CSS Q4 Modules

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 102

9

COMPUTER SYSTEM
SERVICING
9
QUARTER 4 - MODULE 1

DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)

1
MODULE 1: PLAN AND PREPARE FOR DIAGNOSIS OF COMPUTER SYSTEMS
ERRORS

SAFETY PRECAUTIONS

Personal Protective Equipment

Proper preparation is the key to a successful work. Before you begin, make
sure that you have the tools you will need, and secure a clear well-lit workplace.
Gather all the components you’ll be using and unpack them at the same time. Always
keep in mind that personal protection is one of the traits of a good computer
technician.
Types of personal protective devices

1. Anti-static devices
2. Power surge protectors
3. Personal equipment

Anti-static devices
Devices designed to protect the computer from static electricity.

Anti– static wrist strap Anti- static

Anti- static bag


Anti-static spray

2
Power surge protectors
Devices designed to protect the computer from sudden power surges from
intermittent power sources.
Examples:
1. AVR (Automatic Voltage Regulators)

2. UPS (Uninterrupted Power Supply)

Personal Equipment
Small paint brush

Screw drivers

Pliers and tweezers

3
Compressed air

Handheld vacuum

Directions: Perform the activity below.

• Choose a partner
• Do a simulation exercise o One will act out the role of
a computer teacher. o The other will be the student

Situation: Computer teacher will show/demonstrate to the students the Personal


Protective Devices, what they are and how they are used.
The Student keeps on asking about the Personal Protective
Devices/Equipment and how they can be maintained in good condition of PC.

Answer the following questions in your own answer/test notebook

1. For somebody who always works (do troubleshooting) with computers, what
personal protective devices do you usually use? How often do you use them?
2. Computers should be protected from static electricity to prevent component
malfunction. What anti-static devices can you utilize to avoid such
malfunction?

TYPES OF COMPUTER SYSTEM ERROR

4
There are several errors in a computer from the point you open it up to the point you
reach the stand by window (reaching standby windows means boot process has no
error). Here's a list of computer error.

1. No Video Output - When you open your PC, nothing shows up in your monitor
and the LED indicator of your monitor is flashing in yellow color.

2. No Video Output - Same as number one but now the LED indicator of your
monitor is in steady orange color.

3. Doesn't Boot - When you open your PC it will show the processor brand and/or
the motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.

4. Never Ending Loading of Operating system - The computer opens up then boots
but when the operating system loads it doesn't continue and it will take a lifetime if
you're going to wait for it to load.

5 Lots of pop up windows showing on standby mode - This also happens even if you
try disconnecting your computer set from the internet. This is what we called
aftershock virus which will continue to run even if internet is disconnected.

6. Lots of hardware installation windows appear - This happens even if you try
installing the hardware. When you restart your set it will happen again.

7. Safe mode doesn't work - When you try going to safe mode all you will see is a
list of files in Command prompt style.
8. Keyboard and mouse system restart - This will happen only in standby mode,
when you move your mouse or type something, your system will automatically restart
and the worst part is it will delete a file at random.

9. Sound on/off error - Upon loading the operating system, you will hear a loading
sound and then the sound stops, when you try running an audio file, no sound will be
heard.

10. Application causes system to restart - Just like the mouse problem, when you
open a program that will take the whole screen like for example a game and/or a
program applications, when you close it, it will cause your system to restart.

Aside from the common computer errors, computers also can have different
Operating System (OS) errors. OS errors can be classified into various categories,
such as:

1. System errors – These are moderately dangerous types of errors among


those that can pop up on your PC. System errors are caused by
malfunctioning hardware components, corrupted operating system modules,
etc.
2. Runtime errors – Runtime errors are caused by corrupted or malfunctioning
system files or software executables. Most runtime errors cause the

