0% found this document useful (0 votes)
13 views

Module 4- Maintaining Computer systems and networks

css nc2

Uploaded by

Marwin Alvarez
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Module 4- Maintaining Computer systems and networks

css nc2

Uploaded by

Marwin Alvarez
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 67

CHS II C4-C1

COMPETENCY BASED LEARNING MATERIAL

Sector:
INFORMATION AND COMMUNICATION TECHNOLOGY
Qualification:
COMPUTER HARDWARE SERVICING NC II
Unit of Competency:
MAINTAIN COMPUTER SYSTEMS AND NETWORKS
Module Title:
MAINTAINING COMPUTER SYSTEMS AND NETWORK

TECHNICAL EDUCATION AND SKILLS DEVELOPMENT


AUTHORITY
Region 02
ISABELA SCHOOL OF ARTS AND TRADES
City of Ilagan, Isabela
SUMMARY OF COMPETENCY-BASED LEARNING MATERIALS

No. Unit of Competency Module Title Code

Installing computer
1. Install computer systems and systems and ELC724318
networks
networks
Diagnosing and
2. Diagnose and troubleshoot ELC724319
troubleshooting
computer systems
computer systems
Configuring computer
3. Configure computer systems ELC724320
systems and
and networks
networks
Maintaining ELC72432
4. Maintain computer computer systems
systems and networks 1
and networks

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 1 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
 HOW TO USE THIS MODULE

Welcome to the Module “Maintaining of Computer System and


Networks”. This module contains training materials and activities for you
to complete.

The unit of competency “Maintain Computer System and


Networks” contains knowledge, skills and attitudes required for a
Computer Hardware Servicing NC II Qualification.

You are required to go through a series of learning activities in order


to complete each of the learning outcomes of the module. In each
learning outcome there are Information Sheets, Job Sheets,
Operation Sheets, and Activity Sheets. Follow these activities on your
own and answer the Self-Check at the end of each learning activity.

If you have questions, don’t hesitate to ask your facilitator for


assistance.

Recognition of Prior Learning (RPL)

You may already have some of the knowledge and skills covered in
this module because you have:
been working for some time
already have completed training in this area.

If you can demonstrate to your trainer that you are competent in a


particular skill or skills, talk to him/her about having them formally
recognized so you don’t have to do he same training again. If you have a
qualification or Certificate of Competency from previous trainings show it
to your trainer. If the skills you acquired are still current and relevant to
this module, they may become part of the evidence you can present for
RPL. If you are not sure about the currency of your skills, discuss it with
your trainer.

After completing this module ask your trainer to assess your


competency. Result of your assessment will be recorded in your
competency profile. All the learning activities are designed for you to
complete at your own pace.

Inside this module you will find the activities for you to complete
followed by relevant information sheets for each learning outcome. Each
learning outcome may have more than one learning activity.

MODULE CONTENT
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 2 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
Qualification COMPUTER HARDWARE SERVICING NC II
Unit of
Maintain Computer Systems and Networks
Competency
Module Title Maintaining Computer Systems and Networks
INTRODUCTION:
This unit covers the outcomes required in maintaining computers
systems and networks.

LEARNING OUTCOMES:
1. Plan and prepare for the maintenance of computer systems and
networks.
2. Maintain computer systems
3. Maintain Network systems
4. Inspect and test configured/repaired computer system and
networks
ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and proce-
dures.
2. The materials, tools, equipments and testing devices obtained
and checked.
3. Computer systems and networks checked, identified and main-
tained with specifications and requirements to conform with man-
ufacturers.
4. The normal functions of computer systems are checked and
tested.
5. The scheduled/periodic maintenance and cleaning are performed.
6. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
7. The normal functions of network systems checked and tested.
8. The scheduled/periodic maintenance and cleaning performed.
9. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
10. Computer system and network checked to ensure safe operation.
11. Final inspection and testing taken to conform with manufacturer
specifications.
12. Reports prepared and completed to company regulations.

Prerequisite: PC Operation

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 3 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
TECHNICAL TERMS

 OHS – Occupational Health and Safety


 LAN Card – Local area network interface card.
 Server – is a part of a network. It is a special computer that users
on the network can asses to carry out a particular job.
 Port hub /Port – is a connector on the back of a computer or other
device. A port is either a serial port or a parallel port.
 Modem - (Modulator-Demodulator) The modem is a device that
allows a given computer to share data or otherwise a device which
let computers exchange information
 USB – (Universal Serial Port)
 Scanner- it is an input device that read text or illustration printed
on paper, translates the information into a form that a computer can
use.
 Printer - It is a piece of hardware that produces a paper copy (also
known as ‘hardcopy’) of the information generated by the computer.
 Flash drive – a portable storage device which is plug directly to the
USB port.
 Network – a group of computers and associated devices that are
connected by communications facilities.
 OS (Operating system) software that controls the allocation and
use of programs and data that a computer uses.
 Software – programs and data that a computer uses.
 Motherboard – contains the CPU, BIOS, Memory, mass storage in-
terfaces, serial and parallel ports, expansion slot and all the con-
trollers required to control standard peripheral devices such as the
display screen, keyboard and disk drive
 UTP – (Unshielded Twisted Pair) least expensive and most popular
network media.
 LAN – Local Area Network, the connection of computers within an
organization or a building.
 MAN – Metropolitan Area Network, the establishment of connection
among computers within a country or municipality.
 WAN – Wide Area Network, global connection of networked comput-
ers. Otherwise known as the internet.
 Maintenance - is the testing and cleaning of equipment.
 Planning – is both the organizational process of creating and main-
taining a plan; and the psychological process of thinking about the
activities required to create a desired future on some scale
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 4 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
Learning PLAN AND PREPARE FOR THE MAINTENANCE OF
Outcome #1 COMPUTER SYSTEMS AND NETWORKS.

CONTENTS:
 Plan/conduct maintenance procedures according to job require-
ments.
 Safety measures are observed at all times.
 Identify and diagnose faulty system.
 Prepare tools and test equipments.
 Identify or obtain PC specifications and schematic diagrams.
 Identify or obtain Network functions and specifications

ASSESSMENT CRITERIA:
1. Maintenance planned and prepared with OHS policies and proce-
dures.
2. The materials, tools, equipments and testing devices obtained and
checked.
3. Computer systems and networks checked, identified and main-
tained with specifications and requirements to conform with manu-
facturers.

CONDITION:
Trainees/trainees must be provided with the following:
 OHS guidelines and policies.
 PC specifications
 Network designs
 Schematic Diagrams
 Books/magazines
 Manuals

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration

LEARNING OUTCOME SUMMARY

ISAT Computer Hardware Date Developed: Document No.


TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 5 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
ISAT Computer Hardware Date Developed: Document No.
TESDA Servicing NC II January 2014 Issued by:
QA SYS- Maintaining Com- Page 6 of
TEM Developed by: Revision #00
puter Systems and 68
RODELIO B. TINAZA
Networks
Learning Experiences

Learning Outcome 1
Plan and Prepare for the Maintenance of Computer Systems and
Networks

Learning Activities Special Instructions


1. Read information sheet 4.1- If you have some problem on the
1 “Plan and Prepare content of the information sheets
Maintenance Procedures” don’t hesitate to approach your
facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheets, you can now
answer Self Check provided in the
module.
2. Answer self-check 4.1-1 Compare your answer to the answer
key 4.1-1. If you got 100% correct
answer in this self-check, you can
now Perform task Sheet 4.1-1. If not
review the information sheet and go
over the self-check again.
3. Perform Task Sheet 4.1-1 Compare your work to the
“Prepare an Equipment performance checklist. If you got
Maintenance Schedule” 100% correct answer in this task, you
can now move to the next Learning
Outcome. If not review the
information sheet and go over the
task again.
INFORMATION SHEET 4.1-1

Plan and Prepare Maintenance Procedures

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to
Plan and Prepare Maintenance Procedures

Introduction:

Planning and preparing systematic maintenance procedure will


save time, money and frustration. It is a good idea and opportunity to
learn the proper care and maintenance of your computer.
PC maintenance is an important topic for anyone who owns a PC.
Looking after your PC properly ensures you of trouble-free use. Regular
PC maintenance also keeps the machine’s
performance optimal.

A. Plan Maintenance Procedures for Computer System and


Networking.

1. Design a systematic maintenance plan for hardware.


 Monitoring, evaluating and updating plan.
 Place your computer in a well ventilated area.
 Schedule use of computers for its longer life.
 Move computers only when it is turned off and unplugged.
 Treat your computer properly.
 Maintain your hard disk
2. Design a systematic maintenance plan for your software.
 Backup your files
 Install or secure passwords
 Delete temporary files
 Update antivirus and spy ware

MAINTENANCE PROGRAM
DEFINITION OF TERMS
Maintenance Program- is a comprehensive list of maintenance
and its incidents. This would include all maintenance activities to be
undertaken , manpower needed, maintenance methods to be used, all
the materials and supplies needed for the maintenance and cost
involved in the maintenance.

Maintenance Schedule- Is a list allocating specific maintenance of


an area. Equipment and tools to a specific period. The maintenance
schedule is just a part of the maintenance program.

Quality management- is a method for ensuring that all the activities


necessary to design, develop and implement a product or service are
effective with respect to the system and its performance.
The following diagram is the Shewhart cycle (PDCA) for quality
improvements. Made popular by Dr. Deming.

The Quality Management Cycle(delete)

PLAN
= PLAN

DO
= IMPLEMENT

CHECK
= ASSESS/CORRECT

ACT
= SUSTAIN

The philosophy is to keep improving the quality of an organization. It is


defined by the four key steps:

 Plan: Design and revised business process components to im-


prove results.
 Do: Implement the plan and measure its performance
 Check: Assess the measurements and report the results to deci-
sions makers
 Act: Decides on changes needed to improve the process.

The consolidation phase enables the organization to take stock of


what has been taking place and to ensure made to processes that
require documentation (both to allow processes to be repeatable and
to facilitate recognition of the achievement of some form of quality
standard).

1. Plan. Here in this stage an organization must be able to prepare


a good maintenance program which will define the standards for
Best Management Practices. The maintenance program must
clearly answer the question on WHY,WHO,WHAT,WHEN, WHERE
and HOW.
WHO WHY

WHAT Facilities Maintenance How

WHERE WHEN

Why Maintain?

1. General Objective:

To maintain the optimum condition of physical facilities at


acceptable levels and minimum cost to satisfy the expected demands
of TVET programs and activities.

2. Specific Objectives:

 To extend the useful life of physical facilities


 To assure the operational readiness of installed equipment
and maximum possible return on investments.
 To properly discard hazardous wastes
 To ensure the safety of personnel using the facilities, physi-
cal properties and the environment.

What can we gain from maintaining our facilities?

 Ensured SAFE environment


 Improve MORALE of human resources
 Reduced operational COST
 Increased PRODUCTION
 Prolonged LIFE facilities
 Prompt DELIVERY of services/ product
WHO?

 Who will manage the activities?


 Who will monitor and evaluate the operations?
 Who will prepare the maintenance schedule?
 Who will implement the program?
 Who will keep the records?
 Who will conduct inspection?
 Who will certify and accept the work?
 Who will prepare the report?

What, Where, When?

 What routine actions must be done to keep the device on


working order?
 Where is the maintenance activity to be carried out?
 When do you perform the maintenance activities?

How to maintain?

The question on how do we implement the maintenance program


will center on the 5Ms are as follows:

 Manpower
 Money (Financial Resources)
 Methods and System
 Machines (Facilities)
 Materials and Supplies

2. DO. Here in this stage the organization through the clearly iden-
tified Maintenance Program, must be able to practice the Meth-
ods and System defined in order to meet the standards (measur-
able performance levels of maintenance execution) established.
5S

Maintenance Methods
and System
Preventive Maintenance
Corrective Maintenance
Overall, the combination of standards, methods and
strategies are elements of an integrated Planted Maintenance
System.

SAMPLE EQUIPMENT MAINTENANCE SCHEDULE


In order to perform the maintenance of specific equipment, a
Maintenance Schedule is drawn to guide the personnel in the proper
methods system . One best source of the list of the maintenance
activities of equipment is its manufacturer’s manual, In the absence of
it, the plan can be derived from the known maintenance methods of
the equipment.

Below is the sample Equipment Maintenance Schedule for Welding


Machine in the Practical Work area of a Training Center for SMAW NCII.
You may see that that this maintenance schedule is for a specific
equipment only, denoted by unique property code.
SAMPLE TEMPLATE NO. 2 EQUIPMENT MAINTENANCE SCHEDULE

EQUIPMENT TYPE Personal Computer

EQUIPMENT CODE PC 1

LOCATION Practical Work Area


Schedule for the Month of September 2010
ACTIVITIES MANPOWER
Every Every
Weekl Mont Rema
Daily Other 15th
y hly rks
Day Day
1. Clean PC Trainer/utility/
x
trainees
2.Check
Trainer/utility x
Hardisk
3.Check power
Trainer x
source and lines
3. CHECK. To determine if the maintenance program is implemented
according to what is planned, an assessment must be done. The re-
sult of the assessment will then be recorded and recorded to the
proper authorities for the immediate action.

Regular inspections are conducted to assure that the maintenance


activities are done on the date and time it was planned and that the
performance levels adhered to the defined standard.

SAMPLE EQUIPMENT INSPECTION CHECKLIST

Below is a sample Maintenance Inspection Checklist. You may note that


this checklist pertains to the same equipment with the Maintenance
Schedule (see sample). This checklist will confirm if the maintenance
activities have been performed in order to prolong the life of this
particular equipment. The Inspection items are stated in a question
form as these serve as the criteria or standards of maintenance.

