the Network
Connections window is blank, your computer doesn't have a
network adapter.

4. If you already have a network adapter, you are ready to


configure your network.

How to install a wired USB network adapter

Once you have the adapter…

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 43 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
 If your USB network adapter came with software, insert the CD
or floppy disk into your computer, and follow the
manufacturer's instructions to install the software.

 Find an available USB port on your computer.

Note: If you need to move your computer to reach the


USB ports, you should shut down Windows to avoid
damaging your computer. If you can easily reach a
USB port, you need not shut down your computer.

 If you do not have an unused USB port, connect a USB hub to


add additional ports. Then connect your USB network adapter
to the unused USB port.

 Connect the network cable to the network adapter.

5. Connect the other end of the network cable to your networking


equipment.

6. If you had to shut down your computer to get to the USB port,
you can now turn on your computer. Windows detects and
installs the new hardware, and then displays a notification
informing you that the hardware has been successfully
installed.

How to Find an IP Address With CMD


Using the Windows command shell (CMD.exe) to configure networking is
a more complex undertaking than using the GUI (Graphical User
Interface) equivalent. Command shells are not intuitive and can be
intimidating. However, the command prompt also affords access to more
complex information than is found in the adapter properties dialog. Here,
information can be found on IP addresses, both IPv4 (Internet Protocol
version 4) and IPv6 types, all in one stream of information.

Instructions
Opening the command shell

1. Click the Start button, then select "Run."


2. Type the following into the dialog box: "cmd.exe". Do not include the
quotes.
3. Click "OK."

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 44 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Working with ipconfig

4. Type the following into the command shell: "ipconfig /all" Doing this
will give you a list of network adapters. Use the scroll bar to read
through the adapter names. Find the adapter you want to work with.
5. Type in the following: ipconfig /release "adapter" Replace "adapter"
with the name of the adapter you want to work with. Make sure to
include the quotes around the name of the adapter.

Once you've run the release operation, the adapter will be without any
network info.
6. Run the following: ipconfig /renew "adapter" Again, replace "adapter"
with the name of the adapter you are working with. This will tell the
adapter to look for new network info.
7. Run "ipconfig /all" to confirm the adapter has picked up new network
info -- including a valid IP address

Fix IPconfig in XP Pro


IPconfig is a program built into the Windows XP Professional operating
system that allows users to manage their Internet protocol, or IP, settings
and perform other network-related tasks. If IPconfig begins exhibiting
strange behavior or fails to run, the program must be fixed in order to
ensure full network functionality for your computer. As IPconfig is a fully
integrated component of the hard drive, this means reinstalling your
operating system.

Instructions

Things You'll Need:

 Windows XP Pro disk

1. Place the Windows XP Pro disk into your computer.


2. Open the "Start" menu, select the "Turn off" option and select the
"Restart" option.
3. Press any key as the computer loads to boot from the CD.
4. Hit "Enter" once the installation screen loads.
5. Press "F8" at the licensing screen.
6. Select your installation of Windows from the list that appears
onscreen and press "R." This will reinstall Windows and restore your
IPconfig program to full functionality.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 45 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
How to Ping My Computer
If you are having an issue with a computer or network, you can "ping" it
to determine if a problem exists. A "ping" is a signal sent to a network or
computer to elicit a response in order to determine whether or not it is
connected. You can tell if an entire network is down if no computers on
the system respond to the ping, or identify an isolated incident due to a
failed ping of one computer. It is easy to use the ping function if you
follow a few simple steps.

Instructions

Things You'll Need:

 IP address

1. Determine your IP address. You will need this number to


ping your computer. If you do not know the IP address of
your computer, use the website linked in Resources.
2. Click once on the Windows "Start" button and select the
"Run" option.
3. Type the letters CMD into the "Open" filed
on the "Run" window and click once on the
"OK" button. This action will launch the
"DOS" prompt.

4. Type the word "ping" followed by a space and then your


IP address at the DOS prompt (e.g. ping 111.22.33.4).
Press the "Enter" key once.
5. View the results of the ping. If a result of "Request
timed out" appears, then there is a problem with
either the computer or the network. A successful ping
will result in a response of "Reply from" followed by
the IP address.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 46 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Self-Check 4.3-1

Select the best answer of the given choices.

