Troble Shootcsc 326 Lecture Note Edit
Troble Shootcsc 326 Lecture Note Edit
1
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqw
ertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas
COURSE CONTENTS
dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfg
Overview of Computer Laboratory Environment.
hjklzxcvsbnmscqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfg
Management of Computer Science Laboratory
hjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjkl
zxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
Identification of Basic components (Processor, Hard Disk, Motherboard, I/O ports, VDU,
Keyboard, Flash Drives, CD ROM Drives, Printers, Mouse, etc).
vbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmq
Care of Computer System
wertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyui
Care of Computer Systems’ components (Processor, Hard Disk, Motherboard, I/O ports, VDU,
Keyboard, Flash Drives, CD ROM Drives, Printers, Mouse, etc)
opasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopa
Prevention of Computer viruses
sdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjkl
Solving basic operating problems, removing viruses, trouble shooting etc
zxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfg
hjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwer
tyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyui
opasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopa
sdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjkl
WHAT IS COMPUTER MAINTENANCE
zxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbn
2
mqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmq
This is the practice of keeping computers in a good state of repair. Computer maintenance is
recommended for those that want to keep their computer running at its best. Maintaining your
computer properly can help prevent major problems and should be incorporated as part of a semi
regular schedule.
Computer maintenance can be broken down into two main areas namely physical and software
base.
Physical (hardware) Based: physical means to clean the various external components such as the
tower, monitor, printer, scanner, mouse and keyboard etc. or the internal components of your
computer case.
Software Based: software maintenance is the regular virus scanning, spyware/malware scanning,
defragging and backing up of critical data that we all should do.
TYPES OF MAINTENANCE
This is similar to routine maintenance performed on a car. In the same way you need to
periodically check the oil, lights, engine and other parts of the car in order for it to run
smoothly. The same principles apply to preventive maintenance for a computer. There
are several preventive measures you can take, including maintenance installing windows
updates, scanning for virus and malware and running cleaning programs. Anti-virus and
Anti-malware scans should run at least once a week. Be sure to run updates for these
programs whenever they are released, as new virus and malware spring up constantly.
Keeping your network secure, installing firewall and using safe downloading practices
can protect your compute and any information on it from being compromised. Power
surges and overheating can destroy electronic equipment, so protect your hardware by
investing in surge protector and cleaning your equipment periodically to remove dust.
Should any preventive measures fail, it is always a good idea to have a backup for
important files. Invest in an external hard drive to save any important files.
3
Common corrective measures involve removing virus and malware, uninstalling harmful
programs, reformatting and running a system restore among others. Many common
computer problems are easily fixed and don’t require an IT professional. To perform
corrective maintenance, it is important to first diagnose the problem and figure out the
root cause. If you are ensure of the cause or how to fix your problem, consulting an IT
professional would be the best course of action.
A computer laboratory is a cluster of computers that usually are networked and available for use
by the public (a space which provide a computer services to a defined community). Labs
frequently are found in public buildings such as libraries, schools such as colleges and
universities and communities centers. Almost all computer labs offer ‘users’ access to the
internet and provide software that students can use to do research and complete their homework
or that others, such as traveling business people might need for other purposes.
Student Stations
Management Station
Server
Switch
Other equipment (optional equipment can include printers, scanners, cameras, projectors
and headsets etc.)
The different systems are properly arranged and properly locked in specific tables and places to
save time and energy of the students and teachers. The arrangements, setting and environment
of the laboratory encourage the students to perform their practical carefully in a congenial
environment. Laboratories are helpful in creating and promoting scientific attitude in the
students.
With the working in groups in the laboratory the students develop a sense of co-operation
and spirit of healthy competition, the traits very essential for getting desired success in future life.
Laboratories should be well planned and adequately equipped. Here are some few scheme or
plans for the establishment of these laboratories
4
The list of the computer systems with numbers should be prepared after careful
consultation of the prescribed syllabus of Computer Science.
The provision of the annual budget for purchase of new computers and other computers
science goods should be taken into account before booking orders.
The quantity of the computer systems and material depends upon the number of the
students in the class.
The list of most frequently used computer systems and other connections should be
made and consideration of the number of students using them should be made to arrange
them for the convenient of the students.
The walls and floors of the laboratory should be quite tough and durable. For this purpose the
walls should not be less than 45cms in thickness. These should be plastered with good quality
cement and painted at least up to a height of 90 cm from floor.
Computer Labs should be dust free. Provision of air condition is very important.
LABORATORY MANAGEMENT
Maintenance of records and handling of students when they work in the laboratory constitute the
management of a laboratory. Name of the students, their group consisting of a specific number
should be presented in the lab. Students time table and date on which the laboratory work conducting
should be kept in the laboratory the name of the experiment and the nature of the laboratory work to
be performed for individuals and group should be maintained.
The period of duration of the practical should be maintained the nature of the guidance and
follow up work to be given to the students must be planned earlier. The Computer teacher should
keep in touch with firms and companies who supply computer products and the prices of these items
should be kept in the laboratory and several firms, catalogues and their price lists also must be kept.
Demonstration of practical is an entire responsibility of a teacher. He may plan it for the successful
delivery of the theoretical knowledge, skills and application of theory with practice.