Sample Template No. 3 : MAINTENANCE INSPECTION CHECKLIST

Equipment Type : PERSONAL COMPUTER


Property Code : ISAT-TESDA PC 003
Number : PC1
Location : Practical Work Area

YES NO INSPECTION ITEMS


√ 1. Is the machine turned off after use?
√ 2. Are accessories checks for damage?
√ 3. Are terminals, connections check for loose?
√ 4. Is the machine regularly cleaned?
5. Is the machine used properly according to manu-

facturers spec?

4. ACT. The inspection will allow the organization to determine if the


standards of maintenance are met. This will also allow the identifica-
tion of further improvement in the process and procedures. Hence,
the results of the inspection must be properly documented and re-
ported to the proper authorities for immediate action or correction
needed.

A. PROPER UTILIZATION OF EQUIPMENT AND TOOLS

The proper use of the training tools and equipment is the first and
foremost task in the maintenance. The proper use of tools and
equipment is a very important task of the worker in any trade. They
must be able to use them in accordance to the manufacturer’s manuals
as this would evidently extend the life of the equipment and tools.

USER’S MANUAL: For the Safe and Proper Operation of an


Equipment or Tools.

When using equipment and simple tools, it is best to read the


manufacturer’s and
/or user’s manuals. This would indicate the part of the equipment, the
functions of each part and the way to maintain it. We must always refer
to it for reference. The user’s manuals must be kept handy and within
the Quality Control Area where the equipment is kept for immediate
reference.

Self-Check 4.1-1

TRUE OR FALSE: Write T if the statement is True and F if the statement


is False.

____1. Planning and preparing systematic maintenance procedure


will save time, money and frustration.
____2. PC maintenance is not so important topic for anyone who
owns a PC.
____3. Maintenance Program is a comprehensive list of maintenance
and its incidents.
____4. Regular inspections are conducted to assure that the
maintenance activities are done on the date and time it was
planned and that the performance levels adhered to the
defined standard.
____5. The proper use of the training tools and equipment is the first
and foremost task in the maintenance.
Answer Key 4.1-1

1. T
2. F
3. T
4. T
5. T

TASK SHEET NO. 4.1-1


Title : Prepare Equipment Maintenance
Schedule
Performance Objective : After reading the Information Sheet
No. 4.1-1, Using the Blank Template, YOU MUST
be able to prepare EQUIPMENT MAINTENANCE
SCHEDULE of the Personal computer assigned
to you.

Supplies, Tools & Equipment :


1. Template on maintenance schedule
2. Personal Computer & peripherals
3. Computer Tools & materials

Steps/ Procedure:
1. Prepare all your reference materials and laptop/PC
2. Fill up all items in Template.
3. Tick the schedule corresponding to each given activity.
4. Call your facilitator who will guide you and check your work after
doing this activity.

Assessment Method:
Demonstration , Performance Criteria checklist

SAMPLE TEMPLATE NO. 1 EQUIPMENT MAINTENANCE


SCHEDULE

EQUIPMENT TYPE Desktop Computer


EQUIPMENT CODE P. C. #1
LOCATION Practical Work Area
Schedule for the Month of July 2011
ACTIVITIES MANPO
Daily Every Week Every Mont Rema
WER
Other ly 15th hly rks
Day Day
1. Checking
Trainer/
hard disk trainees
for bad X
sector and
errors.

2. Defragging
Trainer/ X
hard disk trainees
3. Removing
Trainer/
unwanted trainees x
files
Trainer/
4. Managing
trainees x
files
Trainer/
5. Scanning
trainees
computers x
for viruses
Trainer/
6. Fixing reg-
trainees
istry prob- X
lems
Trainer/
7. Cleaning in-
trainees
ternal X
parts
Trainer/
8. Cleaning
trainees
external x
parts
Performance Criteria Checklist

CRITERIA Ye
No
Did you… s
Used the template in maintenance schedule
Prepared materials and equipment

Observed safety procedures in accordance with the


manufacturer’s instruction
Checked PPE condition in accordance with the
manufacturer’s instruction
Planned Maintenance schedule properly

LEARNING OUTCOME SUMMARY


Learning MAINTAIN COMPUTER SYSTEMS
Outcome #2

CONTENTS:
 Procedures in maintaining computer systems are followed
 Safety measures are observed.
 Diagnose and identify faulty systems.
 Run diagnostics software.
 Repair or replace faulty system
 Burn-in or test repaired or replaced computer system

ASSESSMENT CRITERIA:
1. The normal functions of computer systems are checked and
tested.
2. The scheduled/periodic maintenance and cleaning are per-
formed.
3. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures
CONDITION:
Trainees must be provided with the following:
1. WORKPLACE LOCATION
2. EQUIPMENT
3. Tools
PC specification Chamois or rags Long nosed pliers
Schematic Diagrams Basin/ water Allen bit wrench
Gloves and goggles Diagnostics soft- Multi-tester
Masks ware’s and CDROMs Spare parts
Anti-static wrist wraps Slotted head screw-
Contact cleaners/ soap driver
or detergents Philips head screw-
Dust brush driver

EVALUATION METHOD:
1. Hands-on
2. Direct observation
3. Practical demonstration

Learning Experiences

Learning Outcome 2
MAINTAIN COMPUTER SYSTEMS
Learning Activities Special Instructions
1.Read information sheet If you have some problem on the
4.2-1 “Maintain Computer content of the information sheet don’t
Systems” hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
perform Job Sheet provided in the
module.
2. Answer self-check 4.2-1 Compare your answer to the answer
key 4.2-1. If you got 100% correct
answer in this self-check, you can
now Perform task Sheet 4.2-1. If not
review the information sheet and go
over the self-check again.
3. Perform Job Sheet 4.2-1 Compare your task to the
“Computer System Mainte- performance checklist. If you got
nance” 100% correct answer in this task, you
can now move to the next learning
outcome. If not review the
information sheet and go over the
task again.

