CSS Q4 Modules
CSS Q4 Modules
CSS Q4 Modules
COMPUTER SYSTEM
SERVICING
9
QUARTER 4 - MODULE 1
DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)
1
MODULE 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEMS
ERRORS
SAFETY PRECAUTIONS
Proper preparation is the key to a successful work. Before you begin, make
sure that you have the tools you will need, and secure a clear well-lit workplace.
Gather all the components you’ll be using and unpack them at the same time. Always
keep in mind that personal protection is one of the traits of a good computer
technician.
Types of personal protective devices
1. Anti-static devices
2. Power surge protectors
3. Personal equipment
Anti-static devices
Devices designed to protect the computer from static electricity.
2
Power surge protectors
Devices designed to protect the computer from sudden power surges from
intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulators)
Personal Equipment
Small paint brush
Screw drivers
3
Compressed air
Handheld vacuum
• Choose a partner
• Do a simulation exercise o One will act out the role of
a computer teacher. o The other will be the student
1. For somebody who always works (do troubleshooting) with computers, what
personal protective devices do you usually use? How often do you use them?
2. Computers should be protected from static electricity to prevent component
malfunction. What anti-static devices can you utilize to avoid such
malfunction?
4
There are several errors in a computer from the point you open it up to the point you
reach the stand by window (reaching standby windows means boot process has no
error). Here's a list of computer error.
1. No Video Output - When you open your PC, nothing shows up in your monitor
and the LED indicator of your monitor is flashing in yellow color.
2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.
3. Doesn't Boot - When you open your PC it will show the processor brand and/or
the motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.
4. Never Ending Loading of Operating system - The computer opens up then boots
but when the operating system loads it doesn't continue and it will take a lifetime if
you're going to wait for it to load.
5 Lots of pop up windows showing on standby mode - This also happens even if you
try disconnecting your computer set from the internet. This is what we called
aftershock virus which will continue to run even if internet is disconnected.
6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.
7. Safe mode doesn't work - When you try going to safe mode all you will see is a
list of files in Command prompt style.
8. Keyboard and mouse system restart - This will happen only in standby mode,
when you move your mouse or type something, your system will automatically restart
and the worst part is it will delete a file at random.
9. Sound on/off error - Upon loading the operating system, you will hear a loading
sound and then the sound stops, when you try running an audio file, no sound will be
heard.
10. Application causes system to restart - Just like the mouse problem, when you
open a program that will take the whole screen like for example a game and/or a
program applications, when you close it, it will cause your system to restart.
Aside from the common computer errors, computers also can have different
Operating System (OS) errors. OS errors can be classified into various categories,
such as:
5
application that caused it to shut down. However, more serious runtime errors
may cause the system to become unstable or unresponsive, leaving you with
no choice but to reach for the Reset button.
3. Stop errors – Stop errors are caused by corrupted hardware, especially
malfunctioning RAM modules and bad sectors on hard disks. Stop errors can
be difficult to resolve at times.
4. Device Manager Errors – These are usually caused by corrupted driver files
or malfunctioning hardware components. In case of the former cause, the
problem is usually solved simply by reinstalling or updating the drivers.
However, the latter cause can often be solved only by replacing hardware
components.
5. POST code errors – POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds from the
tiny internal speaker of your motherboard. POST code errors occur when you
press the power button to turn on your PC..
6. Application errors – These can be caused at any point of time. As the name
suggests, these are caused by applications while those are running. These are
usually caused by glitches in the program code itself. These are usually
resolved by updating the program to its latest version.
7. Browser Status Codes – These are caused by problems faced by browsers
when trying to access a website. These can be caused by misplaced web
pages in the server of the website itself, or due to connection problems. For
instance, a 404 error would indicate that the browser is trying to access a
webpage that does not exist in the specified location.
PC Diagnosing
Trial and error: When you find a faulty component in your computer, check it
with the other computers so that you can make sure whether the fault is in the
component or not.
Check cables: In case of any device failure, check all the cables of your
computer such as data cables, power cable, internal circuitry cables and
make sure that all these are plugged in and working fine.
6
Hardware settings: Check the hardware settings in the CMOS and in the
device manager of the system and make all the device drivers up to date and
all the cards are plugged in properly.
Notice changes: When you notice a software or hardware error in your
computer, determine what was changed before the problem occurred.
Event viewer: In the event viewer, you will find the error or warning messages
associated with any faulty hardware or software.
Make notes: Troubleshooting is a big learning option and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a record on
how a certain problem occurred and how did you solve it.
1. Check the POST. POST stands for Power On Self-Test. This is generally the first
or second thing that appears on a computer after turning on the power. This appears
before the operating system begins to load. The POST will display any problems
found with hardware that makes the computer unable to boot, POST may also
display problems with hardware that allow the computer to boot, but not operate at its
full capacity during operation.
2. Notice the load time of the OS (operating system). A longer than usual load
time may indicate errors in the hard drive.
3. Notice any graphics problems once the OS has loaded. Reduced graphics
may indicate driver failures or hardware failures with graphic cards.
7
6. Check any newly installed software. Software may require more resources
than the system can provide. Chances are that if a problem begins after software
starts, the software is causing it. If the problem appears directly upon startup, it may
be caused by software that starts automatically on boot.
10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly
during POST (this works on most systems). If the problem persists in safe mode, it is
a fair bet that the operating system itself is to blame.
1. Moderately dangerous types of errors among those that can pop up on your PC.
2. Caused by malfunctioning hardware components, and are characterized by short
beep sounds from the tiny internal speaker of your motherboard.
3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware components.
5. Caused by corrupted or malfunctioning system files or software executables.
6. Caused by corrupted hardware, especially malfunctioning RAM modules and bad
sectors on hard disks.
7. Caused by problems faced by browsers when trying to access a website.
AC outlet
AVR
AVR fuse
Monitor Switch
Power Supply
9
9
COMPUTER SYSTEM
SERVICING
9
10
QUARTER 4 - MODULE 2
DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)
SAFETY PRECAUTIONS
Every worker has a right to healthy and safe work and to a work environment
that enables them to live a socially and economically productive life. Safety practices
should be learned early and always adhered when working with any electrical device
including personal computers and peripherals.
11
Personal safety while working with PC’s
The following statements are some safety precautions to take before working with
any computer devices:
12
Atom Basic component of matter. It composes of a
nucleus which is the central part, the protons and electrons.
Voltage the amount of pulling force that makes the electron flow. Also
known as potential difference or EMF(electromotive force). The amount of
voltage can be measured in volt (V).
Conductors are materials that easily allow the flow of current, or it has a
low resistance to current flow.
Insulators are materials that do not easily allow the flow of current, or it has
a high resistance to current flow.
Types of Current
1. Direct Current
In direct current (DC), the flow of electric charge is only in one direction. This is
the type of electricity is produced by batteries, static, and lightning. A voltage is
created, and maybe stored, until it is consumed. When the current flows directly, in
one direction. In the circuit, the current flows at a specific, constant voltage ( this is
oversimplified somewhat but good enough for our needs.) When you use a flashlight,
pocket radio, portable CD player or virtually any other type of portable or
batterypowered device, you are using direct current.