5
application that caused it to shut down. However, more serious runtime errors
may cause the system to become unstable or unresponsive, leaving you with
no choice but to reach for the Reset button.
3. Stop errors – Stop errors are caused by corrupted hardware, especially
malfunctioning RAM modules and bad sectors on hard disks. Stop errors can
be difficult to resolve at times.
4. Device Manager Errors – These are usually caused by corrupted driver files
or malfunctioning hardware components. In case of the former cause, the
problem is usually solved simply by reinstalling or updating the drivers.
However, the latter cause can often be solved only by replacing hardware
components.
5. POST code errors – POST code errors are caused by malfunctioning
hardware components, and are characterized by short beep sounds from the
tiny internal speaker of your motherboard. POST code errors occur when you
press the power button to turn on your PC..
6. Application errors – These can be caused at any point of time. As the name
suggests, these are caused by applications while those are running. These are
usually caused by glitches in the program code itself. These are usually
resolved by updating the program to its latest version.
7. Browser Status Codes – These are caused by problems faced by browsers
when trying to access a website. These can be caused by misplaced web
pages in the server of the website itself, or due to connection problems. For
instance, a 404 error would indicate that the browser is trying to access a
webpage that does not exist in the specified location.

DIAGNOSING COMPUTER SYSTEMS

PC Diagnosing

Probably the most frustrating problem computer users run into


are startup problems, where your computer won’t boot. Equally
annoying are error messages you constantly run into during your
computer’s startup process. In this module you will be given a
few tips on how you can avoid some of the most common
problems that happen right after your computer is turned on.

Here you will learn the basic troubleshooting.

 Trial and error: When you find a faulty component in your computer, check it
with the other computers so that you can make sure whether the fault is in the
component or not.
 Check cables: In case of any device failure, check all the cables of your
computer such as data cables, power cable, internal circuitry cables and
make sure that all these are plugged in and working fine.

6
 Hardware settings: Check the hardware settings in the CMOS and in the
device manager of the system and make all the device drivers up to date and
all the cards are plugged in properly.
 Notice changes: When you notice a software or hardware error in your
computer, determine what was changed before the problem occurred.
 Event viewer: In the event viewer, you will find the error or warning messages
associated with any faulty hardware or software.
 Make notes: Troubleshooting is a big learning option and we can learn a lot
when we face any kind of troubleshooting in our computer. Make notes
including the error messages and their solutions, so that you have a record on
how a certain problem occurred and how did you solve it.

Common PC Problems and solutions


You are working away at your computer when suddenly, up comes an error
message – or worse, your computer comes to a screeching halt. Here are the
common computer problems and solutions that can help you.
Steps

1. Check the POST. POST stands for Power On Self-Test. This is generally the first
or second thing that appears on a computer after turning on the power. This appears
before the operating system begins to load. The POST will display any problems
found with hardware that makes the computer unable to boot, POST may also
display problems with hardware that allow the computer to boot, but not operate at its
full capacity during operation.

2. Notice the load time of the OS (operating system). A longer than usual load
time may indicate errors in the hard drive.

3. Notice any graphics problems once the OS has loaded. Reduced graphics
may indicate driver failures or hardware failures with graphic cards.

4. Perform an auditory test. An auditory test is an unorthodox, but still effective


way of judging how a computer is working. With the computer on and running, play
any decent length audio file (usually above 30 sec). If the audio is choppy or slow, it
usually means that the processor is working at an elevated level, or there is not
enough RAM to run all programs loading. Changing the startup sound is a great way
to apply this test. Another issue associated with choppy sounds is PIO (Programmed
Input/Output) Mode. This affects how the hard drive reads and writes data from a
drive. Switching to Direct Memory Access (DMA) allows for faster reads and writes,
and can sometimes repair choppy audio.

5. Check any newly installed hardware. Many operating systems, especially


Windows, can conflict with new drivers. The driver may be badly written, or it may
conflict with another process. Windows will usually notify you about devices that are
causing a problem, or have a problem. To check this use the Device Manager, this
can be accessed by entering the Control Panel, clicking the System icon, clicking the
Hardware tab, and clicking on Device Manager. Use this to check and arrange the
properties of hardware.

7
6. Check any newly installed software. Software may require more resources
than the system can provide. Chances are that if a problem begins after software
starts, the software is causing it. If the problem appears directly upon startup, it may
be caused by software that starts automatically on boot.