5
Laboratory work is entirely a responsibility of the students. It clearly aims to provide them
needed opportunities for the development of essential laboratory skills for learning how scientific
knowledge and principles work in the practical situation or how the facts are discovered in computer
science. Students are required most of the time to do independent practical work.
The decision about the independent as well as co-operative group work done by the students must be
taken quite in advance in time with the curricular needs as well as providing rich experiences and
opportunities for the gifted and creative students. The minimum practical work to be done by each and
every student of a Computer Sciences class must be made known to all students of the class. The
schedule for doing such practical work must also be made known to them in advance.
The student should be allotted seats for doing practical work independently in the laboratory. The students
should be provided separate arrangement (properly locked) for keeping the material and equipments
allotted to them for doing practical in the laboratory.
Students must exhibit necessary devotion and seriousness for the conduct of laboratory experiments. In no
case they should resort to shortcuts, dishonesty and carelessness. They must be quite methodological in
doing their experiments, science and honest in observing and recording the process and product outcomes
to their experiments and competent enough for deriving valid conclusions and inferences from their
experiments. In case of difficulty, they should not hesitate to seek proper guidance and heal from the
teacher of the persons responsible for such guidance. The proper follow up of the laboratory work done
by the students independently or in-group should be a regular feature for deriving gains through such
laboratory work. It should be properly evaluated in terms of its process and product outcomes. The
keeping of proper records and maintenance of practical notebooks by the students may help much in this
direction. The teacher in charge should regularly check it and necessary guidance thereafter should
also be given to the students. The work found unsatisfactory must be asked to get repeated by the
students and difficulty, if any should be sorted out then and there while working along with the
students in the laboratory. The students must be told to observe the necessary precautions and
disciplinary rules etc. for conducting individual as well as co-operative laboratory work in the
laboratories. The teacher along with the assisting staff like laboratory assistants, storekeeper etc.
should always be there to help and supervise the students working in the laboratory.
As far as possible the practical work done in laboratory should be in proper tune and close co-
operation with the theoretical work done in the classroom lessons or assignments given to the students
for independent study and creative output. The students must be told to have necessary preparation for
the conduct of laboratory work in terms of necessary theoretical background of the work and
experiments, observation of class room demonstration careful observation and recording of the process
and product outcomes of their laboratory work etc. They must learn the proper way of utilizing
laboratory material and equipments without causing any damage or breakage. After finishing their
work they should develop proper habit of cleaning dusting and packing etc. before keeping the
material and equipments at their fixed places.
6
DISCIPLINE IN THE LABORATORY
Teacher and laboratory staff should exercise proper control over the student working in
the laboratory.
The seats of the students should be fixed. They should not be allowed to move here
and there in the laboratory.
Full instruction about the conduct of the practical should be given to students before
the beginning of the practical.
The teachers should have full knowledge of the practical items and requirements
used by a student in his seat at the time of practical class.
All precautions to be adopted by the students during their practical should be told to the
students.
The students should switch off electrical connections before leaving his place of work.
The work of the students should be under the strict control of the teacher.
7
Computers not in use should not be placed on the table.
Nothing should be left on the floor. If there is any obstruction it should be removed
at once.
After the practical all computers must be cleaned and switched off.
Perfect discipline should be maintained and useless talking should be avoided while
performing practical.
The basic components are referring to the physical hardware components that makes the whole
set of a computer system. These components also comprise the internal components, those that
are found in the system unit and the external components, those that are physically available
outside the system unit. Some of these components are: Processor, Hard Disk, Motherboard, I/O
ports, VDU, Keyboard, Flash Drives, CD ROM Drives, Printers, Mouse, etc.
SYSTEM BOARD:
The system board contains all the internal and external components of computer. The system board is
referred to as the main board, the planar board or the motherboard. It is made up of fiber glass and is
typically brown or green with a mesh work of copper lines. These lines are electronic circuits through
which signals travel from one component to another.
8
THE POWER SUPPLY:
The power supply is typically located at the back of the computer’s interior. It is responsible for
converting the alternative current (AC) voltage from wall outlets into the direct current (DC)
voltage that the computer requires. The power supply accomplished this task through a series of
switching transistors, which gives rise to the term switching mode power supply.
Another function of the power supply is to ensure that the computer receives the proper amount
of voltage. However, computers require comparatively smaller voltages ±12, ±5, or ±3.3 vDC
(volts DC). The computer’s power supply removes the excess voltage and dissipates it in the
form of heat.
PROCESSORS:
Front view of a Pentium Processor MMX sitting next to a wooden ruler showing the length as
five centimeters.
In this part of the course we will examine the principles, operations and speeds of
processors.One of the most common families of processors is the Intel Pentium range which
ranges from the Pentium to the latest Intel Pentium D processors.
As well as Intel, the other major processor manufacturer is Advanced Micro Devices Inc (AMD).
AMD are Intels major rival and their processor family range from the Athlon and Athlon XP
processors to the newer AMD64 processors.
It is beyond the scope of this course to examine in detail the vast range of processors along with
the slot and socket but the key factor when choosing a processor is the motherboard. The first
thing to consider is whether the motherboard chipset supports the processor at its default clock
speed.