Most DC circuits are relatively low in voltage; for example, your car's battery is
approximately 12V, and that's about as high a DC voltage as most people ever use.
13
Figure 1. Direct Current
An ideal 12 V DC current. The voltage is considered positive because its potential is
measured relative to ground or the zero-potential default state of the earth.
Direct currents flow in one direction only, and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced from
power sources such as batteries, power supplies and DC generators. Photovoltaic
devices such as solar cells also generate DC power.
2. AC Alternating Current
In alternating current (AC, also ac) the movement of electric charge
periodically reverses direction. This type of electricity is produced or generated by AC
generators commonly from a hydro electric plant. It is the commercial power that we
use in homes and offices. Delivered through a power transmission lines. AC current
can be reduced through the use of power transformer to suite for its application. It
can also be converted to DC for a specific purpose. In the Philippines AC is rated as
220V AC at 60 Hz.
Alternating currents change direction, flowing first one way and then the other.
They are sinusoidal waves, so that they change in time. They are produced from
sources such as power supplies and AC generators. In North America, AC is 120
volts and 60 hertz or cycles per second. This means it changes direction 60 times per
second. In Europe, it is generally 50 hertz with 220 to 240 volts.
Why does standard electricity come only in the form of alternating current?
There are a number of reasons, but one of the most important is that a characteristic
of AC is that it is relatively easy to change voltages from one level to another using a
transformer, while transformers do not work for DC. This capability allows the
companies that generate and distribute electricity to do it in a more efficient manner,
by transmitting it at high voltage for long lengths, which reduces energy loss due to
the resistance in the transmission wires. Another reason is that it may be easier to
mechanically generate alternating current electricity than direct current.
PC’s use only direct current, which means that the alternating current provided
by your utility must be converted to direct current before use. This is the
primary function of your power supply.
14
AC POWER PC ’s PSU DC POWER
MOTHERBOARD
DRIVES
COOLING FANS
Electric Circuit
Components of Circuit
Load
Supply
Switch
Types of Circuit
1. Open Circuit - a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.
15
Load
- +
Supply
Switch
The switch is said to be “OPEN” the current can’t flow into the circuit and the bulb
is “OFF”
2. Closed Circuit - a type of circuit that has a closed path for current to flow. It means
that current can flow in a closed circuit.
Load
- +
Supply
Switch
The switch is said to be “CLOSED” the current can’t flow into the circuit and the
bulb is “ON”
16
_________1. Define as the flow of electron or electric current. It is an invisible form of
energy that can be transform into other form of energy like heat light
and mechanical.
_________2. The negatively charge component of an atom. It has the ability to flow.
_________3. Define as the opposition to the flow of current. The amount of resistance
can be measure in ohms (Ω).
_________4. The positively charge component of an atom. It has the ability to attract
electron.
_________5. Anything that occupy space and has mass. It can be a solid, liquid or
gas in state.
_________8. The amount of pulling force that makes the electron flow. Also known as
potential difference or EMF (electromotive force). The amount of voltage
can be measured in volt (V).
_________9. Materials that easily allow the flow of current, or it has a low resistance
to current flow.
_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
_________11. A computer power supply converts AC to ___________________.
_________12. Define as the pathways for electricity to flow.
17
Techniques for diagnosing computer systems
Computer Diagnosis
Sometimes when the problem with a system is not totally apparent and the
problem may be intermittent, using a basic common diagnostic procedure may help
determine what is wrong. This procedure has a number of steps that, if followed each
time, can be of help.
People ware
• Untrained personnel would probably damage programs in PC. Firmware
• Programs or software burnt in chips may be corrupted. Software
• Corrupted operating systems would cause the system to fail. Hardware
Electricity
Incoming supply from AC outlet must be regulated; power surges can damage
computer units.
Problem Isolation
18
gather will help diagnose your computer. You need to observe wisely. Look for any
abnormalities in the unit, any change in smell or foreign smell, listen to all the sounds,
and error codes.
Component Isolation
This section will aid in determining components in your system which are
failing. First, most systems have 3 major components; monitor, system unit, and
printers. Some have multiple external devices. To troubleshoot, you need to isolate
major components which are failing to operate.
3. Check the pins if the corresponding voltage are properly regulated to the
motherboard.
Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8 Pin 9 Pin 10
Oran Oran Blk Red Blk Red Blk Gray Purp Yell
Oran Blue Blk Green Blk Blk Blk White Red Red
19
3.3V -12V Gnd P_ON Gnd Gnd Gnd -5V 5V 5V
Pin 11 Pin 12 Pin 13 Pin 14 Pin 15 Pin 16 Pin 17 Pin 18 Pin 19 Pin 20
Warning! You must unplug your ATX power supply from the wall before working
inside the case.
20
ATX Diagnostic chart
Things to Consider
There are many devices, parts, cords, and connections on a computer, which
means that there are many possible problems that could arise. In addition, your
computer uses a variety of software, which can also cause problems. However, no
21
matter what the problem is, you can use the following tips to help you find a
solution:
• Always check the cables: Many computer problems are related to an issue in
the cables and connections. The easiest first step you can take to troubleshoot
most problems is to check all related cables and connections.
• Isolate the problem: If possible, try to isolate the problem. For example, if you
can't get the cursor to move on the screen, try to determine if the issue is with the
mouse. If you have an extra mouse, you can alternate devices to see if the one
plugged in is the issue, or use the arrow keys on the keyboard to help determine if
the mouse is the source of the problem. When trying to isolate the problem, only
make one change at a time.
• Take notes about error messages: If your computer gives you error messages,
be sure to write down as much information as possible. If the basic
troubleshooting steps don't work, you may need the information.
• Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't
repeat yourself. If you can't remember it, then write it down. If you end up asking
someone for help, it will be much easier if they know exactly which steps you've
taken.
• If a program is running slowly or otherwise isn't working right, the first thing you
should try is closing the program and re-opening it.
• You can also shut down your computer, wait a few seconds, and boot it up
again. Some minor problems will work themselves out when you do this.
• Check with the company for any known problems or updates to the software.
22
Figure 8. Checking for updates
• If a program has become completely unresponsive, you can press (and hold)
Control+Alt+Delete on your keyboard to open the Task Manager. You can then
select the program that isn't working and click End Task. If you are using a Mac,
you can press Option+Command+Esc to open a similar dialog box.
23
Figure 9. Resetting a surge protector
• If your computer does not start, begin by checking the power cord to confirm that
it is plugged securely into the back of the computer case and the power outlet.
• If it is plugged into an outlet, make sure it is a working outlet. Often, this will
require you to plug a lamp or other electrical device into the outlet to make sure it
is receiving power.
• If the computer is plugged into a surge protector, verify that it is turned on. You
may have to reset the surge protector by turning it off and then back on. You can
also plug a lamp or other device into the surge protector to verify that it is on.