INFORMATION SHEET 4.2-1


MAINTAIN COMPUTER SYSTEM

Learning Objective:
After reading this INFORMATION SHEET, YOU MUST be able to
Maintain Computer System

How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk


Clean Up

2. Select Drive to Clean Up and click “OK”

3. Place Check Marks in Items to be removed Click “OK”

(If you’re not sure what you are deleting select the category and then
Click “View Files”)

--------------------------------------------------------------------------------

How to Clear Internet “History”


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click “Clear History”

3. Click “OK”

--------------------------------------------------------------------------------

How to Clear Internet “Temporary Internet” Files


1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet Options

2. Click “Delete Files”

3. Put check mark in “Delete all Offline Content”

4. Click “OK”

5. Click “OK” again

--------------------------------------------------------------------------------

How to Run Scan disk and Disk Defragmenter without interruption:


Start Menu>>Run >>In Run Type “MSCONFIG” then click “OK”
MSCONFIG will appear
Select “Selective Startup” then Uncheck
“Load Startup Group Items”
Click “OK”
Click Yes to Restart Computer
Upon Restart
Start Menu>>Settings>>Control Panel>>Dbl Click Display
Select the “Screen Saver” Tab
Change the Screen Saver Drop Menu to “NONE”
Click OK

Then Perform Scan Disk:

Start Menu>>Programs>>Accessories>>System Tools>>Scan Disk

After Scan Disk Perform Disk Defragmenter

Start Menu>>Programs>>Accessories>>System Tools>>Disk


Defragmenter
Select which disk to Defragment then click “OK”

After Disk Defragmenter

Start Menu>>Run >>In Run Type “MSCONFIG” then click “OK”


MSCONFIG will appear>>select “Normal Start Up” and Click “OK”
Click Yes to Restart Computer
Upon Restart

Start Menu>>Settings>>Control Panel>>Dbl Click Display

Select the “Screen Saver” Tab>>Change the Screen Saver Drop Menu
to your preferred screen saver

Click OK
Removing viruses from infected machines

Computer Virus

 A virus is a destructive executable program that


infects the other programs in the system and
spreads by replicating itself.
 Such a program is designed to damage the vic-
tim’s computer files.

 Viruses are coded by malicious programmers in a way that they


can spread in the system without one's permission and knowl-
edge.

Different Aspects of Computer Virus


Finder- searches for the new uninfected files and the
Replicator- actually targets these files and infects it by multiplying
itself.

How do Virus Affects a System?


 It corrupts files
 It slows down the speed of the computer system
 It causes the system to hang frequently
 It deletes various files

Sources of Virus Infection

A virus can enter the system and infect it through various sources.
Some of the sources are

 Infected CDs, DVDs, pen drives, etc


 E-mail
 Browsing infected sites
 Downloading files from the internet

Steps to Remove Viruses

Removing viruses, though technical, is yet a very simple process if all


the required steps are properly followed.

The basic steps are:

 Buy or download an antivirus software


 Install the antivirus software
 Update antivirus software with the latest virus definitions
 Do a complete system scan

Methods of Eliminating Viruses

Removing the virus – When the virus can be easily identified and can
be removed without affecting other files, then the antivirus removes it
from the host place.

Quarantine – This is done when the virus cannot be easily identified


removed from the file and the removal of virus means the removal of
the complete file. In this method, although the virus is not eliminated,
it is rendered inactive by moving the file into "quarantine" and
renaming it.

Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master
boot records in hard disks. They replace the boot record program
(which is responsible for loading the operating system in memory)
copying it elsewhere on the disk or overwriting it. Boot viruses load into
memory if the computer tries to read the disk while it is booting.

Examples: Form, Disk Killer, Michelangelo, and Stone virus


Program viruses: These infect executable program files, such as those
with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS
(device driver). These programs are loaded in memory during
execution, taking the virus with them. The virus becomes active in
memory, making copies of itself and infecting files on disk.

Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect


program files and when the infected program is executed, these
viruses infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid


detection. They may either redirect the disk head to read another
sector instead of the one in which they reside or they may alter the
reading of the infected file’s size shown in the directory listing. size
given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways
so that it appears differently in each infection. These viruses are more
difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus
101

Macro Viruses: A macro virus is a new type of computer virus that


infects the macros within a document or template. When you open a
word processing or spreadsheet document, the macro virus is activated
and it infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software

Software designed to cure virus infected machines. An antivirus is a


program that searches for, identifies and removes potential viruses
existing in the computer system

Examples of Anti-virus software

 Symantec Norton antivirus


 AVG antivirus
 McAfee Scan
 Microsoft Antivirus

Back up your files

As our world becomes more digitized, the files we store on our


computers are becoming increasingly more important. Instead of
keeping handwritten letters in a shoebox, we correspond with family
members using e-mail. If we use digital cameras, we often keep our
photo albums on our computers.

Unfortunately, computers (and particularly the hard disk drives that


hold your files) can fail. Your computer might run for a decade with no
problems, or it could fail tomorrow—there's no way to tell. To make
sure you don't lose important files if your computer stops working, you
should back up your computer on a regular basis. The backup process
copies your files to a safe place so that even if your computer fails, you
won't lose them.

Choose backup storage

It doesn't make sense to back up your files to the hard disk drive inside
your computer, because if your computer were to fail, you would also
lose your backup. Instead, you should back up your files to an external
hard disk drive or removable disk drive, such as a CD. If your computer
does fail, you can then connect the external hard disk drive or use the
CDs to restore your files to your new or repaired computer. (This article
describes how to back up your files to an external hard disk drive,
which is the easiest way to do a full backup of all your files. If you
decide to use CDs, you'll need to choose which files to back up and
then manually insert and remove CDs as they are filled.)

If you decide to get an external hard disk drive, choose one that is at
least as large as the hard disk drive inside your computer. For
example, if your computer has a 100-gigabyte (GB) hard disk drive,
choose a 100-GB or larger external hard disk drive. Then connect the
external hard disk drive to your computer. Make a note of the drive
letter (such as E:, F:, or G:) assigned to your new hard disk drive.

With an external hard disk drive, you can manually back up your files,
or you can schedule automatic weekly backups.

Manually back up your files

To back up your files to an external hard disk drive

1. Click Start, point to Accessories, point to System Tools, and


then click Backup. If the Backup option does not appear on the
System Tools menu, you can install it.

2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.


4. On the What to Back Up page, click All information on this
computer, and then click Next.

5. On the Backup Type, Destination, and Name page, click


Choose a place to save your backup, and select your external
hard disk drive. Then click Next.

6. On the Completing the Backup or Restore Wizard page, click


Finish.

7. Windows Backup saves a copy of your files to your external hard


disk drive. When the backup is complete, click Close.

If your computer stops responding, you will be able to restore your files
to the state they were in when you completed the backup. However,
any new files you have created and any changes you have made to
existing files since the backup occurred will not be saved unless you
back up your files again. For best results, back up your files every week
or immediately after creating important files, such as after you copy
pictures from your digital camera.

For an additional layer of protection, purchase a second external hard


disk drive and perform another backup of your hard disk drive. Store
this external hard disk drive in a different location, such as at a family
member's house, to protect your files from theft, fire, or natural
disasters that might damage both your computer and your backup.

Schedule backups

If you're busy, you might not have time to manually back up your files
every week. Fortunately, you can schedule backups to occur
automatically. This takes a few minutes to set up, but once you've
done so, you'll be protected indefinitely.

To schedule a weekly backup

1. Click Start, point to Accessories, point to System Tools, and


then click Backup. If the Backup option does not appear on the
System Tools menu, you can install it.