9
A motherboard's chipset is designed to work with and support the architectural features of a
processor and make most efficient use of the processor. Therefore, a motherboard that is
designed for AMD processors will not support Intel Pentium processors because of the physical
and architectural differences.
WHAT IS A PROCESSOR?
A processor casing sitting with its pins facing down and another processor casing sitting with its
pins pointing upward.
There are many processors available and processor specification is usually one of the first things
considered when buying a new personal computer (PC). The type of processor and its speed have
the greatest impact on the overall performance of a computer system. Processor performance is
related directly to its speed of operation and its architecture.
Competition among processor manufacturers is fierce and because of this there is a wide and
diverse choice of processors in the market place. Processor manufacturers, such as Intel and
Advanced Micro Devices (AMD) are continually developing more advanced processors and new
models are released within the space of months rather than years. This is in stark contrast to
earlier processor developments, such as the 8086, 80286 and 80386 which were released years
apart.
TYPES OF PROCESSOR:
10
Baby AT Motherboard with an Intel 486DX CPU under the heatsink and fan. A series of ISA
slots line the right hand side.
Sockets
Slots
PROCESSOR SOCKETS
The type of processor that is connected to a socket is a square package with many pins (more
than 250) on the bottom surface of the chip, which connects to a motherboard by a Zero Insertion
Force (ZIF) socket. The pins are found around all sides of the package and there will be more
than one row of pins on each side.
11
A processor casing sitting with its pins pointing upward.
The pictures show the top and bottom of an Intel 486 processor. This processor must be lined up
properly before it is inserted in the socket. It will only fit correctly one way and to help the
installer one corner is different from the others. The processor does not have to be pushed firmly
into place but rather popped into place and then secured using a locking arm.
PROCESSOR SLOT
The other form that processors take is a chip soldered on to a card, which then connects to a
motherboard by a slot similar to an expansion slot. The picture slows a slot for a Pentium 3
processor.
This picture shows a side view of a Pentium 3 processor housing including heat sink, cooling
fans and power connectors. Note, the gap in the circuit board; this is here as a guide to the
installer so that the processor is not incorrectly connected.
12
This picture shows the Pentium 3 Processor face on.
MEMORY:
Memory is one of the important computer components. Its function is often mistaken for that of
the hard drive space. Furthermore, computers use several types of memory, each with a different
function and different physical form. Typically, when people discuss memory, they are referring
to Random Access Memory (RAM).
RAM:
Recall when a user makes a request, it is intercepted by the processor, which they organizes the
request into component specific tasks. Many of these tasks must occur in a specific order, with
each component reporting its results back to the processor before the next task can be completed.
The processor uses RAM to store these results until they can be compiled into the final result.
RAM is also used to store instructions about the currently running applications. For example,
when you start a computer game, a large set of the game’s instructions (e.g. how it works, how
the screen should look, which sound must be generated) is loaded into memory. The processor
can retrieve these instructions much faster from the RAM than it can from the hard drive, where
the game normally resides until you start it. In fact, one of the most important computer upgrades
is to increase the amount of RAM. The information in RAM is continually being read, changed
and removed. It is also volatile, meaning that it cannot work without a steady power supply.
When a computer is turned off the information in RAM is lost.
13
TYPES OF RAM
Although all RAM basically serves the same purpose, there are a few different types commonly
in use today:
Cache:
Another type of memory has emerged cache memory. The cache memory carries out a similar
function to that of RAM, but it resides directly on the processor itself or physically close to the
processor on the motherboard. Cache memory runs faster than typical RAM and is able to
“guess” which instructions the processor is likely to need, and then retrieves those instructions
from RAM or the hard drive in advance.
ROM:
Read Only Memory, has an important function, it is rarely to changed or upgraded, so it typically
warrants less attention by most computer users. Unlike RAM, ROM is read-only, meaning the
processor can read its instructions, but it cannot be used to store new information.
ROM is nonvolatile, so it does not lose its contents when the computer’s power is turned off.
This makes ROM ideal for storing a device’s most basic operation and communication
instructions. A number of computer components include ROM chips, which contain device
specific basic instructions. Information on these ROM chips is said to be hard-wired or hard-
coded because it cannot be changed. These types of devices are termed firmware, to indicate that
14
they are a mixture of hardware and software.
There are various types of ROM with names like EPROM (Eraseable ROM) or EEPROM
(Electrically EPROM). Unlike RAM, when a computer is powered down, the contents of the
ROM are not lost. EPROM or EEPROM can have their contents rewritten by a special operation.
This is called “Flashing the EPROM” a term that came about because ultra violet light is used to
clear the contents of the EPROM.
STORAGE DEVICES:
The function of all storage devices is to hold, or store information, even when the computer’s
power turned off. Unlike information in RAM, files that are kept on a storage device remain
there unless they are manually removed or altered by the user or the computer’s operating
system. A great variety of storage devices are available, including floppy drives, flash drives,
hard drives and CD ROM.