• If you are using a laptop, the battery may not be charged. Plug the AC adapter
into the wall and then try to turn on the laptop. If it still doesn't start up, you may
need to wait a few minutes and then try again.
If you get this message when you boot up your computer, it usually means
there is a CD, DVD, USB flash drive, or floppy disk in your computer, which is
interfering with your computer's booting process. Remove the disk from the drive
and restart the computer.
24
Figure 11. The Windows shutdown screen
• Check for overheating. Make sure the vents in the case are not blocked. Confirm
that there is good air flow around the computer.
• Update your antivirus software and scan for viruses.
25
Monitor Goes Blank Periodically
26
Figure 15. Adjusting the sound volume on a Mac
• Check the volume control on your computer. In Windows, the sound icon will usually
be on the taskbar, and you can also access the sound options in the Control Panel.
On Macs, the sound options are found at the top of the screen or in System
Preferences.
• Most media programs (such as iTunes or Windows Media Player) have a volume
control, which will need to be turned up.
• Make sure the speakers are turned on, if using external speakers.
• Make sure external speakers are connected to the correct audio port or a USB port. If
your computer has color-coded ports, the audio output will usually be green.
• Connect headphones to the correct audio port and determine if sound is audible from
the headphones.
If you still haven't found a solution to your problem, you may need to ask
someone else for help. Try searching the web for the problem that you're having, as
other people may have had similar problems. Also, if you have a friend or family
member who knows a lot about computers, they may be able to help you.
Keep in mind that most computer problems have simple solutions, although it
may take some time to find them. For very difficult problems, a more drastic
solution may be required, such as reformatting your hard drive, reinstalling
programs, or reinstalling your operating system. If you're not a computer expert, it's
possible that you could make the situation worse, so it's best to consult a
professional if you think a drastic solution is needed.
1. Look at the back of your computer. Without opening the case, list the ports that you
believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the expansion
slots. Was your guess correct about which ports come from the motherboard?
3. To expose the motherboard so you can identify its parts, remove all the expansion
cards.
4. Draw a diagram of the motherboard and label these parts: Processor (Include the
prominent label on the processor housing.)
27
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16, and
AGP.) Each port coming directly from the motherboard Power supply
connections, SATA or IDE drive connectors and floppy drive connector
5. Draw a rectangle on the diagram to represent each bank of jumpers on the board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturer’s Web site. If you can find the motherboard manual on the
site, download it.
8. You can complete the following activity only if you have the documentation for the
motherboard:
28
Tools for Testing Computer System
Tools and equipment play vital roles in troubleshooting. They help the user
determine the errors found in their computer hardware and network.
1. Screw drivers - are used for installing and removing screws in the computer unit.
2. Pliers and tweezers - are used for picking small parts in the computer unit.
3. Soldering iron- is primarily used for connecting terminals in the power supply and
circuit board with the use of a soldering lead.
29
Figure1 8. Soldering iron
4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic discharge
in the work area.
5. Lens cleaner – a device used for cleaning optical media, such as DVD-ROMS and
CD-writers.
30
1. LAN Tester – is a device used for testing the network connection.
2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP cable.
Direction: Answer the following question . Write your answers on your notebook.
Enumerate the six tools used for 2 . Enumerate the two network
troubleshooting. troubleshooting tools.
1. . a.
2.
b.
3.
4.
5.
6.
31
Troubleshooting computer system network
Solution
Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable, ensure
that the LEDs on the network are properly illuminated. For example, a network card
with a solid green LED or light usually indicates that the card is either connected or
receiving a signal.
If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or that the
card is not receiving a signal from the network.
If you are on a small or local network and have the capability of checking a
hub or switch, verify that the cables are properly connected and that the hub or
switch has power.
Adapter resources
32
Ensure that if this is a new network card being installed into the computer that
the card's resources are properly set and not conflicting with any hardware in the
computer.
Adapter functionality
Verify that the network card is capable of detecting or seeing itself by using the
ping command. Windows / MS-DOS users ping the computer from a MS-DOS
prompt. Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping local host
This should show a listing of replies from the network card. If you receive an
error or if the transmission failed, it is likely that either the network card is not
physically installed into the computer correctly, or that the card is bad.
Protocol
Verify that the correct protocols are installed on the computer. Most networks today
will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other computer
assigns the IPX address, the user must specify an IP address as well as a Subnet
Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not
click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could
be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
7. When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of
102.55.92.2 on another computer and then specify the same Subnet Mask.
Firewall
If your computer network utilizes a firewall, ensure that all ports required are
open. If possible, close the firewall software program or disconnect the computer
from the firewall to ensure it is not causing the problem.
Additional time
In some cases it may take a computer some additional time to detect or see
the network. If after booting the computer you are unable to see the network, give the
computer 2-3 minutes to detect the network. Windows users may also want to try
33
pressing the F5 (refresh) key when in Network Neighborhood to refresh the network
connections and possibly detect the network
Additional troubleshooting
If after following or verifying the above recommendations you are still unable to
connect or see the network, attempt one or more of the below recommendations.
If you have installed or are using TCP/IP as your protocol you can ping another
computer's IP address to verify if the computer is able to send and receive data. To
do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant
users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you wish to
ping is 102.55.92.2, you would type: ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the network. If
you are still unable to connect or see the network, it is possible that other issues may
be present.
Another method of determining network issues is to use the tracert command
if you are a MS-DOS or Windows user or the trace route command if you are a
Linux / Unix variant user. To use this command you must be at the command prompt
or shell. Or trace route 102.55.92.2
This should begin listing the hops between the computer and network devices.
When the connection fails, determine what device is causing the issue by reviewing
the trace route listing.
Task: Setting up a local area network with a Dynamic Host Control Protocol
(DHCP) server is easy! The DHCP server provides all the information your computer
needs to get up and running on the network. Once connected, you will check
network connectivity with the router and at least one other peer on the network.
Procedure
Getting connected
1. Before connecting your PC to the network, be sure the Windows XP operating system
is running on your computer. You will use Windows XP sp2 throughout this activity.
34
a. How many network devices are listed in the output? Record their names in your
worksheet.
b. Is there an IPv4 address listed for any of the network devices? If so, record your
4. Connect your computer to a network switch using a patch cable. Did you get a light on
the switch? Record the port number you connected to in your worksheet.
5. Draw a diagram of the entire local area network in the space below, including the
6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet.
7. In the terminal window, type dhclient eth1 and press Enter. Describe what happens.
1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1
and press Enter. Record the times listed in the last column of the output. What was
the average round trip time (rtt) from your computer to the router and back?
2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP address for
the one listed in the previous item. Record the times listed in the last column below.
What was the average round trip time (rtt)?
3. When you have completed the activity, shut down your computer and return to
your seat.
Procedure
Getting connected
1. Before connecting your PC to the network, be sure the windows Operating system
is running on your computer.
35
2. When the boot process is completed, connect your computer to the network switch
using a patch cable. Did you get a light? What port number did you connect to on
the switch?