7. Check RAM and CPU consumption. A common problem is a choppy or


sluggish system. If a system is choppy it is good practice to see if a program is
consuming more resources than the computer can provide. An easy way to check
this is
to use the Task Manager, right click on the taskbar select Task Manager, and click the
Processes tab. The CPU column contains a number that indicates the percentage of
CPU the process is consuming. The Memory Usage column indicates how much
memory a process is consuming.

8. Listen to the computer, if the hard drive is scratching or making loud


noises, shut off the computer and have a professional diagnose the hard drive.
Listen to the CPU fan, this comes on a high speed when the CPU is working hard,
and can tell you when the computer is working beyond its capacity.

9. Run a virus and malware scan. Performance problems can be caused by


malware on the computer. Running a virus scan can unearth any problems. Use a
commonly updated virus scanner (such as Norton Antivirus or Avast! Antivirus)

10. Check for the problem in safe mode. To enter safe mode, tap F8 repeatedly
during POST (this works on most systems). If the problem persists in safe mode, it is
a fair bet that the operating system itself is to blame.

Common Trouble shooting for Computer Units

1. Double check the power connections.


2. Voltage Regulator and power supply could
cause power failure in the computer unit.
3. Check the power cords and cable connectors
in your computer unit.
4. Unseated card. Loose cards could cause
malfunction.
5. Check the boot sequence configuration in the
advance BIOS (Basic Input /Output Unit) setup.

Diagnosing Network Connection

Things to look for if a PC is connected to the internet or network:


 First check the cable connecting to the
network card into the network hub.
 Check the back of the computer to see if
the network card light is on
 Check the network cable ( use cable
tester)
 Check the network HUB
(use multi -tester) Network
HUB
Network
Network card 8
Identify the following:

1. Moderately dangerous types of errors among those that can pop up on your PC.
2. Caused by malfunctioning hardware components, and are characterized by short
beep sounds from the tiny internal speaker of your motherboard.
3. Caused at any point of time. As the name suggests, these are caused by
applications while those are running.
4. Usually caused by corrupted driver files or malfunctioning hardware components.
5. Caused by corrupted or malfunctioning system files or software executables.
6. Caused by corrupted hardware, especially malfunctioning RAM modules and bad
sectors on hard disks.
7. Caused by problems faced by browsers when trying to access a website.

Task : Develop a Sample Diagnostic Plan

List down all possible components to be checked based on the symptoms.

Symptoms: Dead Computer Monitor Good Defective Remedy

AC outlet

AVR

AVR fuse

Monitor Power Cable

Monitor Switch

Power Supply

9
9
COMPUTER SYSTEM
SERVICING
9

10
QUARTER 4 - MODULE 2

DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)

MODULE 2: DIAGNOSE AND CONFIGURE COMPUTER SYSTEMS AND


NETWORKS

SAFETY PRECAUTIONS

Occupational Health and Safety (OHS) refers to the legislation, policies,


procedures and activities that aim to protect the health, safety and welfare of all
people at the workplace.

Every worker has a right to healthy and safe work and to a work environment
that enables them to live a socially and economically productive life. Safety practices
should be learned early and always adhered when working with any electrical device
including personal computers and peripherals.

11
Personal safety while working with PC’s

The following statements are some safety precautions to take before working with
any computer devices:

• Before doing anything, listen to your teacher’s instruction to prevent accidents or


any unwanted events that may occur on your workplace.
• Do not work on computer when you are wet because you might get electrocuted.
• Do not remove internal devices of the computer when it is turned on.
• Avoid playing or running while inside the room.
• Always wear personal protective equipments (PPE) like coverall, shoes with rubber
sole, anti-static wrist strap, etc.
• Ask for assistance from your teacher when it comes on dealing with computer
devices.
• Applying safety measure when handling tools and equipment are necessary to
avoid certain damages.

The student is further expected to maintain good health, to be neat in personal


appearance and to practice safe working procedures at all time with appropriate
equipment.

Basic Concepts of Electricity

This lesson will introduce us to the fundamental knowledge of electricity. It will


enable student to be equip with the basic knowledge in electricity.

Basic Electrical Terms

 Electricity is define as the flow of electron or electric current. It is an


invisible form of energy that can be transform into other form of energy like
heat light and mechanical.