1. Which of the following is wrong I.P. address


A. 192.168.0.4
B. 194.167.5.7
C. 255.277.0.3
D. 123.123.123.123

2. A windows XP _______ connects computers in a network order to


share files.
A. Workgroup
B. User Account
C. Computer Name
D. None of the above

3. It is a program built into the windows XP Professional Operating


System that allows user to manage their internet protocol.
A. CMD
B. IPCONFIG
C. Ping
D. Format

4. ______ is a signal sent to a network or computer to elicit a response


in order to determine whether or not it is connected.
A. Copy
B. IPCONFIG
C. CMD
D. Ping

5. Which of the following is not a component used for networking.

A. Modem
B. Video card
C. LAN card
D. Hub

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 47 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Answer Key 4.3-1

1. D
2. A
3. B
4. D
5. B

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 48 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Job Sheet 4.3-1
Title : Maintain Network System
Performance Objectives:
Given a working personal computer you are going to maintain
network system, change the computer name and workgroup, assign
static IP address.

Supplies, Tools & Equipment :


 Working PC
 Server
 LAN Cable
 Hub/Switch

Steps/ Procedure:
1. Start Computer
2. Change workgroup and computer name based on the servers
Workgroup.
3. Assign Static IP Address
4. Check the connectivity

Assessment Method:
Demonstration , Performance Criteria checklist

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 49 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
PERFORMANCE CHECKLIST

Performance Criteria
Did you… Yes No

1. Started the computer properly

2. Checked the configuration of computer system and network

3. Changed workgroup and computer name

3. Made necessary maintenance

4. Followed safety procedures while performing inspection

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 50 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
LEARNING OUTCOME SUMMARY
Learning Inspect And Test Configured/Repaired Computer
Outcome #4 System And Networks
CONTENTS:
1. Check the maintained/serviced computer systems to ensure safe
operation.
2. Run or conduct computer to computer communications.
3. Connect to the internet if necessary.
4. Burn-in serviced or replaced components.
5. Return computer to networking area.
6. Document the task undertaken.

ASSESSMENT CRITERIA:
1. Computer system and network checked to ensure safe operation.
2. Final inspection and testing taken to conform with manufacturer
specifications.
3. Reports prepared and completed to company regulations.

CONDITION:
Trainees must be provided with the following:
a. PC specification
b. Schematic Diagrams
c. Diagnostics software‘s and CDROMs
d. Books/manuals/magazines
e. Tools and test equipments
i. Slotted head screwdriver
ii. Philips head screwdriver
iii. Long nosed pliers
iv. Allen bit wrench

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 51 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Learning Experiences

Learning Outcome 4
Inspect And Test Configured/Repaired Computer System And Networks

Learning Activities Special Instructions


1. Read information sheet 4.4- If you have some problem on the
1 ―Inspect And Test content of the information sheet don‘t
Configured/Repaired hesitate to approach your facilitator.
Computer System And If you feel that you are knowledgeable
Networks‖ on the content of the information
sheet, you can now answer self check
provided in the module.
2. Answer self-check 4.4-1 Compare your answer to the answer
key 4.4-1. If you got 100% correct
answer in this self-check, you can now
Perform Job Sheet 4.4-1. If not review
the information sheet and go over the
self-check again.

3. Perform Job Sheet 4.4-1 Compare your work to the Performance


Inspect And Test Checklist. If you got 100% correct
Configured/Repaired answer in this task, you can now move
Computer System And to the next Competency. If not review
Networks the information sheet and go over the
task again.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 52 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
INFORMATION SHEET 4.4-1
Inspect and Test Configured/Repaired Computer System and
Networks

Checking and Maintained Computer Systems:

The effectiveness of checking maintained computers depends on


the quality of inspection. A quality inspection of computer systems must
include the following:

 Powering On the Computer


 Testing all the computers’ devices
- Check if all the devices are working properly
a. Monitor
b. Keyboard
c. Mouse
 Checking the computers’ performance
- Check if the computer is performing at its
best
 Inspecting the cables attached on the computer
- Check if the Cables are fixed properly
a. Power Cables
b. LAN Cables
c. PS2 Cables
d. USB Cables
e. Monitor Cables