1. Open a terminal window on your computer, if one is not already open, by clicking
Applications->Accessories->Terminal.
2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat the
steps 4–11 in the previous section
3. Ask another group for their IP address. Check connectivity with that group's
computer with ping. For example, ping -c4 10.0.1.200. Record the times listed in the
last column below. What was the average round trip time?
4. Ask a second group for their IP address. Check connectivity to that group's
computer with ping. Record the times listed in the last column below. What was the
average round trip time?
CRITERIA Evaluation:
Passed Failed
Remarks
36
Computer System and Network Configurations
Computer Networks
Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers by
means of cabling systems, specialized software, and devices that manage data
traffic. A network enables users to share files and resources, such as printers, as well
as send messages electronically (e-mail) to each other.
The most common networks are Local Area Networks or LANs for short. A
LAN connects computers within a single geographical location, such as one office
building, office suite, or home. By contrast, Wide Area Networks (WANs) span
different cities or even countries, using phone lines or satellite links.
All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.
Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.
37
• Install the server or servers if you’re setting up a client/server network. (If you are
setting up a peer-to-peer network, you typically don’t have to worry about any
dedicated servers.)
• Set up the workstation hardware.
• Plug in and cable the Network Interface Cards (NICs – these connect the network to
the LAN).
• Install the hub or hubs (if you are using twisted-pair cable).
• Install printers.
• Load up the server software (the NOS, or Network Operating System) if your network
is a client/server type.
• Install the workstation software.
• Install modem hardware for remote dial-up (if you want the users to be able to dial into
the network).
• Install the programs you want to run (application software).
Network configuration means customizing the network for your own use.
• Creating network accounts for your users (names, passwords, and groups).
• Creating areas on shared disk drives for users to share data files.
• Creating areas on shared disk drives for users to share programs (unless everyone
runs programs from their own computer).
• Setting up print queues (the software that lets users share networked printers).
• Installing network support on user workstations, so they can "talk" to your network.
The work you do right after your LAN is up and running and configured can save you
huge amounts of time in the coming months. Mapping your network for easier
management and troubleshooting.
• Setting up appropriate security measures to protect against accidental and intentional
harm.
• Tuning up your LAN so that you get the best possible speed from it. Creating
company standards for adding hardware and software, so you don’t have nagging
compatibility problems later.
• Putting backup systems in place so that you have copies of data and programs if your
hardware fails.
• Installing some monitoring and diagnostic software so that you can check on your
network’s health and get an early warning of impleading problems.
• Figuring out how you plan to handle troubleshooting – educating your LAN
administrator, setting up a support contract with a software vendor, and so on.
Smooth Setup
38
One key advantage of a peer-to-peer network is that it’s easy to setup. With the
simplest sort of peer-to-peer network, you just use the built-in networking that comes
with your operating system (Windows 98, Windows XP, Windows 7,
Windows 8 and so on) and you have very little software to set up – even less if you
have computers that have the operating system preinstalled, as most computers do
these days.
A UTP cable (category 5) is one of the most popular LAN cables. This cable consists
of 4 twisted pairs of metal wires (that means there are 8 wires in the cable). Adding
RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they usually
use.
Preparation
Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-
side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement table).
Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.
39
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any cable
in this page is directionless --- that means you can set either end of the cable to either
device.)
Take the UTP cable with your left hand and a RJ45 connector with your right hand.
Hold the RJ45 connector in the way you can see the contact metal face of the RJ45
connector.
The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white twisted
pairs.
10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT,
in which there are only 3 wires inside the cable.)
A straight cable is used to connect a computer to a hub. You can use it to connect 2
hubs in the case one of the hubs has an uplink port (and you use normal port on the
other hub).
1 orangewhite orangewhite
2 orange orange
3 green-white green-white
4 blue blue
40
5 blue-white blue-white
6 green green
7 brown-white brown-white
8 brown brown
41
Task. Creating Peer to Peer Network
To create a peer network, follow these steps for each computer connected to the network:
1. Shut down the computer and install the network card and appropriate cabling for
each computer.
NOTE: For information about how to configure your network adapters and physically
connect your computers, consult the documentation included with your network adapters
or contact the manufacturer(s) of your network adapters.
2. Start Windows and install the network drivers. Windows may detect your network
card and install the drivers when you start the computer. If the network card drivers are
not included with Windows, follow the manufacturer's instructions about how to install
the network drivers.
3. Choose a client and a common protocol for each computer. To do this, follow these
steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.
c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
client in the Network Clients box, and then click OK.
4. Configure a peer server. Each computer that is configured for File and Printer
Sharing can act as a server. To configure a computer for File and Printer Sharing,
use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.
b. Click File and Print Sharing, click one or both options to share files and printers, click
OK, and then click OK again.
1. Give each computer a unique computer name. To do this, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.
b. On the Identification tab, type a unique name in the Computer name box.
42
c. Click OK, and then click Yes when you are prompted to restart your computer.
: NOTE: The computer name must be unique for each computer on the network and
should be no more than 15 characters in length. In small networks, the workgroup
name should be the same for each computer so that all computers are visible in the
same workgroup when browsing. You should not use spaces or the following
characters in computer and workgroup names
- UTP cables
- 4 Computer units
- 1 hub
CRITERIA 1 2 3 4 5
Safety Precautions are observed.
All the UTP are properly connected to the computer and
hub.
Computers are properly connected and seen in the
network.
Proper boot-up and shutdown of the computer is observed.
Total:
In this project, you will learn how useful the Internet can be for a PC support technician.
43
1. Using your own or a lab computer pretend that the motherboard manual is not
available and you need to replace a faulty processor. Identify the manufacturer and
model of the mother board by looking for the manufacturer name and model number
stamped on the board. Research the Web site for that manufacturer. Print the list of
processors the board can support.
2 .Research the Web site for your motherboard and print the instructions for flashing
BIOS.
Task. Analyze the situations below and answer the questions that follows.
When Jacob travels on company business, he finds it’s a great help to be able to
access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible. One way you can help Jacob add more security is to
change the port that Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port to a secret port, hackers
are less likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.
Practice implementing this change by doing the following:
44
9
COMPUTER SYSTEM
SERVICING
9
QUARTER 4 - MODULE 3
DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)
45
Module 3:INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS AND
NETWORKS
Observe good housekeeping in the area of the machines during and after
maintenance.
Place removed covers and other parts in a safe place, away from all personnel, while
you are servicing the machine.
Keep your tool case away from walk areas so that other people will not trip over
it.
Do not wear loose clothing that can be trapped in the moving parts of a
machine. Ensure that your sleeves are fastened or rolled up above your elbows.
If your hair is long, use hair net or hair cap.
46
Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.
After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
Finally, reinstall all covers correctly before returning the unit to the customers.
Electrical safety
Precautions
Never assume that power has been disconnected from a circuit. First, check
that it has been powered-off.
Always look carefully for possible hazards in your work
Moist floors
Non-grounded power extension cables
Power surges.