FLOPPY DRIVES:
A 3.5-inch floppy drive read data from removable floppy disks and provides a good method for
transpiring data from one machine to another. Floppy disks contain a thin internal plastic disk,
capable of holding magnetic charges. The disk is surrounded by a hard plastic protective casing,
part of which can be retracted to reveal the storage medium inside. The back of the disk has a
coin-sized metal circle that is used by the drive to grasp the disk and spin it. When a floppy disk
is inserted in a computer’s floppy drive, the drive spins the internal disk and retracts the
protective cover. The drive’s read/write head moves back and forth along the exposed area,
reading data from and writing data to the disk.
Floppy disks are available in several different forms and capacities. The first floppy disks were
5.25-inch square and hold either 360KB or 1.2MB of information. These are no longer
considered standard computer equipment. The newer 3.5-inch disk hold 720KB (double density),
1.44MB (high density), or 2.88MB (extra density) of information. The most commonly used is
the 1.44MB.
15
FLASH DRIVES:
Are data storage devices integrated with a USB (Universal Serial Bus) interface. They are
typically small, lightweight, removable and rewritable. Memory capacities for USB flash drives
currently vary from 32MB up. USB flash drives offer potential advantages over other portable
storage devices, particularly the floppy disk. They are more compact, faster, hold more data and
are more reliable due to their lack of moving parts and more durable design.
A SanDisk Cruzer USB drive from 2011, with 4GB of storage capacity.
HARD DRIVES:
Hard drives store data in a similar fashion to floppy drives, but they typically are not removable
and have a different physical structure. A hard drive also referred to as a fixed drive, consisting
of several hard platters, stacked on top of but not touching one another. The stack of platters is
attached through its center to a rotating pole, called a spindle. Each side of each platter can hold
data and has its own read/write head. The read/write heads all move as a single unit back and
forth along the stack.
Hard drives are available in a wide range of capacities and can hold much more data. Hard drives
have capacities measured in bytes-resent ones come in tens of gigabytes (GB). The disk must be
divided into smaller units, called clusters, before it can store data. This division is accomplished
16
through formatting. Depending on the capacity and file system used, each cluster can hold
between 512B to 32KB of data.
2.5-inch SATA Hard Disk Drive Inner view of a 1998 Seagate HDD that used
parallel ATA interface.
CD-ROMs:
Compact Disk-Read Only Memory (CD-ROM) offers a balance between the portability of a
floppy disk and the capacity of a hard drive. CD-ROMs are composed of a hard medium that
contains very small depressed and raised areas, called pits and lands, respectively. CD-ROM
drives read data from the CD using a laser instead of a read/write head.
Because CDs have no protective covering, it’s important to handle them with care. Scratches,
dust or other material on the CD surface can prevent data from being read correctly. Because
data is located on the bottom side of the CD, always lay the CD label side down.
CD-ROMs can hold roughly 650MB of data and generally cannot be written to (except in the
case of newer CD-Recordable or CD-Rs). Data can be accessed faster from a CD than a floppy
disk but much more slowly than from a hard drive.
DISPLAY SYSTEMS:
Monitors must be connected to internal video cards and system relies on the proper function of
17
both components. The video card’s function is to create the images that result in the picture you
see. The monitor simply display the images sent to it by the video card. When you replace or
install a new video system, you must make sure that the monitor and the video card are
compatible. i.e. you must use a VGA (Video Graphic Array) monitor with a VGA video card, or
an SVGA (Super Video Graphic Array) monitor with an SVGA video card.
MONITORS:
Monitors are not serviceable. That means that they are replaced rather than to repaired when they
stop functioning correctly. Because it would typically cost more in labor and parts to fix a
monitor than it would to simply buy a new one. A computer monitor is an output device which
displays information in pictorial form. A monitor usually comprises the display device, circuitry,
casing and power supply. The display device in modern monitors is typically a thin film
transistor liquid crystal display (TFT-LCD) with LED backlighting having replaced cold-cathode
fluorescent lamp (CCFL) backlighting. Older monitor used a cathode ray tube (CRT). Monitors
are connected to the computer via VGA, Digital Visual Interface (DVI), High Definition
Multimedia Interface (HDMI), Display Port, Thunderbolt,, low-voltage differential signaling
(LVDS) or other proprietary connectors and signals.
Modern computer monitors are easily interchangeable with conventional television sets.
However, as computer monitors do not necessarily include components such as a television tuner
and speakers, it may not be possible to use a computer monitor as a television without external
components.
A Cathode Ray Tube (CRT) monitor A Liquid Crystal Display (LCD) monitor
I/O PORT:
18
I/O devices are the pieces of hardware used by a human (or other system) to communicate with a
computer. For instance, a keyboard or computer mouse is an input device for a computer, while
monitors and printers are output devices. Devices for communication between computers, such
as modems and network cards, typically perform both input and output operations.
The designation of a device as either input or output depends on perspective. Mouse and
keyboards take physical movements that the human user outputs and convert them into input
signals that a computer can understand; the output from these devices is the computer's input.
Similarly, printers and monitors take signals that a computer outputs as input, and they convert
these signals into a representation that human users can understand. From the human user's
perspective, the process of reading or seeing these representations is receiving input; this type of
interaction between computers and humans is studied in the field of human–computer
interaction.
