Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

Plan and Prepare for Maintenance • Backup your files

and Repair • Install or secure


passwords
• Delete temporary files
Planning and • Update antivirus and
preparing systematic spy ware
maintenance procedure will
save time, money and
MONTHLY COMPUTER
frustration. It is a good idea
MAINTENANCE PLAN
and opportunity to learn the
proper care and
maintenance of your
computer.
PC maintenance is an
important topic for anyone
who owns a PC. Looking
after your PC properly
ensures you of trouble-free
use. Regular PC TYPES OF MAINTENANCE
maintenance also keeps the PROCEDURE:
machine’s
performance optimal. (1) Hardware maintenance is the
testing and cleaning of equipment.
A. Plan Maintenance Procedures for
Computer System and Networking. (2) Information system maintenance
is the routine updating of master
1. Design a systematic files, such as adding and deleting
maintenance plan for employees and customers and
hardware. changing credit limits and product
prices.
• Monitoring, evaluating and
updating plan. (3) Software or program
• Place your computer in a maintenance is the updating of
well-ventilated area. application programs in order to
• Schedule use of computers meet changing information
for its longer life. requirements, such as adding new
• Move computers only when functions and changing data formats.
it is turned off and It also includes fixing bugs and
unplugged. adapting the software to new
• Treat your computer hardware devices.
properly.
• Maintain your hard disk (4) Disk or file maintenance is the
periodic reorganizing of disk files that
2. Design a systematic have become fragmented due to
maintenance plan for your continuous updating.
software.
Work place procedures

• Identify hazards and assess risk.


• Execution of OHS policies are carried out along with the task.

Following certain procedure is very important to perform a given operation or


evolution or in reaction to a given event. The table below shows different elements and
their corresponding performance criteria to be able to identify occupational health and
safety hazards, and assess risk, as well as follow instructions and procedure in the
workplace with minimal supervision. The students will also be capable of participating
and contributing to OHS management issues.

ELEMENT PERFORMANCE CRITERIA


1. Identify hazards and assess 1.1 Identify hazards in the work area and
risk. during the performance of workplace
duties.
1.2 Assess level of risk
2. Follow procedures and 2.1 Report hazards in the work area to
strategies for risk control. designated personnel according to
workplace procedures
2.2 Follow workplace procedures and work
instructions for assessing and
controlling risks with minimal
supervision.
2.3 Whenever necessary, within the scope of
responsibilities and competencies,
follow workplace procedures for dealing
with hazards and incidents, fire and/or
other emergencies.
3. Contribute to OHS in the 3.1 Describe employee rights
workplace. regarding consultation on OHS
matters
3.2 Raise task and/or job specific OHS
issues with appropriate people in
accordance with workplace procedures
and relevant OHS legislative
requirements
3.3 Contribute to participative arrangement
for OHS management in the workplace
within organisational procedures and
the scope of responsibilities and
competencies
3.4 Provide feedback to supervisor
on hazards in work area in line
with organisational OHS policies
and procedures
3.5 Provide support in
implementing procedures to
control risks in accordance
with organisational procedures

Examples of OHS issues which □ Hazards identified


may need to be raised by □ Problems encountered in
workers with designated managing risks associated with hazards
personnel may include:
□ Clarification on understanding
of OHS policies and procedures
□ Communication and
consultation processes
□ Follow up on reports
and feedback.
□ Effectiveness of risk controls
in place
□ Training needs
Materials, Tools, Equipment and Testing Devices.

Tools
(1) A program used for software development or system maintenance. Virtually any
program or utility that helps programmers or users develop applications or maintain
their computers can be called a tool. Examples of programming tools are compilers,
interpreters, assemblers, 4GLs, editors, debuggers and application generators.
(2) A program that helps the user analyze or search for data. For example, query
and report programs are often called query tools and report tools.
(3) An on-screen function in a graphics program; for example, a line draw, circle
draw or brush tool.
(4) A software control panel for setting user preferences.
(5) Sometimes, people will call any software a "tool." For example, the phrase, "there
aren't any tools to do that job" means that no application is available to perform the
required processing.