 Electron is the negatively charge component of an atom. It


has the ability to flow.

 Proton is the positively charge component of an atom. It had the ability to


attract electron.

 Matter is anything that occupy space and has mass. It can


be a solid, liquid or gas in state.

12
 Atom Basic component of matter. It composes of a
nucleus which is the central part, the protons and electrons.

 Current Same as electricity or flow of electron. The amount of current


flowing in a circuit can be measured in ampere (I).

 Voltage the amount of pulling force that makes the electron flow. Also
known as potential difference or EMF(electromotive force). The amount of
voltage can be measured in volt (V).

 Resistance define as the opposition to the flow of current. The amount of


resistance can be measure in ohms (Ω).

Conductors and Insulators

 Conductors are materials that easily allow the flow of current, or it has a
low resistance to current flow.

Examples; aluminum, gold, silver, copper, iron

 Insulators are materials that do not easily allow the flow of current, or it has
a high resistance to current flow.

Examples; rubber, plastic, paper

Types of Current

1. Direct Current

In direct current (DC), the flow of electric charge is only in one direction. This is
the type of electricity is produced by batteries, static, and lightning. A voltage is
created, and maybe stored, until it is consumed. When the current flows directly, in
one direction. In the circuit, the current flows at a specific, constant voltage ( this is
oversimplified somewhat but good enough for our needs.) When you use a flashlight,
pocket radio, portable CD player or virtually any other type of portable or
batterypowered device, you are using direct current.

Most DC circuits are relatively low in voltage; for example, your car's battery is
approximately 12V, and that's about as high a DC voltage as most people ever use.

13
Figure 1. Direct Current
An ideal 12 V DC current. The voltage is considered positive because its potential is
measured relative to ground or the zero-potential default state of the earth.

Direct currents flow in one direction only, and are constant in time. Their
appearance is that of a straight line which does not vary. They are produced from
power sources such as batteries, power supplies and DC generators. Photovoltaic
devices such as solar cells also generate DC power.

2. AC Alternating Current
In alternating current (AC, also ac) the movement of electric charge
periodically reverses direction. This type of electricity is produced or generated by AC
generators commonly from a hydro electric plant. It is the commercial power that we
use in homes and offices. Delivered through a power transmission lines. AC current
can be reduced through the use of power transformer to suite for its application. It
can also be converted to DC for a specific purpose. In the Philippines AC is rated as
220V AC at 60 Hz.

Alternating currents change direction, flowing first one way and then the other.
They are sinusoidal waves, so that they change in time. They are produced from
sources such as power supplies and AC generators. In North America, AC is 120
volts and 60 hertz or cycles per second. This means it changes direction 60 times per
second. In Europe, it is generally 50 hertz with 220 to 240 volts.

Figure2. Alternating Current

Why does standard electricity come only in the form of alternating current?

There are a number of reasons, but one of the most important is that a characteristic
of AC is that it is relatively easy to change voltages from one level to another using a
transformer, while transformers do not work for DC. This capability allows the
companies that generate and distribute electricity to do it in a more efficient manner,
by transmitting it at high voltage for long lengths, which reduces energy loss due to
the resistance in the transmission wires. Another reason is that it may be easier to
mechanically generate alternating current electricity than direct current.

PC’s use only direct current, which means that the alternating current provided
by your utility must be converted to direct current before use. This is the
primary function of your power supply.

14
AC POWER PC ’s PSU DC POWER

MOTHERBOARD

DRIVES

COOLING FANS

Figure 3. Simplified block diagram of a PC power supply

Electric Circuit

Electric circuit - is the pathways for electricity to flow.

Components of Circuit

 Load - commonly represented by a bulb or any electrical component that


consumes electricity.

 Supply - Commonly represented by a cell or a battery

 Switch - an electrical device that opens or closed a circuit.

Load

Supply
Switch

Figure4. A simple circuit

Types of Circuit

1. Open Circuit - a type of circuit that has an open path for current to flow. It means that
current cannot flow in open circuit.