In computer architecture, the combination of the CPU and main memory, to which the CPU can
read or write directly using individual instructions, is considered the brain of a computer. Any
transfer of information to or from the CPU/memory combo, for example by reading data from a
disk drive, is considered I/O.[1] The CPU and its supporting circuitry may provide memory-
mapped I/O that is used in low-level computer programming, such as in the implementation of
device drivers, or may provide access to I/O channels. An I/O algorithm is one designed to
exploit locality and perform efficiently when exchanging data with a secondary storage device,
such as a disk drive.
I/O Ports
KEYBOARD:
Keyboard keys (buttons) typically have characters engraved or printed on them,[2] and each
press of a key typically corresponds to a single written symbol. However, producing some
symbols may require pressing and holding several keys simultaneously or in sequence.[3] While
most keyboard keys produce letters, numbers or signs (characters), other keys or simultaneous
19
key presses can produce actions or execute computer commands.
In normal usage, the keyboard is used as a text entry interface for typing text and numbers into a
word processor, text editor or any other program. In a modern computer, the interpretation of key
presses is generally left to the software. A computer keyboard distinguishes each physical key
from every other key and reports all key presses to the controlling software. Keyboards are also
used for computer gaming — either regular keyboards or keyboards with special gaming
features, which can expedite frequently, used keystroke combinations. A keyboard is also used to
give commands to the operating system of a computer, such as Windows' Control-Alt-Delete
combination, which brings up the system security options screens. A command-line interface is a
type of user interface navigated entirely using a keyboard, or some other similar device that does
the job of one.
A keyboard layout
MOUSE:
A computer mouse is a hand-held pointing device that detects two-dimensional motion relative
to a surface. This motion is typically translated into the motion of a pointer on a display, which
allows a smooth control of the graphical user interface. The first public demonstration of a
mouse controlling a computer system was in 1968. Originally wired to a computer, many modern
mice are cordless, relying on short-range radio communication with the connected system. Mice
originally used a ball rolling on a surface to detect motion, but modern mice often have optical
sensors that have no moving parts. In addition to moving a cursor, computer mice have one or
more buttons to allow operations such as selection of a menu item on a display. Mice often also
feature other elements, such as touch surfaces and "wheels", which enable additional control and
dimensional input.
A computer mouse with the most common features: two bottoms (left and Right) and a scroll
wheel, which can also act as as third button.
20
CARE OF THE COMPUTER
1. Keep liquids away from your laptop. As tempting as it might be to drink coffee, soda,
water or any other liquid near your laptop, accidents can happen all too easily. Spilled
liquids may damage the internal components or cause electrical injury to the laptop. Short
circuits can corrupt data or even permanently destroy parts. The solution is very simple:
Keep your drinks away from your computer. Even if you're careful, someone else might
bump into your desk or you.
2. Having an available antivirus software would help. Even if you know what you
download, it may contain a virus that can lead to a circuit error in your system hardware
or slowness in the software.
3. Keep food away from your laptop. Don't eat over your laptop. The crumbs can go down
between the keys in the keyboard and provide an invitation to small bugs. The crumbs
can also irritate the circuitry. Worse, it makes the laptop look dirty if there are crumbs
and food stains on it.
4. Always have clean hands when using your laptop. Clean hands make it easier to use your
laptop touchpad and there will be less risk of leaving dirt and other stains on the
computer. In addition, if you clean your hands before use, you will help reduce wear and
tear on the coating of the laptop caused by contact with sweat and small particles that can
act upon the laptop's exterior underneath your wrists and fingers.
21
5. Protect the LCD display monitor. When you shut your laptop, make sure there are no
small items, such as a pencil or small ear-phones, on the keyboard. These can damage the
display screen when shut; the screen will scratch if the item is rough. Close the lid gently
and holding from the middle. Closing the lid using only one side causes pressure on that
hinge, and over time can cause it to bend and snap.
6. Hold and lift the computer by its base, not by its LCD display (the screen). If you lift it
by the screen part alone, you could damage the display or the hinges attaching it to the
base. The display is also easily scratched or damaged by direct pressure – avoid placing
pressure on it.
7. Don't pull on the power cord. Tugging your power cord out from the power socket rather
than putting your hand directly on the plug in the socket and pulling can break off the
plug or damage the power socket. Also, if you have the power point near your feet, avoid
constantly bumping into the plug or you could loosen it and eventually break it.
8. Don't roll your chair over the computer cord. Stick the cord onto your desk with tape or a
special computer cord tie which can be easily undone when you've finished using the
laptop. Always try to keep most of the cord away from the floor or your legs; sometimes
you can be so engrossed in what you're doing that you move your legs and forget the cord
is there.
22
9. Plug in accessory devices into their proper slots. Always look at the symbols on the
laptop carefully before inserting devices. Jamming a phone line into an Ethernet port or
vice versa could damage the sockets, making it impossible to use them again. It is very
important to observe this.
10. Handle any removable drives with care. Floppy drives or CD drives that have been
removed from your laptop can easily get crushed, dropped or pressed if you are careless.
Put them straight into a bag or a storage box/case for safe keeping if you are not putting
them back into the laptop.
11. Insert drives into their slots carefully and at the correct angle. Pushing the wrong drive
into a socket, or at an angle, or even upside down can jam it.
12. Check to see if labels are affixed securely before inserting media into your laptop
computer. Media such as CDs, DVDs or floppy disks should not have any loose label
parts that might jam inside the laptop drive. Never insert undersized CDs, as these can
damage the disk player permanently.