2. The Backup or Restore Wizard appears. Click Next.

3. On the Backup or Restore page, click Next.


4. On the What to Back Up page, click All information on this
computer, and then click Next.

5. On the Backup Type, Destination, and Name page, click


Choose a place to save your backup, and select your external
hard disk drive. Then click Next.

6. On the Completing the Backup or Restore Wizard page, click


Advanced.
7. On the Type of Backup page, click Next.

8. On the How to Back Up page, click Next.

9. On the Backup Options page, select Replace the existing


backups. Then click Next.
10 On the When to Back Up page, click Later. In the Job name
. box, type Backup. Then click Set Schedule.

11 On the Schedule tab in the Schedule Job dialog box, click the
. Schedule Task list, and then click Weekly.

12 In the Start time box, specify a time of day when your computer
. will not be used for several hours, such as 3:00 AM. In the
Schedule Task Weekly area, select the day of the week you
want to back up your files. If you are backing up files overnight,
remember to leave your computer running the night before.

13 Click the Settings tab. Select the Wake the computer to run
. this task check box.

14 Click OK.
.

15 In the Set Account Information dialog box, type your password


. in both the Password and Confirm password fields. Then click
OK.

16 On the When to Back Up page, click Next.


.

17 In the Set Account Information dialog box, type your password


. in both the Password and Confirm password fields. Then click
OK.

18 In the Account Information Warning dialog box, click OK.


.

19 On the Completing the Backup or Restore Wizard page, click


. Finish.
Your computer will automatically back up your files to your external
hard disk drive every week at the time you specified.

How to change an installed program


Note You cannot use this feature to modify all programs.

You can use this feature to change the installation of Windows Installer-
based programs such as Microsoft Office XP. Windows Installer-based
programs include a Maintenance Mode option. With this option, you can
add or remove features, change the installation state of the program or
of individual components, or repair and restore the installation.

To change a program, follow these steps:


1. Click Start, click Control Panel, and then double-click Add or
Remove Programs.
2. In the Currently installed programs box, click the program
that you want to remove, and then click Change or Change/Re-
move.
3. Follow the instructions that appear on the screen to make the
changes that you want.

How to remove an installed program


To remove a program that is installed on your computer, follow these
steps:
1. Click Start, click Control Panel, and then double-click Add or
Remove Programs.
2. In the Currently installed programs box, click the program
that you want to remove, and then click Remove.
3. If you are prompted to confirm the removal of the program, click
Yes.

Troubleshooting
 Make sure that the program that you click in the Add or Remove
Programs tool is the program that you want to remove from your
computer. Some programs may not prompt you to confirm the
removal before the program is removed from the computer.
 You can only remove a program with the Add or Remove Pro-
grams tool if the program is written for Windows. If you do not
see the program that you want to remove in the Currently in-
stalled programs box, view the program documentation for in-
structions about how to remove it.
Self-Check 4.2-1

Arrange the procedures to their proper order.

1. How to perform Disk Clean Up:

_____ Start Menu>>Programs>>Accessories>>System


Tools>>Disk Clean Up

______ Place Check Marks in Items to be removed Click “OK”

______ Select Drive to Clean Up and click “OK”

2. How to Clear Internet “History”

______ Click “OK”

______ Click “Clear History”

______ Start Menu>>Settings>>Control Panel>>Dbl Click Internet


Options

3. Perform Scan Disk:

_____ Scan Disk

_____ Start Menu

_____ Accessories

_____ Programs

_____ System Tools


Answer Key 4.2-1

1. How to perform Disk Clean Up:

1. Start Menu>>Programs>>Accessories>>System Tools>>Disk


Clean Up

2. Select Drive to Clean Up and click “OK”

3. Place Check Marks in Items to be removed Click “OK”

2. How to Clear Internet “History”

1. Start Menu>>Settings>>Control Panel>>Dbl Click Internet


Options

2. Click “Clear History”

3. Click “OK”

3. Perform Scan Disk:

1. Start Menu
2. Programs
3. Accessories
4. System Tools
5. Scan Disk
Job Sheet 4.2-1

Title : Computer System Maintenance


Performance Objective : Given a working personal computer you are
going external & internal parts, install/Update anti-virus,
scan computer for virus, remove unwanted files, run disk
defragmenter, scandisk, Back-up file using windows utility,
remove unnecessary software, Clear internet history &
temporary files.

Supplies, Tools & Equipment :


 Working PC
 Screw driver
 Anti-virus software
 Paint Brush
 Vacuum cleaner
 Printer

Steps/ Procedure:
1. Shut down computer
2. Be sure to unplug it from power source
3. Remove cables and other peripheral devices
4. Clean Inside and outside parts of the system
5. Connect cables and peripherals
6. Start the computer
7. Install/Update anti-virus program
8. Scan computer for viruses
9. Remove unnecessary programs
10. Clear Internet history and temporary files
11. Run disk cleanup
12. Run desk defragment tool
13. Perform scandisk
14. Let your trainer check your work.

Assessment Method:
Demonstration , Performance Criteria checklist

Performance Criteria Checklist 4.2-1


CRITERIA Ye
No
Did you… s
Shut down computer
Unplug from power source
Removed cables and other peripheral device
Cleaned Inside and outside parts of the system
Re-connected cables and peripherals
Started the computer
Installed/Updated anti-virus program
Scanned computer for viruses
Removed unnecessary programs
Cleared Internet history and temporary files
Ran disk cleanup
Ran desk defragment tool
Performed scandisk
Followed safety procedures

LEARNING OUTCOME SUMMARY


MAINTAIN NETWORK
LEARNING OUTCOME #3
SYSTEMS
CONTENTS:
 Procedures in maintaining network systems are followed
 Safety measures are observed.
 Diagnose and identify faulty systems and cables.
 Run diagnostics software.
 Repair or replace faulty systems and cables.
 Burn-in or test repaired or replaced network system.
ASSESSMENT CRITERIA:
1. The normal functions of network systems checked and tested.
2. The scheduled/periodic maintenance and cleaning performed.
3. The repairs/replacements and sudden breakdowns responded in
accordance with established procedures.
CONDITION:
Trainees must be provided with the following:
1. PC and network specification 7. Diagnostics softwares and
2. Network Cables and peripherals CDROMs
 UTP Cat. 5 cables 8. Tools and test equipments
 UTP Cat.3 cables  Slotted head screw-
 RJ 45 modular plug driver
 Hubs/switches  Philips head screw-
3. Modem/router driver
4. Network layout and schematic dia-  Long nosed pliers
grams  Allen bit wrench
5. Personal protective equipments  Crimping tool
 Gloves and goggles  Cable tester
 Masks  Multi-tester
 Anti-static wrist wraps 9. Spare cables
6. Materials
 Contact cleaners/ soap or deter-
gents
 Dust brush
 Chamois or rags
 Basin/ water

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration
Learning Experiences

Learning Outcome 3
MAINTAIN NETWORK SYSTEMS

Learning Activities Special Instructions


1. Read information sheet If you have some problem on the
4.3-1 “Maintain content of the information sheet don’t
Network System” hesitate to approach your facilitator.
If you feel that you are now
knowledgeable on the content of the
information sheet, you can now
answer self check provided in the
module.
2. Answer self-check 4.3-1 Compare your answer to the answer
key 4.3-1. If you got 100% correct
answer in this self-check, you can
now Perform Job Sheet 4.3-1. If not
review the information sheet and go
over the self-check again.