15
Load
- +

Supply

Switch

Figure5. An open circuit

The switch is said to be “OPEN” the current can’t flow into the circuit and the bulb
is “OFF”

2. Closed Circuit - a type of circuit that has a closed path for current to flow. It means
that current can flow in a closed circuit.

Load
- +

Supply

Switch

Figure 6. A closed circuit

The switch is said to be “CLOSED” the current can’t flow into the circuit and the
bulb is “ON”

Direction: Identify the following statement.

16
_________1. Define as the flow of electron or electric current. It is an invisible form of
energy that can be transform into other form of energy like heat light
and mechanical.

_________2. The negatively charge component of an atom. It has the ability to flow.

_________3. Define as the opposition to the flow of current. The amount of resistance
can be measure in ohms (Ω).
_________4. The positively charge component of an atom. It has the ability to attract
electron.

_________5. Anything that occupy space and has mass. It can be a solid, liquid or
gas in state.

_________6. Basic component of matter. It composes of a nucleus which is the


central part, the protons and electrons.

_________7. Same as electricity or flow of electron. The amount of current flowing in


a circuit can be measured in ampere (I).

_________8. The amount of pulling force that makes the electron flow. Also known as
potential difference or EMF (electromotive force). The amount of voltage
can be measured in volt (V).

_________9. Materials that easily allow the flow of current, or it has a low resistance
to current flow.

_________10. Materials that do not easily allow the flow of current, or it has a high
resistance to current flow.
_________11. A computer power supply converts AC to ___________________.
_________12. Define as the pathways for electricity to flow.

_________13. A component of a circuit that is commonly represented by a bulb or any


electrical component that consumes electricity.
_________14. A component of a circuit that is commonly represented by a cell or a battery.
_________15. An electrical device that opens or closed a circuit.
_________16. A type of circuit that has a closed path for current to flow. It means that current
can flow in this circuit.
_________17. A type of circuit that has an open path for current to flow. It means that
current cannot flow in this circuit.
_________18. A circuit connection has only one path of current flow. In this circuit connection the
current remain constant.
_________19. A circuit connection that has 2 or more path of current. In this circuit the voltage
remains constant.
_________20. An invisible form of energy.

17
Techniques for diagnosing computer systems

Computer Diagnosis

Sometimes when the problem with a system is not totally apparent and the
problem may be intermittent, using a basic common diagnostic procedure may help
determine what is wrong. This procedure has a number of steps that, if followed each
time, can be of help.

Rules in Diagnosing Computer System

1. Know the facts


• Educate oneself on all aspects and operation of computer parts.
• Continuous learning on computer technology.
2. Use your common sense
3. Focus on Field Replaceable Units
• Identify the different types of FRU that can be used for replacement or
sub assembly.
4. Proper assembly and disassembly
5. Factors Causing Computer Failures and Defects

People ware
• Untrained personnel would probably damage programs in PC. Firmware
• Programs or software burnt in chips may be corrupted. Software
• Corrupted operating systems would cause the system to fail. Hardware

• Defective hardware components would lead to computer malfunction.


• Hardware conflicts and viruses can hinder your computers
performance.

ESD (Electro Static Discharge)

Electro static discharge can easily damage sensitive components in your


computer.

Electricity

Incoming supply from AC outlet must be regulated; power surges can damage
computer units.

Problem Isolation

Problem isolation is a detective work in which you need to determine what is


out of the ordinary by making detailed observation of what is not working normally
and record any information as you proceed. The information you will be able to

18
gather will help diagnose your computer. You need to observe wisely. Look for any
abnormalities in the unit, any change in smell or foreign smell, listen to all the sounds,
and error codes.

Component Isolation

This section will aid in determining components in your system which are
failing. First, most systems have 3 major components; monitor, system unit, and
printers. Some have multiple external devices. To troubleshoot, you need to isolate
major components which are failing to operate.