If an electrical accident occurs:
1. These steps will help you identify potentially unsafe conditions on electrical products:
Check exterior covers for damage (loose, broken, or sharp edges) Power-off
computer. Disconnect the power cord.
The power cord should be the appropriate type.
Insulation on the power cord must not be frayed or worn out.
Remove the cover.
47
Check for any obvious alteration. Use good judgment as to the safety of any
alterations.
Check for worn out, frayed or pinched cables.
Check that the power-supply cover fasteners (screws or rivets) have not been
removed or tampered with.
There must be a process put in place to report accidents, incidents or near misses
for immediate action and to help track causes. The organization needs to identify what
needs to be reported, to whom it is to be reported, and how to report it, then put this
process into a written procedure.
For example:
Any accident, incident, or "near miss," no matter how slight the injury or damage, must be
reported to the department supervisor immediately for appropriate action.
The supervisor is responsible for taking appropriate follow-up action, including getting
medical attention for the injured, completing an investigation report and recommending or
implementing appropriate corrective actions.
The primary purpose of the accident investigation is to identify the cause(s) of the
accident, incident or "near miss" and take action to prevent a similar occurrence in the
future. In some instances, an employee's or volunteer's failure to follow recognized safety
procedures requires disciplinary action to protect co-workers.
Remember: One person's actions can jeopardize the safety of others in the workplace.
Sample
Approved by
Chairman: Date:
1. Purpose [complies with legislation, ensure the necessary action to prevent any
recurrence and to enable the organization to maintain proper records.
2. Scope [accident, incident, near-miss; employee, volunteer, anyone on site or
involved in organization-sponsored activities]
3. Definitions [of terms]
4. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) • \ OSHA,
NIOSH?]
5. Absence resulting from an accident [who to report to, Return-to work]
6. Accident Investigation [who investigates, what to do with resulting
recommendations]
7. Forms [Names, where to find them]
8. Reportable Diseases [communicable diseases listed where?]
Accident Investigation Procedures
48
The senior staff member available at the accident scene or the first member notified
should complete the appropriate investigation reporting form (accident, incident, near
miss). The completed form should be given to the organization's safety committee,
which will forward a copy of the report to the safety coordinator for review.
Accident reports
Forms are used to give specific details with regards to the accidents happened in
the laboratory during experiments.
49
Date and time of the accident
Type of injury
First aid given
Action taken to prevent further accidents
Date:
Form Accident
No: Report
Form Rm. No:
Name: Yr/Sec:
When replacing computer parts and peripherals, you need to consider the following
factors:
50
1. Compatibility of the component or part
2. Consider the component specification
3. Components form factor
When replacing computer parts you should check if it is compatible with your unit.
Double check on your computer manual if the component you are replacing is
compatible or not with the unit because this may lead to system crash.
Component Specification
This focuses on the specification of the component. Check if the voltage rating,
current rating, memory size and frequency matches your computer unit.
Form factor
Note: Please refer to the Video for Proper Replacement of the components or parts
of the computer.
51
Figure 27. LAN Card
Figure28. Motherboard
Figure28. CPU
52
Figure29. CMOS Battery
Figure30. CD/DVD
1. Memory
2. Video card
3. NIC
4. Motherboard
5. HDD
To upgrade means to change some parts with faster and better performing ones. These
parts may even cost less and more powerful.
53
Commonly Upgraded Computer Parts
2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-ROM and DVD
writers.
Hard Drives- small capacity hard drives are replaced with faster and high capacity hard
drives.
54
Keyboards and mouse- keyboards and mouse are commonly replaced with optical
mouse and wireless keyboards.
RAM (Random Access Memory)- upgrading the computer’s memory or RAM speeds
up the performance of the computer
55
Processors- replacing the processors increase the data processing speed.
1. Defragmenter utility: Automatically analyzes the empty disk space on the hard
disk and defrag all scattered files.
56
Figure 31 . Defragmenter Utility
3. Increased memory: Increasing the memory in the system will result to exceptional
speed of your computer.
4. Disk Cleanup: You can delete unwanted programs and files from your computer
and this will be helpful in increasing the speed.
57
Figure33. Disk Cleanup
5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you
will get the space of C drive for reusability.
Memory Upgrade
To make your computer faster, you can upgrade its memory. Here are the steps in
upgrading your computer’s memory
The notches we have marked as B are used to align the memory module with the
DIMM slot key C as Figure 35. Notch A shown in Figure 36.
58
In Figure 36 you can see the ejector clips (D),
using your finger, push these into the down
position as shown in Figure 36 this allows the
memory to be inserted.
Next, take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly, press
gently but firmly until the card is seated fully and evenly into the slot (see fig 39).
59
When you are happy that the card is firmly in place, insert the fixing screw (fig
40) and check to make sure you have not loosened anything during installation.
Replace the case cover and reconnect the mains power.
When you reboot your machine Windows (or other OS) should find the card
automatically, it may then ask you to insert the disk/CD that came with your video
card, insert the CD and follow the on-screen instructions to install the video card
driver.
The first thing to do (after removing the case covers) is to locate the drive bay
where the hard drive will go (see fig 41 below).
In figure 42 below you can see a standard IDE Cable, note there are three (3)
connections (notice the difference in distance between the connectors). Connection A
plugs into the motherboard and then the slave and master connections are used for
IDE devices such as hard drives, if you are only installing one drive or the new drive
is to be the master then use the master connector, if the drive is to be the slave then
use the slave connector.
60
The IDE cable will be marked down one side with a red or black strip, this denotes
Pin 1, match this with the Pin 1 indicator on the back of the hard drive.
The power cable you will find in your case is attached to your power supply; you
can see an example below in figure 43.
Please make sure that your network Please make sure that your network adapter is
securely plugged into a USB adapter is securely plugged into a USB port on the
back of the box. port on the back of the box.
61
Possible solution for error message 1
3. If these steps have not resolved your issue, see Detailed Steps below
for additional assistance.
62
Box running software 14.8 and above: Box running software 14.7 and below:
Problem with network settings. (N05) The specified IP address (<IP Address>) is
already in use by another device on the
Change your network settings to use a
network. (N05)
different (and unused) IP address.
Change your network settings to use a
different (and unused) IP address.
Wireless Network Not Found. (N06) Could not connect to the wireless network
(<Network Name>). (N06)
1. Verify your TiVo box has the latest software version to support the
encryption used by your router.
2. Make sure your wireless network is operational and you have
sufficient signal strength where the box is located. See How to
configure network settings on your TiVo box for instructions.
3. Verify you entered the correct the correct name of your network
Quick Steps
63
8. If these steps have not resolved your issue, see Detailed Steps below
for additional assistance.
Adapter not set up. (N08) Your network adapter has not been set up
for use with the box. (N08)
Select Change network settings to begin
setting up your network adapter. Select Change network settings to begin
setting up your network adapter.
1. TiVo Wireless N adapter: Verify that your adapter has been set up
properly. Please see TiVo Wireless N Adapter Setup for instructions.