3. Perform Job Sheet 4.3-1 Compare your work to the


Maintain Network Performance Checklist. If you got
System 100% correct answer in this task, you
can now move to the next learning
outcome. If not review the
information sheet and go over the
task again.

INFORMATION SHEET 4.3-1


MAINTAIN NETWORK SYSTEM
Learning Objective:

After reading this INFORMATION SHEET, YOU MUST be able to Maintain


Network System

Change Workgroup and Computer Name


A Windows XP workgroup connects computers in a network in order to
share files. A workgroup also connects hardware, such as printers and
scanners.
Instructions
1. Set up a Windows XP workgroup on your PC. Click the "Start" menu
in the lower left-hand corner of your WIndows XP screen and select
"My Computer."
2. Right-click on the icon for "My Computer." Click "Properties" in the
pop-up menu. A "System Properties" window will appear on the
screen.
3. Click the tab for "Computer Name." Click the "Change" button at the
bottom of the window.
4. Enter a name for the Windows XP workgroup and computer
Name. It is important to remember this name. Click "OK."
5. Restart computer.

How to change Static IP Address (Win XP)


I want to do this!

This guide will show the user how to set up a static IP address in
Windows XP.
By default most broadband internet service providers automatically
assign your computer a new IP address every time it boots up. This is
called a Dynamic IP address.
A static IP address assigns one permanent IP to your computer. This is
useful if you want to host a website, access your computer remotely, or
run any kind of server.
Instructions

Things You'll Need:


 PC with Windows XP
 Broadband Internet Access
 Pencil and paper

1. First you'll need to take down some IP information so


if you don't have something to write with open up
notepad.

Click on the Start Menu then select Run. A window like


this one should appear. In this window type "command" and press
enter.
2. A black DOS screen should appear. Type "ipconfig /
all" in the DOS prompt and press enter. All your IP in-
formation should generate. This is a helpful com-
mand to know if you ever have to find your IP ad-
dress or other info about your internet connection.
Be sure to write down your IP Address, Subnet Mask,
Default Gateway, and both DNS servers. After your
are done type "exit" and press enter to exit the DOS window.
(Note: If both DNS server addresses are the same then they are just
proxy numbers used by your router and you will have
to either log onto your router status page or call your
ISP and ask for your DNS or Name server addresses.)
3. Now click "Start" and open up the "Control Panel." Se-
lect "Network Connections" and right click on the con-
nection you use and select "Properties."
4. A window like this one should appear. Select "Internet
Protocol (TCP/IP)" and click on Properties.
5. window like the one pictured will pop up. "Obtain an IP address auto-
matically," should be selected. If it isn't then congratulations, you
have a static IP already.
Select "Use the following IP address."
Enter the following:

IP Address -- Type in the


IP address you wrote
down but change the
last digit to a number
between 1 and 255. For
example, if your IP address is "192.168.1.1" you would enter
"192.168.1.11" or "192.168.1.101"
Subnet Mask / Default Gateway -- Enter these exactly as you copied
them down.
6. Next click "Use the following DNS server addresses" and add the
DNS servers you copied down or found in your router settings.
After you've entered all the information your screen should look
something like the picture to the left.
7. Now make sure you can connect to the internet and congratulations!
You now have a static IP address!
If you can't connect to the internet the most common problem is the
DNS servers. Make sure your DNS servers are correct. If you can't
find your router settings just call your ISP and they should be able to
give you your DNS or Name Servers.

How to determine if you have a network adapter

Many newer computers have a network adapter


built in that you can use to connect to a wired
network. If you want to install a wired network adapter
and aren't sure whether your computer already has one, look for a
network port on the back of the computer. Network ports resemble
phone jacks, but they are slightly larger and have eight pins inside.

To see what kind of network adapters may already be installed


in your computer.

1. Click the Start, and then click Control Panel

2. Under or pick a Control Panel icon, click Network


Connections

3. Microsoft Windows XP displays your network adapters. If an


adapter has a red X over it, it is disconnected. If the Network
Connections window is blank, your computer doesn't have a
network adapter.

4. If you already have a network adapter, you are ready to


configure your network.

How to install a wired USB network adapter

Once you have the adapter…

 If your USB network adapter came with software, insert the CD


or floppy disk into your computer, and follow the
manufacturer's instructions to install the software.

 Find an available USB port on your computer.

Note: If you need to move your computer to


reach the USB ports, you should shut down
Windows to avoid damaging your computer.
If you can easily reach a USB port, you need
not shut down your computer.
 If you do not have an unused USB port, connect a USB hub to
add additional ports. Then connect your USB network adapter
to the unused USB port.

 Connect the network cable to the network adapter.

5. Connect the other end of the network cable to your


networking equipment.

1. If you had to shut down your computer to get to the USB port,
you can now turn on your computer. Windows detects and
installs the new hardware, and then displays a notification
informing you that the hardware has been successfully
installed.

How to Find an IP Address With CMD


Using the Windows command shell (CMD.exe) to configure networking
is a more complex undertaking than using the GUI (Graphical User
Interface) equivalent. Command shells are not intuitive and can be
intimidating. However, the command prompt also affords access to
more complex information than is found in the adapter properties
dialog. Here, information can be found on IP addresses, both IPv4
(Internet Protocol version 4) and IPv6 types, all in one stream of
information.

Instructions
Opening the command shell
1. Click the Start button, then select "Run."
2. Type the following into the dialog box: "cmd.exe". Do not include
the quotes.
3. Click "OK."
Working with ipconfig
4. Type the following into the command shell: "ipconfig /all" Doing this
will give you a list of network adapters. Use the scroll bar to read
through the adapter names. Find the adapter you want to work
with.
5. Type in the following: ipconfig /release "adapter" Replace "adapter"
with the name of the adapter you want to work with. Make sure to
include the quotes around the name of the adapter.

Once you've run the release operation, the adapter will be without
any network info.
6. Run the following: ipconfig /renew "adapter" Again, replace
"adapter" with the name of the adapter you are working with. This
will tell the adapter to look for new network info.
7. Run "ipconfig /all" to confirm the adapter has picked up new net-
work info -- including a valid IP address
Fix IPconfig in XP Pro
IPconfig is a program built into the Windows XP Professional operating
system that allows users to manage their Internet protocol, or IP,
settings and perform other network-related tasks. If IPconfig begins
exhibiting strange behavior or fails to run, the program must be fixed
in order to ensure full network functionality for your computer. As
IPconfig is a fully integrated component of the hard drive, this means
reinstalling your operating system.