Diagnostics Procedure for ATX Power Supply Failure

1. Determine whether or not the power comes on.


2. Check the switch operation with a Digital Volt Meter on the continuity or resistance
setting.

3. Check the pins if the corresponding voltage are properly regulated to the
motherboard.

4. Replace the power supply unit if defective.

ATX Version 1.2 - 20 wire motherboard connector

Pin 1 Pin 2 Pin 3 Pin 4 Pin 5 Pin 6 Pin 7 Pin 8 Pin 9 Pin 10

3.3V 3.3V Gnd 5V Gnd 5V Gnd P_OK 5VSB 12V

Oran Oran Blk Red Blk Red Blk Gray Purp Yell

Oran Blue Blk Green Blk Blk Blk White Red Red

19
3.3V -12V Gnd P_ON Gnd Gnd Gnd -5V 5V 5V

Pin 11 Pin 12 Pin 13 Pin 14 Pin 15 Pin 16 Pin 17 Pin 18 Pin 19 Pin 20

Flowchart for ATX Power Supply Repair

Warning! You must unplug your ATX power supply from the wall before working
inside the case.

20
ATX Diagnostic chart

Things to Consider

There are many devices, parts, cords, and connections on a computer, which
means that there are many possible problems that could arise. In addition, your
computer uses a variety of software, which can also cause problems. However, no

21
matter what the problem is, you can use the following tips to help you find a
solution:

• Always check the cables: Many computer problems are related to an issue in
the cables and connections. The easiest first step you can take to troubleshoot
most problems is to check all related cables and connections.
• Isolate the problem: If possible, try to isolate the problem. For example, if you
can't get the cursor to move on the screen, try to determine if the issue is with the
mouse. If you have an extra mouse, you can alternate devices to see if the one
plugged in is the issue, or use the arrow keys on the keyboard to help determine if
the mouse is the source of the problem. When trying to isolate the problem, only
make one change at a time.

Figure 7. An error message

• Take notes about error messages: If your computer gives you error messages,
be sure to write down as much information as possible. If the basic
troubleshooting steps don't work, you may need the information.
• Remember the steps you've taken, or write them down: Once you start
troubleshooting, you will want to remember what you have done, so you don't
repeat yourself. If you can't remember it, then write it down. If you end up asking
someone for help, it will be much easier if they know exactly which steps you've
taken.

Simple Solutions to Common Problems

Most of the time, problems can be fixed by using simple troubleshooting


techniques, such as closing and re-opening the program. It's important to try these
simple solutions before resorting to more extreme measures. If the problem still isn't
fixed, you can then try other troubleshooting techniques, such as reinstalling the
software.
Program Runs Slowly or Isn't Working Right

• If a program is running slowly or otherwise isn't working right, the first thing you
should try is closing the program and re-opening it.
• You can also shut down your computer, wait a few seconds, and boot it up
again. Some minor problems will work themselves out when you do this.
• Check with the company for any known problems or updates to the software.

22
Figure 8. Checking for updates

Program is Completely Unresponsive

• If a program has become completely unresponsive, you can press (and hold)
Control+Alt+Delete on your keyboard to open the Task Manager. You can then
select the program that isn't working and click End Task. If you are using a Mac,
you can press Option+Command+Esc to open a similar dialog box.

Figure 8. The Task Manager


Problems Starting or Shutting Down the Computer

Power Button Will Not Start Computer

23
Figure 9. Resetting a surge protector

• If your computer does not start, begin by checking the power cord to confirm that
it is plugged securely into the back of the computer case and the power outlet.
• If it is plugged into an outlet, make sure it is a working outlet. Often, this will
require you to plug a lamp or other electrical device into the outlet to make sure it
is receiving power.
• If the computer is plugged into a surge protector, verify that it is turned on. You
may have to reset the surge protector by turning it off and then back on. You can
also plug a lamp or other device into the surge protector to verify that it is on.
• If you are using a laptop, the battery may not be charged. Plug the AC adapter
into the wall and then try to turn on the laptop. If it still doesn't start up, you may
need to wait a few minutes and then try again.

"Non-System Disk or Disk Error" Message

If you get this message when you boot up your computer, it usually means
there is a CD, DVD, USB flash drive, or floppy disk in your computer, which is
interfering with your computer's booting process. Remove the disk from the drive
and restart the computer.