Materials

Equipment/Facilities Tools & Instruments Supplies & Materials

Server Protective eye wear Floppy disk


Computer Wire stripper with cutter Compact Disk
peripherals Pliers(Assorted)
Desktop computers Screw drivers (Assorted)
OHS guidelines Phil. Soldering iron/gun
Environmental De-soldering tool
protection standards Flashlight
Monitors Motherboard Tweezers Mirrors
Power supply Network Antistatic wrist wrap
device and cablings LAN Tester Crimping
Hubs tool Software installer
Switches LAN Work bench
Cards Magnifying glass
Printers and
Scanners
Routers
USB Flash Drives
OPERATION SHEET 1.1

Plan and Prepare Maintenance Procedure

1. Prepare/Design a daily maintenance plan for your hardware, given the time
allotment of 1 week.

MAINTENANCE TASK MON TUE WED THUR FRI

Recalibrate the battery


Clean computer case
Clean keyboard
Clean mouse
Clean screen

Clean up hard drives

2. Design a systematic daily plan for your software, given the time allotment of 1 week.

MAINTENANCE TASK MON TUE WED THUR FRIDAY


Create an emergency
diskette
Check for viruses
Back up files
Defragment hard drive
Scan hard drive for errors
Program course : Computer Systems Servicing NCII
Unit of Competency : Maintain and Repair Computer Systems and
Networks
Module : Maintaining and Repairing Computer Systems and
Networks

LO.2 Title : Maintain computer systems and networks

Assessment Criteria:

1. Appropriate personal protective equipment conform to standard


procedures.
2. Confirmation of computer normal function conforms to correct operation and
safety.
3. Periodic maintenance of equipment is performed following
manufacturer’s requirements.
4. Established procedures are followed in case of repair and parts
replacements.
5. Accidental events or conditions are responded to in accordance with the
established standards.

Resources:
Equipment/Facilities Tools & Instruments Supplies & Materials

Server Protective eye wear Floppy disk


Computer peripherals Wire stripper with cutter Compact Disk
Desktop computers Pliers(Assorted)
OHS guidelines Screw drivers (Assorted)
Phil. Environmental Soldering iron/gun
protection standards De-soldering tool
Monitors Flashlight
Motherboard Tweezers
Power supply Mirrors
Network device and Antistatic wrist wrap
cablings LAN Tester
Hubs Crimping tool
Switches Software installer
LAN Cards Work bench
Printers and Scanners Magnifying glass
Routers
USB Flash Drives

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 11
Reference:

1. McLaughlin,Robert, Sasser,Susan, Ralston,Mary.Fix Your Own


PC.Philippine Graphic Arts, Inc Tandang Sora St.Caloocan City
2. Meralco Faoundation. Microcomputer Servicing Plus. Pasig City,
Philippines.
3. Legaspi,Carlos, Caiña, Mark Anthony. Operate A Personal Computer.
Dasmariñas Computer Learning Center.Dasmariñas,Cavite, Philippines
4. Bigelow,Stephen J. PC Technician’s Troubleshooting ,McGaw Hill
5. www.helpwithpcs.com
6. http://en.wikipedia.org
7. www.techsoup.org
8. www.howstuffworks.com
9. www.microsoft.com/technet/network

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 12
INFORMATION SHEET 2.1

Personal Protective Equipment


There are tools and equipments used to protect the user and the computer system.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipments

ESD (Electro Static Discharge)


-A small amount of static electricity that can destroy small parts of your computer.

Anti-static devices
-Devices designed to protect the computer from static electricity. Examples:
1. Anti-static wrist strap
2. Anti-static mat
3. Anti-static bag
4. Anti-static spray

Power surge protectors


-Devices designed to protect the computer from sudden power serges from intermittent
power sources.
Examples:
1. AVR (Automatic Voltage Regulators)
2. UPS (Uninterrupted Power Supply)

Personal Equipments
1. Small paint brush
2. Screw drivers

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 13
3. Pliers and tweezers
4. Compressed air
5. Handheld vacuum
Periodic Maintenance Scheme

Regular scheduled upkeep of your computer will keep you and you and your computer
working properly.

Daily Schedule

• Update virus and spyware definitions


• Do incremental backup – back up updated files for each date.
• Reboot upon crash- Reboot the computer to fix your pc upon crash.

Weekly

• Full virus and spyware scan


• Complete backup of files
• Patch up –Get latest software update for your operating system.

Monthly

• Clean your PC inside and out.


• Defrag- defrag your hard drive to speed up its operation.