Instructions

Things You'll Need:


 Windows XP Pro disk

1. Place the Windows XP Pro disk into your computer.


2. Open the "Start" menu, select the "Turn off" option and select the
"Restart" option.
3. Press any key as the computer loads to boot from the CD.
4. Hit "Enter" once the installation screen loads.
5. Press "F8" at the licensing screen.
6. Select your installation of Windows from the list that appears on-
screen and press "R." This will reinstall Windows and restore your
IPconfig program to full functionality.

How to Ping My Computer


If you are having an issue with a computer or network, you can "ping"
it to determine if a problem exists. A "ping" is a signal sent to a
network or computer to elicit a response in order to determine whether
or not it is connected. You can tell if an entire network is down if no
computers on the system respond to the ping, or identify an isolated
incident due to a failed ping of one computer. It is easy to use the ping
function if you follow a few simple steps.

Instructions

Things You'll Need:


 IP address

1. Determine your IP address. You will need this number


to ping your computer. If you do not know the IP ad-
dress of your computer, use the website linked in Re-
sources.
2. Click once on the Windows "Start" button and select the
"Run" option.
3. Type the letters CMD into the "Open" filed on the
"Run" window and click once on the "OK" button.
This action will launch the "DOS" prompt.

4. Type the word "ping" followed by a space


and then your IP address at the DOS prompt (e.g. ping
111.22.33.4). Press the "Enter" key once.
5. View the results of the ping. If a result of "Request
timed out" appears, then there is a problem with ei-
ther the computer or the network. A successful ping
will result in a response of "Reply from" followed by
the IP address.
Self-Check 4.3-1

Select the best answer of the given choices.

1. Which of the following is wrong I.P. address


A. 192.168.0.4
B. 194.167.5.7
C. 255.277.0.3
D. 123.123.123.123

2. A windows XP _______ connects computers in a network order to


share files.
A. Workgroup
B. User Account
C. Computer Name
D. None of the above

3. It is a program built into the windows XP Professional Operating


System that allows user to manage their internet protocol.
A. CMD
B. IPCONFIG
C. Ping
D. Format

4. ______ is a signal sent to a network or computer to elicit a


response in order to determine whether or not it is connected.
A. Copy
B. IPCONFIG
C. CMD
D. Ping

5. Which of the following is not a component used for networking.

A. Modem
B. Video card
C. LAN card
D. Hub

Answer Key 4.3-1

1. D
2. A
3. B
4. D
5. B

Job Sheet 4.3-1


Title : Maintain Network System
Performance Objectives:
Given a working personal computer you are going to maintain
network system, change the computer name and workgroup,
assign static IP address.
Supplies, Tools & Equipment :
 Working PC
 Server
 LAN Cable
 Hub/Switch

Steps/ Procedure:
1. Start Computer
2. Change workgroup and computer name based on the servers
Workgroup.
3. Assign Static IP Address
4. Check the connectivity

Assessment Method:
Demonstration , Performance Criteria checklist
PERFORMANCE CHECKLIST

Performance Criteria
Did you… Yes No

1. Started the computer properly

2. Checked the configuration of computer system and


network

3. Changed workgroup and computer name

3. Made necessary maintenance

4. Followed safety procedures while performing inspection

LEARNING OUTCOME SUMMARY


Learning Inspect And Test Configured/Repaired Computer
Outcome #4 System And Networks
CONTENTS:
1. Check the maintained/serviced computer systems to ensure safe
operation.
2. Run or conduct computer to computer communications.
3. Connect to the internet if necessary.
4. Burn-in serviced or replaced components.
5. Return computer to networking area.
6. Document the task undertaken.

ASSESSMENT CRITERIA:
1. Computer system and network checked to ensure safe operation.
2. Final inspection and testing taken to conform with manufacturer
specifications.
3. Reports prepared and completed to company regulations.

CONDITION:
Trainees must be provided with the following:
a. PC specification
b. Schematic Diagrams
c. Diagnostics software’s and CDROMs
d. Books/manuals/magazines
e. Tools and test equipments
i. Slotted head screwdriver
ii. Philips head screwdriver
iii. Long nosed pliers
iv. Allen bit wrench

EVALUATION METHOD:
 Hands-on
 Direct observation
 Practical demonstration

Learning Experiences

Learning Outcome 4
Inspect And Test Configured/Repaired Computer System And Networks

Learning Activities Special Instructions


1. Read information sheet 4.4- If you have some problem on the
1 “Inspect And Test content of the information sheet don’t
Configured/Repaired hesitate to approach your facilitator.
Computer System And If you feel that you are
Networks” knowledgeable on the content of the
information sheet, you can now
answer self check provided in the
module.
2. Answer self-check 4.4-1 Compare your answer to the answer
key 4.4-1. If you got 100% correct
answer in this self-check, you can
now Perform Job Sheet 4.4-1. If not
review the information sheet and go
over the self-check again.

3. Perform Job Sheet 4.4-1 Compare your work to the


Inspect And Test Performance Checklist. If you got
Configured/Repaired 100% correct answer in this task, you
Computer System And can now move to the next
Networks Competency. If not review the
information sheet and go over the
task again.

INFORMATION SHEET 4.4-1


Inspect and Test Configured/Repaired Computer System and
Networks

Checking and Maintained Computer Systems:


The effectiveness of checking maintained computers depends on
the quality of inspection. A quality inspection of computer systems
must include the following:

 Powering On the Computer


 Testing all the computers’ devices
- Check if all the devices are working prop-
erly
a. Monitor
b. Keyboard
c. Mouse
 Checking the computers’ performance
- Check if the computer is performing at its
best
 Inspecting the cables attached on the computer
- Check if the Cables are fixed properly
a. Power Cables
b. LAN Cables
c. PS2 Cables
d. USB Cables
e. Monitor Cables

Reasons for Running Computer to Computer Communications:

The effectiveness of running computers to computer


communications is to make sure that the computers in a network is
connected properly for effective and easier sharing files and
information. A quality inspection of computer communications must
include the following:

 Pinging - The ping command is the basic tool for test-


ing TCP/IP connectivity. It sends a special packet (called
ICMP Echo) to a particular IP address and looks for a re-
ply.

 Determining TCP/IP Settings - TCP/IP settings that


are used in network settings are:
- IP Address – Unique address assigned to a network
adapter. A computer with multiple network
adapters has an IP address for each one, and each
one must be in a different subnet.
- Subnet Mask – Used in conjunction with the IP ad-
dress to determine which subnet an adapter be-
longs to.
- Default Gateway - IP address of a computer or
router, on one of this computer’s local area net-
works, that knows how to communicate with sub-
nets not present on this computer.