2. Verify you entered the correct name of your network and/or the
correct encryption key or password.
Quick Steps
64
10. If you have tried enabling netbios over tcp/ip
but doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still need help, contact
consultant at http://hidev.com/contactus.asp for
the tech support.
Network problem not 1. Type command "net share" on the shared computer.
available. The server is If there is not a share named "IPC$" in the share
not configured for list, use the command "net share ipc$" to create it.
transactions"
An extended error has 1. This issue may occur if the workstation doesn't
occurred" or "Access synchronize the time with the server. After verifying
Denied" Symptoms: that basic network connectivity exists, you can force
When mapping a time synchronization on the client computer
network drive using net manually. To do this, run net time /domain /set
use or using the net view command.
command to view a 2.
different computer in the Make sure you have granted enough licenses for
domain, you may clients accessing.
receive: "An extended
error has occurred" or
"Access Denied" error
messages.
“Computer name is not 1. Are you sure the logon user has permission to the
accessible. No shared folder?
permission to access the 2. Have you tried to logon using the same user name
resources" and password of the accessed computer?
3. The last and risky one, if you enable guest account
in computer, can you access now?
"Multiple connections to 1. Try using net use /d from a command to clear all
the server or shared your mapped connections before joining the
resource are not domain. You can also disconnect the mapped drive
allowed" in Windows Explorer by right-click the mapped drive
and select disconnection.
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all previous
65
connections to the
server or shared
resource and try again."
"Network path not found" 1. This issue may occur if the TCP/IP NetBIOS Helper
in a domain network 1 Service is not running on the client computer. To
start the TCP/IP NetBIOS Helper Service, go to
SYMPTOMS: MMS>Services, double-click TCP/IP NetBIOS
When trying to join a Helper Service.
domain by using he
NetBIOS domain name,
you are successful but
not the FQDN and you
may receive one of the
following error
messages:
"Network path not 1. You can find some computer browser errors on the
found" in a domain DNS server. Disable one of two NICs will work.
network 2 More resolutions can be found in browser Issue
page.
"Network path not found" 1. Make sure that File and Printer Sharing is
in a workgroup network - enabled on the shared computer.
error 53 Make sure that shared machine has something
shared.
2. Make sure that you have created the same
workgroup and logon the same username Make
sure that you have enabled NetBIOS over
TCP/IP if this is a mixed OS network.
"Not accessible. You 1. Enable NetBIOS over TCP/IP on one or more
may not have permission computers in the workgroup. To do that, go to
to use this network properties of Local Area Connection>properties of
resource" Internet Protocol
(TCP/IP)>General> Advanced>WINS, check Ena
Symptom: Your peerto- ble NetBIOS over TCP/IP (If you have a
66
peer network, may DHCPassigned IP address, select Use NetBIOS
receive the following setting from the DHCP server ).
error when you double- 2. Make sure the Computer Browser service is started.
click My Network
Places/Computers Near
Me: <Workgroup
Name> is not
accessible. You may not
have permission to use
this network resource.
Still need help, contact 1. Disable ICF if you don't need it.
consultant at http://hide 2. Open port # (UDP and TCP) from 135 through 139
v.com/contactus.asp for and/or 445. to do this, go to the properties of the
the tech support. connection>Advanced>ICF>Settings>Services. For
67
Microsoft file sharing SMB: add (UDP and TCP)
"System error 6118 ports from 135 through 139. For direct-hosted SMB
has occurred. The list traffic without network basic input/output system
of servers for this (NetBIOS) uses port (TCP and UDP) 445. Note: the
workgroup is not external and internal port numbers should be
currently available." identical.
Symptoms: When
using the net view
\\computername comm
and, you receive the
following error message:
System error 6118 has
occurred. The list of
servers for this
workgroup is not
currently available.
"The password is 1. You need to setup every user that needs access to
incorrect. Try again" the shared folder on every computer they have to
connect to. Then give the proper user proper
permission to the shared folder.
2. Logon the same user and password.
3. As always, you can try to enable a guest account on
the accessed machine.
"There are no entries on 1. If there are no file or print shares on the computer,
the list" the net view command displays a "There are no
entries in the list" message. So, make sure there
Symptom: when using are file or print shares on the computer. Or to use
net net share command to check sharing status.
view \\remotecomputer 2. Make sure no firewall running because the firewall
command, you may may block sharing.
receive "There are no
entries on the list". And
you may have a problem
to access the remote
computer.
68
"Unable to Browse 1. Have you loaded the NIC or is it working?
Network" 2. Have you loaded common protocol, TCP/IP?
3. Does the Computer browser work?
Symptom: When you 4. Have you enable file and printer sharing in the
attempt to browse your accessed computer?
network by opening 5. Is the workstation service running?
Entire Network in My
Network
Places/Network
Neighborhood, you may
receive the following
error message: Unable
to Browse Network.
This is the BIOS setup for Award BIOS v6.00PG. If you have a different
version of the Award BIOS there would be a lot of similarities. If your BIOS are AMI or
Phoenix then the common BIOS features would have some similarities. Whatever
BIOS you have, this setup guide should give you an idea about how to setup BIOS.
Please note that setting up BIOS incorrectly could cause system malfunction,
therefore it is recommended that you also follow the BIOS guide provided on your
motherboard manual. If you decide to make changes to certain options it is safer to
make a note of what you have changed. Then restart the system to see how it
performs. If the system behaves abnormally or becomes unstable you can revert
back to your previous settings.
Soft menu III is where you can setup up the CPU without setting jumpers on
the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium
III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is correctly
69
set for that particular CPU. However you can manually setup each feature if required.
Once you have finished with the setup press ESC to return the previous menu.
Here you can setup the basic BIOS features such as date, time, type of floppy
etc. Use the arrow keys to move around and press enter to select the required option.
You can specify what IDE devices you have such as Hard drive, CD-ROM, ZIP drive
etc. The easiest way to setup the IDE devices is by leaving it set to auto. This allows
the BIOS to detect the devices automatically so you don't have to do it manually. At
the bottom, it also displays the total memory in your system.
70
Advanced BIOS Features
As you can see from figure 3, there are numerous advance settings which you
can select if required. For most cases leaving the default setting should be adequate.
As you can see the first boot device is set to floppy. This ensures that the floppy disk is
read first when the system boots, and therefore can boot from windows boot disk. The
second boot device is the Hard disk and third is set to LS120. If you want to boot from
a bootable CD then you can set the third boot device to CD/DVD-ROM.
Here you can setup the contents of the chipset buffers. It is closely related to
the hardware and is therefore recommended that you leave the default setting unless
you know what you are doing. Having an incorrect setting can make your system
unstable. If you know that your SDRAM can handle CAS 2, then making changes can
speed up the memory timing. If you have 128MB SDRAM then the maximum amount
of memory the AGP card can use is 128MB.
71
Figure4 7. Advance Bios Chipset
Integrated Peripherals
This menu allows you to change the various I/O devices such as IDE controllers,
serial ports, parallel port, keyboard etc. You can make changes as necessary.