Yearly

• Check your programs – clean up unused programs


• Reformat your hard drive and reinstall the operating system
• Make a full diagnostic check on hardware and software

Sample Maintenance scheme

Recommended
Preventive Maintenance Activity Auto?
Frequency
Scan hard disk file systems for Daily Yes
errors
Scan for viruses Daily Yes
Back up data Daily No
Clean CRT screen Weekly No

Date: Pag
e
Version Module : Maintaining and Repairing Computer Systems 13
and Networks
Defragment hard disks Monthly Yes
Scan for hard disk read errors Weekly Yes
Clean mouse Monthly No
Check for full hard disk volumes and
Monthly No
remove unnecessary files
Update virus definition files Monthly Sometime
s
Check power protection devices to
Quarterl No
ensure they are still protecting the
y
system
Check power supply fan for ventilation
Quarterl No
and dirt buildup and clean if
y
necessary
Back up CMOS information Quarterl No
y
Update emergency boot floppies Quarterl No
y
Clean floppy disk drive internals and Quarterly
No
read/write heads (depending on
use)
Check processor temperature, inspect Annually (or
No
heat sink and fan to ensure they are whenever case is
working opened)
Check hard disk for temperature and Annually (or
No
vibration whenever case is
opened)
Clean exterior of case Annually No
Clean exterior of monitor Annually No
Check and clean interior, motherboard
Annually No
and expansion cards if necessary
Check internal connections and Annually No
cables
Clean keyboard Annually No

Self check 2.1

Write your answers on your answer sheet

1. For somebody who always works with computers, what personal


protective devices do you usually use?
2. Computers should be protected from static electricity to prevent component
malfunction. What anti-static devices can you utilize to avoid such
malfunction?
Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 14
INFORMATION SHEET 2.2

Removing viruses from infected machines

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 15
Computer Virus

▪ A virus is a destructive executable program that


infects the other programs in the system and
spreads by replicating itself.

▪ Such a program is designed to damage the victim’s


computer files.

▪ Viruses are coded by malicious programmers in a way that they can spread
in the system without one's permission and knowledge.

Different Aspects of Computer Virus

Finder- searches for the new uninfected files and the

Replicator- actually targets these files and infects it by multiplying itself.

How do Virus Affects a System?

• It corrupts files
• It slows down the speed of the computer system
• It causes the system to hang frequently
• It deletes various files

Sources of Virus Infection

A virus can enter the system and infect it through various sources. Some of the
sources are

• Infected CDs, DVDs, pen drives, etc


• E-mail
• Browsing infected sites
• Downloading files from the internet

Steps to Remove Viruses

Removing viruses, though technical, is yet a very simple process if all the
required steps are properly followed.

The basic steps are:

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 16
• Buy or download an antivirus software
• Install the antivirus software

• Update antivirus software with the latest virus definitions


• Do a complete system scan

Methods of Eliminating Viruses


Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 17
Removing the virus – When the virus can be easily identified and can be removed
without affecting other files, then the antivirus removes it from the host place.

Quarantine – This is done when the virus cannot be easily identified removed from the
file and the removal of virus means the removal of the complete file. In this method,
although the virus is not eliminated, it is rendered inactive by moving the file into
"quarantine" and renaming it.

Types of viruses and Examples

Boot viruses: These viruses infect floppy disk boot records or master boot records in
hard disks. They replace the boot record program (which is responsible for loading
the operating system in memory) copying it elsewhere on the disk or overwriting it.
Boot viruses load into memory if the computer tries to read the disk while it is
booting.

Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those with extensions
like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs
are loaded in memory during execution, taking the virus with them. The virus
becomes active in memory, making copies of itself and infecting files on disk.

Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files
and when the infected program is executed, these viruses infect the boot record.

Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection. They may
either redirect the disk head to read another sector instead of the one in which they
reside or they may alter the reading of the infected file’s size shown in the directory
listing. size given in the directory.

Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so that it
appears differently in each infection. These viruses are more difficult to

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 18
detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects the
macros within a document or template. When you open a word processing or
spreadsheet document, the macro virus is activated and it infects the Normal
template.
Examples: DMV, Nuclear, Word Concept.