23
13. Don't expose your laptop to rapid temperature fluctuations. When bringing your laptop
indoors during winter, don't turn it on immediately. Instead, let it warm to room
temperature first. This will avoid any potential for damage to the disk drive from
condensation forming inside the machine. Avoid heat from sunlight as well.
14. Don't leave your laptop in a car. Not only do the insides of cars experience large
temperature swings that could damage a laptop, but a laptop (or laptop bag) is an inviting
target for a smash and grab thief.
15. Have the unit cleaned once a year to remove internal dust. Get this done by a computer
professional. If dust accumulates, the system cannot cool itself correctly. Heat can
destroy the motherboard.
16. Avoid placing heavy materials, such as books, on top of your laptop and keyboard. This
can push the LCD screen into the keyboard, and will eventually damage it. Also, the CD-
ROM insert will also be squished and, eventually, will break.
17. Use a properly-sized laptop case. Whatever you use to carry your laptop around in, be it a
case, a bag or something you have made yourself, make sure that it is large enough to
contain the laptop. This will avoid scratching, squeezing or even potentially dropping it.
24
18. Look into getting a laptop bag. Many breaks happen because of laptops being dropped or
bumped. A bag greatly reduces the risk of damage.
19. Use and store in a well-circulated area. When you are using your laptop, do so in a place
that has a constant air-circulation. Lots of people ruin their laptop by using it in an
enclosed area and thus making the laptop overheat. It also helps if you store it in a well
circulated area.
20. Use an old tooth brush to clean the area around the exhaust fan screen. If that gets
plugged up, air flow is diminished and overheating can most certainly occur.
21. Try and keep the laptop on a flat surface. This prevents damage to the laptop. This step
can be hard, particularly if you are going out with your laptop, but if there is a flat surface
available to put your laptop on then do so.
25
22. Don't use your laptop on the bed. Repeated use of the laptop on the bed will cause the
fans to suck up the dust and further debris which lies in the bed, ultimately blocking the
fan. Refrain from this by using the laptop somewhere else than the bed.
The motherboard stores the heart of your computer and any trouble here could mean a complete
halt for your computing operations.
To take care of the motherboard involved:
Don’t allow dust on the motherboard and make sure to keep it clean daily or regularly.
Because it will draw moisture that would further lead to short circuit in the vulnerable
parts of the device leading to a severe damage of the system.
Regularly checking the motherboard fan not to get clogged by dirt. It would stop working
resulting in a severe crash of the computer in high temperature.
Check for leaking or swelling of capacitors are sign of something is wrong with the
motherboard. It will increase the motherboard temperature which might lead it to stop
from working. Therefore the capacitor will be replaced or change the old one with a new
brand one.
Check the CMOS (Complementary Metal Oxide Semiconductor) battery. When the
stored electrical energy of the CMOS battery (that detachable coin looking silver thing in
the motherboard) is already used up. The date displayed in your desktop computer will be
wrong. A failed battery will also prevent your computer from executing some command,
such as when logging into the internet site.
The CPU of the computer is more like a heart of the human body. The CPU holds not only the
processor but also the other hardware like the motherboard, hard disk, ports. Etc. no useful work
can be done if the CPU is not working.
To take care of the Central Processing Unit involved:
Keep CPU in an open space not in congested places with other devices. The processor
gets heated because of the continuous work and a cooling fan will be replaced to remove
26
the heat. You have to make sure whether the cooling fan is performing properly.
Try to keep your computer in an air conditioned room. This will keep away the dust
accumulation in the CPU.
Clean the CPU with a little brush or cloth; at least once in a month but while doing that
you should be more careful not to disturb the connections of the components. Wipe up
the dust from the cooling fan.
You might also keep the outer case of the CPU open if it is a personal computer or home
computer. This may sound really unusual but this greatly there is more work to be done
in your computer. More work means more heat generated by the processor.
The hard disk is very important to us because it serves as a place to store the data in your CPU.
Therefore, we need to take care of the hard disk drive so we will not lose important data and it’s
essential to keep your PC running smoothly.
It is common to see hard drives die at some point in time, but they all don’t die at the same rate.
On an average, a hard drive has a lifespan of six years that is almost 50 percent of the hard drives
will last up to six years.
There are some tips you need to follow in order to take care of the hard disk drive.
Install an anti virus just in case if there is a virus that will attack and destroy your data.
Make your anti – virus regularly updated.
Try to make backups of a critical data.
Use scandisk to check whether there is bad sector on the hard disk.
Do not store too much data. Do not use hard disk until a few kilobytes free. But give little
space to the hard disk so it is not too congested. At least reserving approximately 20MB.
Use a UPS (Uninterrupted Power Supply), because if we are on using the computer and
suddenly the power goes down, the computer will not directly Off. A computer that
suddenly Off withought shutdown process will make your hard disk quickly broken.
For maximum safety, never remove your hard drive(s) from the computer case once they
have been installed. If you most take them out and the only valid reason for doing so
would be transferring to another computer case, do it lightly and quickly. And use proper
equipment.
Similarly don’t move or shake your computer case while it is On. Keep it in a safe
location where accidental kicks and knocks are minimum.