- DHCP Server – If an adapter is configured to ob-


tain an IP address automatically, this is the address
of the server that provides it.

- DNS Servers – IP address of one or more Domain


Name Server computers.
Burn In - To run a system or device for a period of time to
ensure that all components are working properly.

- The intention is to detect those particular components


that would fail as a result of the initial, high-failure rate
portion of the bathtub curve of component reliability. If
the burn-in period is made sufficiently long (and, per-
haps, artificially stressful), the system can then be
trusted to be mostly free of further early failures once
the burn-in process is complete.
Bathtub Curve - An equipment failure-rate curve with an initial
sharply declining failure rate, followed by a prolonged
constant-average failure rate, after which the failure
rate again increases sharply.
REPORT - Is a piece of information describing, or an account of
certain events given or presented to someone.
Importance of Making a Report - It enables you to practice
your skills of presentation, argument, evaluation, and
calculation, and provides a permanent record of your
work.

Inspection Checklist Template

INSPECTION CHECKLIST

Equipment Type : Desktop Computer


Property Code : P.C. #1
Number : P.C.#1
Location : Practical Work Area

YES NO N/A INSPECTION ITEMS


1. Is the machine operating normally?
2. Are accessories checks for damage?
3. Are all device driver installed and config-
ured properly?
4. Are the display properties configured cor-
rectly?
5. Is the sound functioning?
6. Is the pc connected to the server?
7. Is the printer installed shared?
8. Is IP address configured correctly?
9. Is their internet connection?
10. Is desired workgroup followed
11. Is internal parts cleaned?
12. Is external parts cleaned?
13. Is check disk performed
14. Is unwanted programs removed
15. Is necessary files back-upped
16. Is anti-virus program updated and run
17. Is disk defragment performed

Self-Check 4.4-1
TRUE OR FALSE: Write T if the statement is True and F if the statement
is false.

____1. The effectiveness of checking maintained computers depends


on the quality of inspection.

____2. The effectiveness of running computers to computer


communications is to make sure that the computers in a
network is connected properly for effective and easier sharing
files and information.

____3. The cmd command is the basic tool for testing TCP/IP
connectivity.
____4. User account is unique address assigned to a network
adapter.

____5. Burn in is to run a system or device for a period of time to


ensure that all components are working properly.

Answer Key 4.4-1

1. T
2. T
3. F
4. F
5. T
Job Sheet 4.4-1

Title: Inspect And Test Configured/Repaired Computer System And


Networks

Performance Objective Given a working personal computer you


are going to inspect and test
configured/repaired computer system and
networks.

Supplies, Tools & Equipment :


 Working PC
 Server
 LAN Cable
 Hub/Switch
 Inspection Report Template

Steps/ Procedure:
1. Start Computer
2. Using the inspection checklist template check the configured
computer system and network.
3. Let your trainer check your work

Assessment Method:
Demonstration , Performance Criteria checklist
PERFORMANCE CHECKLIST

Performance Criteria
Did you… Yes No

1. Started the computer properly

2. Checked the configuration of computer system and


network

4. Followed safety procedures while performing inspection

5. Filled up inspection checklist accurately.

INSTITUTIONAL EVALUATION
EVIDENCE PLAN
TRAINEES NAME

FACILATATORS
NAME

QUALIFICATION COMPUTER HARDWARE SERVICING NC II


UNIT OF 1. Maintain Computer Systems and Networks
COMPETENCY
COVERED

Demonstrat

Witten Test
Ways in which evidence will be collected:

Interview
[tick the column]

ion
The evidence must show that the candidate……
1. Planned and prepared Maintenance with OHS policies
X
and procedures.
2. Obtained and checked materials, tools, equipments
X
and testing devices
3. Checked, identified and maintained computer
systems and networks with specifications and X
requirements to conform with manufacturers.
4. Checked and tested the normal functions of computer
X
systems.
5. Performed the scheduled/periodic maintenance and
X
cleaning.
6. Responded the repairs/replacements and sudden
breakdowns in accordance with established X
procedures.
7. Checked and tested the normal functions of network
X
systems.
8. Performed the scheduled/periodic maintenance and
X
cleaning.
9. Checked computer system and network to ensure
X
safe operation.
10. Prepared and completed reports to company
X
regulations.

NOTE: *Critical aspects of competency

DEMONSTRATION WITH QUESTIONING CHECKLIST

TRAINEE’S NAME
TRAINER’S NAME
QUALIFICATION COMPUTER HARDWARE SERVICING NC II
UNIT OF COMPETENCY Maintain Computer Systems and Net-
COVERED works
DATE OF EVALUATION
TIME OF EVALUATION
INSTRUCTIONS FOR DEMONSTRATION
Given the necessary materials, tools and equipment, the trainee must
be able to perform the following within four (4) hours
 Maintain Computer Systems and Networks
Materials & Equipment
Observation: / to show if evidence
is demonstrated
Yes No N/A
1. Planned and prepared Maintenance with
OHS policies and procedures.
2. Obtained and checked materials, tools,
equipments and testing devices
3. Checked, identified and maintained
computer systems and networks with
specifications and requirements to
conform with manufacturers.
4. Checked and tested the normal functions of
computer systems.
5. Performed the scheduled/periodic
maintenance and cleaning.
6. Responded the repairs/replacements and
sudden breakdowns in accordance with
established procedures.
7. Checked and tested the normal functions of
network systems.
8. Performed the scheduled/periodic
maintenance and cleaning.
9. Checked computer system and network to
ensure safe operation.
10. Prepared and completed reports to
company regulations.

QUALIFICATION: COMPUTER HARDWARE SERVICING NC II

UNIT OF COMPETENCY: INSTALL COMPUTER SYSTEMS AND NETWORKS

SPECIFIC INSTRUCTIONS: ( For the candidate)

1. Given a working personal computer you are going external &


internal parts, install/Update anti-virus, scan computer for
virus, remove unwanted files, run disk defragmenter,
scandisk, Back-up file using windows utility, remove
unnecessary software, Clear internet history & temporary
files.
2. Maintain network system, change the computer name and
workgroup, assign static IP address and check the connectivity
of your computer.

Duration: 1 hour

Accomplish the following before the allotted time.


COMPETENCY EVALUATION RESULT SUMMARY

TRAINEE’S NAME
FACILITATOR’S NAME

QUALIFICATION Computer Hardware Servicing NC II

DATE OF EVALUATION
TIME OF EVALUATION
The Performance of the Trainee in the Not
Satisfactor
following assessment methods [ Please Tick Satisfactor
y
appropriate box] y

A. Demonstration

Maintain Computer Systems and network.

Did the trainees overall performance


meet the required evidences/standards?

Recommendation

For re-evaluation ________________________________


Qualified to take the Next Competency

General comments [Strengths/Improvement Needed]

Trainee’s Signature Date:


Facilitator’s Signature: Date:

You might also like