Antivirus Software

Software designed to cure virus infected machines. An antivirus is a program that


searches for, identifies and removes potential viruses existing in the computer system

Examples of Anti-virus software

• Symantec Norton antivirus


• AVG antivirus
• McAfee Scan
• Microsoft Antivirus

OPERATION SHEET 2.1

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 19
Virus removal

Equipment and Materials:

Equipment
System unit
Monitor
Keyboard and Mouse

Materials
Anti-virus Software (AVG anti-virus)

Virus removal

Provided with the necessary equipment and materials troubleshoot the virus infected
area.

You will be assessed using the following criteria


Evaluation:
CRITERIA Rating
1.Periodic maintenance is observed 20%
2. Observance of safety precautions. 20%

3. Appropriate materials are used virus removal. 30%

4. Confirmation of computers normal function . 30%

100%

Program course : Computer Systems Servicing NCII

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 20
Unit of Competency : Maintain and Repair Computer Systems and
Networks
Module : Maintaining and Repairing Computer Systems and
Networks

LO.3 Title : Inspecting and testing computer system and


networks

Assessment Criteria:

1. Final inspection of the device is instituted to ensure task perfection.


2. Computer system is validated to ensure 100% operation.
3. Laboratory management and maintenance conforms to company
atmosphere.
4. Accomplishment report is delivered to concerned teacher after
finishing the task.

Resources:
Equipment/Facilitie s Tools & Instruments Supplies & Materials

Server Protective eye wear Floppy disk


Computer Wire stripper with cutter Compact Disk
peripherals Pliers(Assorted)
Desktop computers Screw drivers (Assorted)
OHS guidelines Soldering iron/gun
Phil. Environmental De-soldering tool
protection standards Flashlight
Monitors Tweezers
Motherboard Mirrors
Power supply Antistatic wrist wrap
Network device and LAN Tester
cablings Crimping tool
Hubs Software installer
Switches Work bench
LAN Cards Magnifying glass
Printers and Allen key .05-.25
Scanners IC insertion/extraction
Routers tool
USB Flash Drives RS-232 pin
insertion/extraction tool

Reference:

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 21
1. McLaughlin,Robert, Sasser,Susan, Ralston,Mary.Fix Your Own
PC.Philippine Graphic Arts, Inc Tandang Sora St.Caloocan City
2. Meralco Faoundation. Microcomputer Servicing Plus. Pasig City,
Philippines.
3. Legaspi,Carlos, Caiña, Mark Anthony. Operate A Personal Computer.
Dasmariñas Computer Learning Center.Dasmariñas,Cavite, Philippines
4. Bigelow,Stephen J. PC Technician’s Troubleshooting ,McGaw Hill
5. www.helpwithpcs.com
6. http://en.wikipedia.org
7. www.techsoup.org
8. www.howstuffworks.com
9. www.microsoft.com/technet/network

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 22
JOB SHEET 3.1

Computer System and Network Inspection Materials,

Tools and Equipment

Equipment:

Computer unit Printer


HUB
MODEM/Router Table

Materials:

Windows XP CD installer (original software)

Hardware Inspection
Given the following tools, materials and equipment, perform hardware
inspection.

You will be assessed using the following criteria


Evaluation:
CRITERIA Rating
1. Sequence of steps. 20%
2. Observance safety precautions. 30%

3. Proper inspection of hardware components. 30%

4. Proper inspection of the printer. 20%

100%

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 23
Network and Internet Inspection
Given the following tools, materials and equipment, perform Network and
Internet inspection.

You will be assessed using the following criteria

Evaluation:
CRITERIA Rating
1. Sequence of steps. 20%
2. Observance of safety precautions. 20%

3. Proper inspection of network components. 30%

4. Proper inspection of network connection. 30%

100%

Operating System Inspection


Given the following tools, materials and equipment, perform Operating System
inspection

You will be assessed using the following criteria

Evaluation:
CRITERIA RATING
1. Sequence of steps. 20%
2. Observance of safety precautions. 20%

3. Proper inspection of operating system. 30%

4. Proper inspection of operating system updates. 30%

100%

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 24
Answer key 2.1

1. Personal protective devices-The tools and equipments used to protect the


user and the computer system
2. Anti-static devices
• Anti-static wrist strap
• Anti-static mat
• Anti-static bag
• Anti-static spray

Date: Page
Version Module : Maintaining and Repairing Computer Systems and Networks 25

You might also like