The flash drives are also known as a thumb drives, USB keys, pocket drives. Etc. are small USB
drives that use the same flash memory as some cameras and PDAs (Personal Digital Assistance).
The benefit of these units is that they are USB and plug-and-play; i.e. they require no software to
run.
Here are some tips to take care of your flash drives.
Avoid running software from the flash drive. Because ach flash drive comes with a
predetermined number of read and write cycles, and once you’ve exhausted them the
flash drive can no longer be used. When you save a retrieve documents, you use single
circle per retrieval or write function, but running software application from the flash drive
27
will use multiple read/write cycles. This means you reduce your available cycles faster by
running software.
Create a backup. The flash drives are electronically produced components with a limited
lifespan; no matter how well maintained they are, you should therefore have some
scheme of regular backup for your flash drive on your computer.
The connector is covered; the metal area usually inserted into a USB port of computer
should be properly covered when not in use to prevent the accumulation and trapping of
dirt and dust.
Allow system to completely boot before inserting the flash drive. This is to prevent shock
that is potentially dangerous to the flash if it is inserted while the system is still booting.
And also ensure that the port and the connector are at even angles (properly aligned)
before inserting a flash drive.
Always eject or use the “Safe to remove” icon if you want to eject the flash drive.
Forcefully removing the flash drive withought using the safe removal procedure might
result in data loss and damage (corruption) of the flash drive. And do not remove a flash
drive while a file is still being transferred.
Do not place a heavy weight on flash drive. Because a flash drive is light weight material
that has a little or no weight at all, placing much weight on it should be avoided to
prevent damage to the flash drive.
Always scan your flash drive before you start using it. Use an anti-virus that
automatically scans your flash dive once it is inserted.
Whether it is a Music CD, Computer software or file backup, you need to keep your CDs and
DVDs in peak condition for as long as possible.
Here are some ways to protect and preserve your optical media. A list of “Do’s” and “Do not’s”.
DO
Handle discs by the outer edge or the center hole.
Keep the discs clean and dust free.
Return discs to the cases immediately after use.
Clean discs by wiping a clean lint-free cloth in a straight line from the center of the disc
toward the outer edge.
Check the disc surface before playing it.
DO NOT
Touch the surface of the disc.
Bend the disc.
Store disc horizontally for several years.
Exposed discs to extreme heat or high humidity.
Clean in a circular direction around the disc.
Keyboard is an important device attached to the computer. Without the keyboard, the computer
is literally of no use as you cannot type anything, navigate or use computer programs, additional
functions or perform your day to day activities on the computer.
28
Taking care of the keyboard is really very simple.
Wire is the most sensitive part of the keyboard. Therefore, avoid bending it. Don’t place
anything heavy on it to avoid stress, which can cause cuts or breakage. Kinked cables can
also result in spelling mistakes.
Spilling of liquid is very harmful. It can damage your keyboard internal circuit or can
cause malfunctioning of the keyboard.
Don’t eat while sitting near the keyboard. When you do so, small pieces of food can fall
and enter inside the circuit, which can result in stopping on or more keys from
functioning. Also insect can be invited which sometimes decide to reside in the keyboard.
Try to press the keys as soft as you can. It helps in long life of keys and characters printed
upon them.
Cover it by using dust proof covers like poly covers, cardboard cover etc. to avoid dust
particles. It can harm the circuit under the keys, which result in non functioning of one or
more keys. It’s recommended to avoid cloth covers, because cloths have pores (Micro
holes) inside them, which are sometimes unable to stop micro-dust.
The computer’s mouse enables faster and easier execution of functions while working on the
computer.
Taking care of the mouse is really very important.
Disconnect your mouse from the computer. You need to power down your computer first
and removed the wired mouse. If the mouse is wireless simply remove the USB
component from the computer.
Remove the batteries. Note that different brands’ have battery compartment in different
locations.
Dampen a microfiber cloth, by applying a small amount of water. Wring out any excess
moisture.
Wipe out the outer of the mouse to remove any dirt or grime. Move back and forth over
the target areas until the dirt is gone.
Clean the scroll wheel, if applicable. Gently insert a toothpick between the scroll wheel
and the slot it rests in and be careful not to break the toothpick.
VIRUS
DEFINITION OF VIRUS
Computer virus is a self duplicating computer program that interfered with a computer’s
hardware or operating system (the basic software that runs the computer). Viruses are design to
duplicate or replicate themselves and to avoid detection. Like any computer program, a virus
must be executed for it to function. i.e. it must be located in computer’s memory, and the
computer must then follow the virus’s instructions. These instructions are called the payload of
the virus. The payload may disrupt or change data files, display an irrelevant or unwanted
message or cause the operating system to malfunction.
29
SOURCES OF VIRUS
i. Trough external diskette or other secondary memory devices. E.g. flash drives, memory
card, CD ROM etc.
ii. Through Local Area Network (LAN) or Wide Area Network (WAN).
iii. Through internet by downloading corrupt files.
TYPES OF VIRUS
There are many types of virus as follows: Boot sector, File Infector, Network, Directory,
Browser Hijacker, File Allocation Table, Resident, Multipartite, Direct Action, Web Script,
Polymorphic, Encrypted, Companion, Nonresident etc.