Reasons for Running Computer to Computer Communications:

The effectiveness of running computers to computer


communications is to make sure that the computers in a network is
connected properly for effective and easier sharing files and information.
A quality inspection of computer communications must include the
following:

 Pinging - The ping command is the basic tool for testing


TCP/IP connectivity. It sends a special packet (called
ICMP Echo) to a particular IP address and looks for a
reply.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 53 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
 Determining TCP/IP Settings - TCP/IP settings that are
used in network settings are:

- IP Address – Unique address assigned to a network


adapter. A computer with multiple network adapters
has an IP address for each one, and each one must
be in a different subnet.

- Subnet Mask – Used in conjunction with the IP


address to determine which subnet an adapter
belongs to.

- Default Gateway - IP address of a computer or router,


on one of this computer‘s local area networks, that
knows how to communicate with subnets not present
on this computer.

- DHCP Server – If an adapter is configured to obtain an


IP address automatically, this is the address of the
server that provides it.

- DNS Servers – IP address of one or more Domain


Name Server computers.
Burn In - To run a system or device for a period of time to ensure
that all components are working properly.

- The intention is to detect those particular components


that would fail as a result of the initial, high-failure rate
portion of the bathtub curve of component reliability. If
the burn-in period is made sufficiently long (and,
perhaps, artificially stressful), the system can then be
trusted to be mostly free of further early failures once the
burn-in process is complete.
Bathtub Curve - An equipment failure-rate curve with an initial
sharply declining failure rate, followed by a prolonged
constant-average failure rate, after which the failure rate
again increases sharply.
REPORT - Is a piece of information describing, or an account of
certain events given or presented to someone.
Importance of Making a Report - It enables you to practice your
skills of presentation, argument, evaluation, and
calculation, and provides a permanent record of your
work.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 54 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Inspection Checklist Template

INSPECTION CHECKLIST

Equipment Type : Desktop Computer


Property Code : P.C. #1
Number : P.C.#1
Location : Practical Work Area

YES NO N/A INSPECTION ITEMS


1. Is the machine operating normally?
2. Are accessories checks for damage?
3. Are all device driver installed and configured
properly?
4. Are the display properties configured
correctly?
5. Is the sound functioning?
6. Is the pc connected to the server?
7. Is the printer installed shared?
8. Is IP address configured correctly?
9. Is their internet connection?
10. Is desired workgroup followed
11. Is internal parts cleaned?
12. Is external parts cleaned?
13. Is check disk performed
14. Is unwanted programs removed
15. Is necessary files back-upped
16. Is anti-virus program updated and run
17. Is disk defragment performed

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 55 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Self-Check 4.4-1
TRUE OR FALSE: Write T if the statement is True and F if the statement
is false.

____1. The effectiveness of checking maintained computers depends


on the quality of inspection.

____2. The effectiveness of running computers to computer


communications is to make sure that the computers in a
network is connected properly for effective and easier sharing
files and information.

____3. The cmd command is the basic tool for testing TCP/IP
connectivity.

____4. User account is unique address assigned to a network adapter.

____5. Burn in is to run a system or device for a period of time to


ensure that all components are working properly.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 56 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Answer Key 4.4-1

1. T
2. T
3. F
4. F
5. T

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 57 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
Job Sheet 4.4-1

Title: Inspect And Test Configured/Repaired Computer System And


Networks

Performance Objective Given a working personal computer you are


going to inspect and test configured/repaired
computer system and networks.