The power management allows you to setup various power saving features, when
the PC is in standby or suspend mode.
72
Figure49. Power Management setup
PnP/PCI Configurations
This menu allows you to configure your PCI slots. You can assign IRQ's for
various PCI slots. It is recommended that you leave the default settings as it can get a
bit complicated messing around with IRQ's
PC Health Status
This menu displays the current CPU temperature, the fan speeds, voltages
etc. You can set the warning temperature which will trigger an alarm if the CPU
exceeds the specified temperature.
73
Figure51. PC Health Status
Load Fail-Safe Defaults
If you made changes to the BIOS and your system becomes unstable as a
result, you can change it back to default. However if you made many changes and
don't know which one is causing the problem, your best bet is to choose the option
"Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal
performance setting, but the system would run in a stable way. From the dialog box
Choose "Y" followed by enter to load Fail-Safe Defaults.
Like the Fail-Safe mode above, this option loads the BIOS default settings, but
runs the system at optimal performance. From the dialog box Choose "Y" followed by
enter to load Optimized Defaults.
74
Figure 53. Load optimized
Set Password
To password protect your BIOS you can specify a password. Make sure you
don't forget the password or you cannot access the BIOS. The only way you can
access the BIOS is by resetting it using the reset jumper on the motherboard.
To save any changes you made to the BIOS you must choose this option.
From the dialog box choose "Y".
If you don't want to save changes made to the BIOS, choose "N" from the
dialog box.
75
Task 1. The BIOS settings in the CMOS memory have become corrupted or
damaged
Procedure:
CRITERIA Evaluation
Passed Failed
Remarks
76
Practicing TCP/IP Networking Skills
6. What response do you get when you ping the default gateway?
1. Give a brief description of FiOS and how it is used for Internet access.
3. When using FiOS, does your telephone voice communication share the fiber-optic
cable with Internet data?
4. What does Verizon say about FiOS cabling used for television?
Hardware Upgrade
77
Tools
Anti-static mat
Equipment
Network Card
Given the tools and materials, upgrade your computer by installing a network card.
CRITERIA Evaluation
Passed Failed
Remarks
78
Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last time
your Internet connection was down.
The best way to find out what's wrong is to take a proactive approach: Check
under your PC's hood with the following mostly free diagnostic tools, and see if
anything is amiss--before disaster strikes.
• Hardware
• Software
• Firmware
Video cards
Monitor power
cable
79
2. Keyboard and Mouse
• Keyboard connector
• Mouse Connector
Keyboard connecter
Mouse connector
80
I/O circuit board
Parallell ports
4. Power supply
• Power cord
• Fuse
Power supply
81
1. Operating system
• Run live updates for your operating systems to get the latest patches and
protection for your OS.
• Run registry scanners to check the OS registry configuration
2. Application Software
3. Anti-virus software
82
Test Your Firmware
Check for the correct configuration can accomplish this by configuring the BIOS in the
computer
83
Task to be accomplished Status
Working Not
properly working
properly
84
When a PC is first switched on or reset it performs a special diagnostic test
called a POST (Power-On Self Test), to check all components in the PC, the POST
program sends out a signal to each device initializing each device's built-in self test
procedure.
1. First, it will check all the basic components including among other things the
system clock, the processor, RAM, the keyboard
controller and the Video
2. After the video has been tested the BIOS will then
indicate any errors encountered by displaying either a
numeric code or a text message on the screen.
When a device fails the first part of the POST, the BIOS will send a series of
beeps from the PC's speaker (internal) to inform the PC user that there is a problem
these beeps are coded allowing the user to diagnose the troublesome component.
When the POST has been completed successfully, the PC will make a short beep to
let the user know everything is as it should be.
1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS
85
Memory refresh failure Check memory
Check memory
Memory read/write error
2 Beeps
Check memory
Motherboard timer not
3 Beeps functioning
Replace BIOS
8 Beeps chip/Motherboard
CMOS shutdown
read/write error
Replace BIOS
9 Beeps Bad cache memory chip/Motherboard
Phoenix BIOS beep codes are a series of beeps separated by a pause, for
example: beep --- beep beep --- beep --- beep beep would be 1-2-1-2
86
1-1-4-1 Cache error Check cache memory
Check DRAM
DRAM test rate
1-3-1-1
Check keyboard
Keyboard controller controller
1-3-1-3 test
Check memory
RAM failure
1-3-4-3
RAM failure data bits Check ROM
of high memory bus
1-4-1-1
87
Directions: Answer the following questions and place your answers on your answer
sheet.
• 1-2-2-3
• 1-3-4-1
• 2-1-2-3
• 1-1-4-1
• 1-3-1-1
Directions:
Test I. Identify the tools presented below and write your answer in separate
paper.
1.
88
2.
3.
4.
5.
Directions:
Test II. List down at list Five (5) common problem and solution. Use a separate
sheet of paper if needed.
Obtain the manual for the motherboard for your PC. (If you cannot find the manual,
trydownloading it from the motherboard manufacturer’s Web site.) Answer these
questions:
89
1.What processors does the board support?
4.If the board has a PCIe slot, what version of PCIe does the board use?
Using the Windows Help and Support window, Search for information on
Windows Meeting Space. Describe the tool. When would you want to use it? What
can you do with Windows Meeting Space? Set up and test the tool with a friend on a
network connection.
Tools
Multi-tester
Screw driver
Equipment
Computer unit
Monitor
Power cables
Materials
Bond paper
90
Directions: Test the following computer peripherals and equipment with the use of
the tools provider. Document your testing with the use of an accomplishment form.
Computer monitor
Power supply
Keyboard
Mouse
CRITERIA Rating
Total
100%
91
Equipment, Tools, and Materials:
Tools
Screw drivers
Equipment
Computer unit
Evaluation:
CRITERIA Rating
Total 100%
POST ASSESSMENT
When Enzo travels on company business, he finds it’s a great help to be able
to access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible.
92
One way you can help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port
3389, but if you change this port to a secret port, hackers are less likely to find the
open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.
2. Next, change the port that Remote Desktop uses on the host computer to a secret
port. Print a screen shot showing how you made the change. Use the client
computer to create a Remote Desktop session to the host computer using the
secret port. Print a screen shot showing how you made the connection using the
secret port. Verify the session works by transferring files in both directions.
Instruction:
Read each of the questions in the left-hand column of the chart.
Place a check on the column that indicate your answers
I Can YES NO
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to on form with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration in
accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures (SOP)
93
Correct/Adjust components or parts of computer systems
and networks in accordance with job requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP
Summative Test
_________ 2. When you open your PC, nothing shows up in your monitor and the LED
indicator of your monitor is flashing in yellow color.
__________3. When you open your PC it will show the processor brand and/or the
motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.
__________4.This also happens even if you try disconnecting your computer set
from the internet. This is what we called aftershock virus which will continue to run
even if internet is disconnected.
__________5. The computer opens up then boots but when the operating system loads it
doesn't continue and it will take a lifetime if you're going to wait for it to load.