(i) Boot sector virus: this type of virus prevents the computer from functioning at all
or boot/start. The virus attacks the bootable file of a computer.
(ii) File infector virus: this virus infects executable files or programs. When you run
these programs, the file infector virus is activated as well which can slow down
the program and produce other damaging effect.
(iii) Network virus: this type of virus spreads out through local network area (LAN)
and through the internet. These viruses replicate through shared resources
including drives and folders. When network viruses enter a computer, they look
for their potential prey. Dangerous network viruses include Nimda and
SQLSlammer.
(iv) Directory virus: these viruses change file paths. When you run programs and
software that are infected with directory viruses, the virus program also runs in
the background. Further, it maybe difficult for you to locate the original app or
software once infected with directory viruses.
(v) Browser hijacker: this type of virus infects your web browser in which it will
bring you to different websites. Typically, if you key in a domain name in the
internet address bar, the browser hijacker will open multiple fake websites that
may harm your computer. On the other hand, most trusted browsers have built in
features to block them ahead.
(vi) FAT virus: this type of virus ruins the file allocation system where the
information about files, including the location exist.
30
WAYS TO PREVENT COMPUTER VIRUSES
It doesn’t matter if you’ve been on the Internet for five minutes or five years, you’ve
probably thought about ways in which you can prevent a computer virus from entering your
machine. A virus can compromise your personal information and even destroy your computer
completely. Luckily, there are many low cost things you can do to protect yourself and stay one
step ahead of the hackers. Here are 11 things you can do to help prevent computer viruses from
invading your computer.
1. Install a reliable anti- virus program – From the first moment you turn your computer on, you
should have a trusted anti virus program by your side. Even if you have a machine that isn’t
hooked up to the Internet, a reliable anti virus program is a low cost and common sense addition
to any machine. There are even free anti virus programs e.g. AVG anti-virus . you can download
that work almost as well as industry giants like Norton and McAfee.
2. Install anti-spyware and anti-malware programs – As good as the best anti virus programs are,
they sometimes need a little bit of help. Thankfully, many of the top anti-spyware programs are
completely free. Spybot Search and Destroy and CCleaner are just two free programs that can
help prevent computer viruses from doing any damage on your machine. As helpful as these
programs are, however, you must update them and run them on a regular basis for them to do any
good.
3. Avoid suspicious websites – A good virus protection program will alert you when you visit a
website that attempts to install or run a program on your computer. Many less than reputable
adult websites do this, so if you get a warning, don’t go back, you may end up with a bug you
can’t get rid of.
4. Never Open Email Attachments Without Scanning Them First – The most common way
viruses are spread throughout the Internet is still via email. Some attachments, like pictures, now
display in emails and don’t require an attachment to be manually opened, but other documents
do. Make sure you use an email client that scans all email attachments before you are allowed to
open them. This will help prevent computer viruses from getting a foothold on your machine.
5. Set up Automatic Scans – Many of the top anti virus programs, as well as the best anti-
spyware programs, now have settings that will let them automatically run during down times or
in the middle of the night. Of course, your computer must be on for this to happen, but having
daily scans run when nothing else is going on is a great way to prevent even the latest computer
viruses from sticking around too long.
6. Watch Your Downloads – Part of the fun of the Internet is downloading music, movies and
other items. However, since these downloads are so massive, it can be easy to sneak a virus
along for the ride. Only download these files from trusted sites that you can count on, or, at the
very least, scan them before you open them.
7. Updates, Updates, Updates – There is a reason why Windows has a feature called Critical
31
Updates. There is an entire branch of Microsoft dedicated to staying one step ahead of the
hackers out there so when they manage to fix a possible security loophole, you need to download
the patch right away. Help Microsoft help you prevent computer viruses from causing too much
trouble.
8. Know What To Look For – Even if you are just a casual computer user, you should have an
idea of how your machine operates, what normal pop up windows look like and what popular
viruses are out there, that way, when your computer begins exhibiting tell tale signs, you’ll
know. You can help prevent computer viruses by staying updated and educated.
9. Stay Away From Cracked Software – It is so secret that you can download illegal, cracked
versions of some programs online. As tempting as it may be, these files are almost always
infested with advanced and difficult to detect bugs. Play it safe and get your software from the
source.
10. Install a Firewall – A firewall is a program that screens incoming Internet and network
traffic. Along with your virus program, it can help prevent unauthorized access to your computer.
11. Be prepared to Lock Down – If you hear of a virus that is spreading like wildfire through the
Internet, make an extra effort to be careful. Don’t open any suspicious emails or accept any
downloads for a week or two until your virus protection program has been updated and you are,
once again, safe.
WHAT IS TROUBLESHOOTING
Troubleshooting often involves the process of elimination, where a technician will follow a set of
steps to determine the problem or resolve the problem. The process of solving a problem or
determining a problem to an issue. Troubleshooting is a method of finding the cause of a
problem and decorating it. The ultimate goal of troubleshooting is to get the equipment back into
operation. This is very important job because the entire production operation may depend on the
troubleshooter’s ability to solve the problem quickly and economically, thus returning the
equipment to service.
TROUBLESHOOTING STEPS
32
The five troubleshooting process consists of the following:
33