Supplies, Tools & Equipment :


 Working PC
 Server
 LAN Cable
 Hub/Switch
 Inspection Report Template

Steps/ Procedure:
1. Start Computer
2. Using the inspection checklist template check the configured
computer system and network.
3. Let your trainer check your work

Assessment Method:
Demonstration , Performance Criteria checklist

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 58 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
PERFORMANCE CHECKLIST

Performance Criteria
Did you… Yes No

1. Started the computer properly

2. Checked the configuration of computer system and network

4. Followed safety procedures while performing inspection

5. Filled up inspection checklist accurately.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 59 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
INSTITUTIONAL EVALUATION
EVIDENCE PLAN

TRAINEES NAME

FACILATATORS
NAME

QUALIFICATION COMPUTER HARDWARE SERVICING NC II


UNIT OF 1. Maintain Computer Systems and Networks
COMPETENCY
COVERED

Demonstrat

Witten Test
Ways in which evidence will be collected:

Interview
[tick the column]

ion
The evidence must show that the candidate……
1. Planned and prepared Maintenance with OHS policies
X
and procedures.
2. Obtained and checked materials, tools, equipments
X
and testing devices
3. Checked, identified and maintained computer systems
and networks with specifications and requirements to X
conform with manufacturers.
4. Checked and tested the normal functions of computer
X
systems.
5. Performed the scheduled/periodic maintenance and
X
cleaning.
6. Responded the repairs/replacements and sudden
breakdowns in accordance with established X
procedures.
7. Checked and tested the normal functions of network
X
systems.
8. Performed the scheduled/periodic maintenance and
X
cleaning.
9. Checked computer system and network to ensure safe
X
operation.
10. Prepared and completed reports to company
X
regulations.

NOTE: *Critical aspects of competency

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 60 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
DEMONSTRATION WITH QUESTIONING CHECKLIST

TRAINEE‘S NAME
TRAINER‘S NAME
QUALIFICATION COMPUTER HARDWARE SERVICING NC
II
UNIT OF COMPETENCY Maintain Computer Systems and
COVERED Networks
DATE OF EVALUATION
TIME OF EVALUATION
INSTRUCTIONS FOR DEMONSTRATION
Given the necessary materials, tools and equipment, the trainee must be
able to perform the following within four (4) hours
 Maintain Computer Systems and Networks
Materials & Equipment
Observation: / to show if evidence
is demonstrated
Yes No N/A
1. Planned and prepared Maintenance with OHS
policies and procedures.
2. Obtained and checked materials, tools,
equipments and testing devices
3. Checked, identified and maintained computer
systems and networks with specifications
and requirements to conform with
manufacturers.
4. Checked and tested the normal functions of
computer systems.
5. Performed the scheduled/periodic
maintenance and cleaning.
6. Responded the repairs/replacements and
sudden breakdowns in accordance with
established procedures.
7. Checked and tested the normal functions of
network systems.
8. Performed the scheduled/periodic
maintenance and cleaning.
9. Checked computer system and network to
ensure safe operation.
10. Prepared and completed reports to company
regulations.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 61 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
QUALIFICATION: COMPUTER HARDWARE SERVICING NC II

UNIT OF COMPETENCY: INSTALL COMPUTER SYSTEMS AND


NETWORKS

SPECIFIC INSTRUCTIONS: ( For the candidate)

1. Given a working personal computer you are going external &


internal parts, install/Update anti-virus, scan computer for
virus, remove unwanted files, run disk defragmenter, scandisk,
Back-up file using windows utility, remove unnecessary
software, Clear internet history & temporary files.
2. Maintain network system, change the computer name and
workgroup, assign static IP address and check the connectivity
of your computer.

Duration: 1 hour

Accomplish the following before the allotted time.

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 62 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks
COMPETENCY EVALUATION RESULT SUMMARY

TRAINEE‘S NAME
FACILITATOR‘S NAME

QUALIFICATION Computer Hardware Servicing NC II

DATE OF EVALUATION
TIME OF EVALUATION
The Performance of the Trainee in the
Not
following assessment methods [ Please Tick Satisfactory
Satisfactory
appropriate box]

A. Demonstration

Maintain Computer Systems and network.

Did the trainees overall performance meet


the required evidences/standards?

Recommendation

For re-evaluation ________________________________


Qualified to take the Next Competency

General comments [Strengths/Improvement Needed]

Trainee‘s Signature Date:


Facilitator‘s Signature: Date:

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA Maintaining Page 63 of
SYSTEM Developed by: Revision #00
Computer Systems 68
RODELIO B. TINAZA
and Networks

You might also like