__________6. This happens even if you try installing the hardware. When you restart
your set it will happen again.
__________7. When you try going to safe mode all you will see is a list of files in
Command prompt style.
__________8. Upon loading he operating system, you will hear a loading sound and then
the sound stops, when you try running an audio file, no sound will be heard
__________9.This will happen only in standby mode, when you move your mouse or
type something, your system will automatically restart and the worst part is it will
delete a file at random.
94
__________10. Just like the mouse problem, when you open a program that will take
the whole screen like for example a game and/or a program applications, when you
close it, it will cause your system to restart.
1) These are moderately dangerous types of errors among those that can pop up
on your PC. System errors are caused by malfunctioning hardware
components, corrupted operating system modules, etc.
a. System error C. Stop errors
b. Runtime errors D. Device managers errors
6) These can be caused at any point of time. As the name suggests, these are
caused by applications while those are running. These are usually caused by
glitches in the program code itself. These are usually resolved by updating the
program to its latest version.
95
a. System error C. Application errors
b. Browser status errors D. Post Code errors
a. electricity C. Proton
b. atom D. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known as
potential difference or EMF(electromotive force).
a. electricity C. Current
b. resistance D. Voltage
10)a type of circuit that has an open path for current to flow. It means that current
cannot flow in open circuit.
a. Open circuit C. Current circuit
b. resistance D. close circuit
Column A Column B
1. Used for installing and removing A. Screw drivers
screws in the computer unit.
2. Used for picking small parts in the B. Pliers and tweezers
computer unit.
3. Used for eliminating electrostatic C. Soldering iron
discharge in the work area.
4. Primarily used for connecting D. Lens cleaner
terminals in the power supply and
circuit board with the use of a
soldering lead.
5. It is a paste used for heat E. Anti-static wrist strap, mat and
dissipation of the processor. spray
6. A device used for cleaning optical F. Thermal paste
media, such as DVD-ROMS and
CD-writers.
7. A device used to crimp the RJ45 G. LAN Tester
connector to the UTP cable
8. A device used for testing the H. Crimping tool
96
network connection
I. Systems Tool Box
IV. Arrange the following steps in verifying the correct protocols are installed on
the computer.
_____Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not
click on the PPP or Dial-Up adapter, click on the network card adapter.
_____When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of 102.55.92.2
on another computer and then specify the same Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an address
could be: IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192
V. List down at list Five (5) common computer problems and solutions.
KEY TO CORRECTIONS
Test I
1. No Video Output
2. No Video Output
3. Doesn't Boot
4. Lots of pop up windows showing on standby mode
5. Never Ending Loading of Operating system
6. Lots of hardware installation windows appear
7. Safe mode doesn't work
8. Sound on/off error
9. Keyboard and mouse system restart
97
10. Application causes system to restart
Test II
1. A
2. B
3. C 4. D 5. D
6. C
7. B
8. A
9. C
10. A
Test III
1. A 2.
B
3. E
4. C
5. F
6. D
7. H
8. G
Test IV
3, 5, 1, 2, 4, 7, 6
Test V
GLOSSARY OF TERMS
Computer System - The complete computer made up of the CPU, memory and
related electronics (main cabinet), all the peripheral devices connected to it and its
operating system. Computer systems fall into two broad divisions: clients and
servers. Client machines fall into three categories from low to high end: laptop,
desktop and workstation. Servers range from small to large: low-end servers,
midrange servers and mainframes.
Connector - Any plug and socket that links two devices together. Although taken for
granted and rarely in the limelight, connectors are a huge industry, and the quality of
these components is more critical than most people would imagine. When not
designed or constructed properly, they often become the weakest element in an
electronic system.
98
Display Adapter - A plug-in card in a desktop computer that converts the images
created in the computer to the electronic signals required by the monitor. It
determines the maximum resolution, refresh rate and number of colors that can be
displayed, which the monitor must also be able to support. On many PC
motherboards, the display adapter circuits are built into the chipset, and an AGP or
PCI card is not required.
ESD (Electro Static Discharge)- A small amount of static electricity that can destroy
small parts of your computer.
Expansion Board - A printed circuit board that plugs into an expansion slot and
extends the computer's capability to control a peripheral device. All the boards
(cards) that plug into a computer's bus are expansion boards, such as display
adapters, disk controllers, network adapters and sound cards.
Motherboard - Also called the "system board," it is the main printed circuit board in
an electronic device, which contains sockets that accept additional boards. In a
desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP
slot, memory sockets and controller circuits for the keyboard, mouse, disks and
printer. It may also have built-in controllers for modem, sound, display and network,
obviating the need to plug in a card. A laptop motherboard typically has all peripheral
controllers built in.
Operating System - The master control program that runs the computer. The first
program loaded when the computer is turned on, its main part, the "kernel," resides
in memory at all times. The operating system sets the standards for all application
programs that run in the computer. The applications "talk to" the operating system for
all user interface and file management operations. Also called an "executive" or
"supervisor," an operating system performs the following functions.
99
Sound Card - Also called a "sound board" or "audio adapter," it is a computer
expansion board that records and plays back sound, providing inputs from a
microphone or other sound source and outputs to speakers or an external amplifier.
The de facto standard for sound card compatibility in PCs is Creative Labs' Sound
Blaster.
User Interface - All graphics based today, the user interface includes the windows,
menus and method of interaction between you and the computer. Prior to the Mac,
Windows and Motif (Unix) interfaces, all interaction was based on commands entered
by the user. Operating systems may support optional interfaces and allow a new
shell, or skin, to be used instead.
Virus - Software used to infect a computer. After the virus code is written, it is buried
within an existing program. Once that program is executed, the virus code is
activated and attaches copies of itself to other programs in the system. Infected
programs copy the virus to other programs.
REFERENCES
Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis,
IN 46256
100
Jethro Campos , et.al , Competency – Based Learning Materials for
Strengthening Technical Vocational Education Program
Electronic Resources:
http://www.buzzle.com/articles/computer-memory-types.html Computer
Memory Types
http://www.athropolis.com/popup/c-comp2.htm
Measurements for Memory & Storage
http://www.ustudy.in/ce/hard/u1 Fundamentals
of PC repair
http://danreb.com/sites/default/files/CHS-NC2%20Reviewer
%20%20With%20Oral%20Questioning_0.pdf Occupational
Health and Safety Precautions
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp Puzzles
for Activities
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_v
40_Chapter2.pdf
Occupational Safety Precautions
http://www.youtube.com/watch?v=tfKe8PPI2zs&feature=related Conversion
of Decimal N umber to Binary
http://www.youtube.com/watch?v=s7M6_VeDhJE&feature=related
http://www.youtube.com/watch?v=6N7bqBsFL0w-
http://www.wikihow.com/Install-Computer-Hardware- How
to install Computer Hardware
http://www.directron.com/howtoupsys.html- How
to install Computer components
en.wikipedia.org
http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20
10/ProperToolSelection.pdf Tool Selection
http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html
101
102