Figure 10. The Non-System Disk or Disk Error Message


Windows Shutting Down Message Will Not Disappear

Sometimes Windows will freeze during the shutdown process. If this


happens, the Windows is Shutting Down message screen will stay active on
your screen. To finish shutting down the computer, press and hold the power
button for about 10 seconds, or until the computer turns off.

24
Figure 11. The Windows shutdown screen

Computer Begins Randomly Rebooting or Crashing

• Check for overheating. Make sure the vents in the case are not blocked. Confirm
that there is good air flow around the computer.
• Update your antivirus software and scan for viruses.

Figure 12. Virus Scanning


Problems with the Monitor and Speakers
No Picture on the Monitor

• Confirm the computer is turned on.


• Check the brightness control, located on your monitor or your keyboard, and make
sure it is not set too low.
• Check the connections for the monitor and surge protector, and make sure the
surge protector is turned on.

25
Monitor Goes Blank Periodically

 Figure 13. Cable plugged into monitor

You may have the screensaver


enabled. If the screen saver is
enabled, just move your
mouse back and forth and your
original screen will appear. You
can change the screensaver
settings by going to your
Control Panel (or your System
Preferences if you're using a
Mac).

Figure 14. Opening the Control Panel


No Sound

26
Figure 15. Adjusting the sound volume on a Mac

• Check the volume control on your computer. In Windows, the sound icon will usually
be on the taskbar, and you can also access the sound options in the Control Panel.
On Macs, the sound options are found at the top of the screen or in System
Preferences.
• Most media programs (such as iTunes or Windows Media Player) have a volume
control, which will need to be turned up.
• Make sure the speakers are turned on, if using external speakers.
• Make sure external speakers are connected to the correct audio port or a USB port. If
your computer has color-coded ports, the audio output will usually be green.
• Connect headphones to the correct audio port and determine if sound is audible from
the headphones.

Searching the web for a solution

If you still haven't found a solution to your problem, you may need to ask
someone else for help. Try searching the web for the problem that you're having, as
other people may have had similar problems. Also, if you have a friend or family
member who knows a lot about computers, they may be able to help you.

Keep in mind that most computer problems have simple solutions, although it
may take some time to find them. For very difficult problems, a more drastic
solution may be required, such as reformatting your hard drive, reinstalling
programs, or reinstalling your operating system. If you're not a computer expert, it's
possible that you could make the situation worse, so it's best to consult a
professional if you think a drastic solution is needed.

Task. Examining the Motherboard in Detail

1. Look at the back of your computer. Without opening the case, list the ports that you
believe come directly from the motherboard.
2. Remove the cover of the case. List the different expansion cards in the expansion
slots. Was your guess correct about which ports come from the motherboard?
3. To expose the motherboard so you can identify its parts, remove all the expansion
cards.
4. Draw a diagram of the motherboard and label these parts: Processor (Include the
prominent label on the processor housing.)

27
a) RAM (each DIMM slot)
b) CMOS battery
c) Expansion slots (Identify the slots as PCI, PCIe x1, PCIe x4, PCIe x16, and
AGP.) Each port coming directly from the motherboard Power supply
connections, SATA or IDE drive connectors and floppy drive connector
5. Draw a rectangle on the diagram to represent each bank of jumpers on the board.
6. What is the brand and model of the motherboard?
7. Locate the manufacturer’s Web site. If you can find the motherboard manual on the
site, download it.
8. You can complete the following activity only if you have the documentation for the
motherboard:

• What do you do if a program on a PC is completely unresponsive? What about


a program on a Mac?
• What should you do if you've tried everything and the problem still isn't fixed?

Diagnosing Power Supply Failure


Directions: Divide the class into five (5) groups. Choose a leader for each group.
The group will prepares a chart and perform the tasks required by the Diagnostics
Procedure of ATX Power Supply Failure. After the activity they will be graded
through the given Performance Score Card below:

PERFORMANCE SCORE CARD

Performance Criteria Passed Failed

1. The students clearly identified the problem and applied the


possible solution correctly.
2. The students utilized actual tools/device in performing the actual
usage of each tools and OHS was observed.

3. The students applied safety precautions during the Activity.

4. The activity gave students more critical thinking on the personal


protective equipment.

5. The students cooperatively performed the activity.

28
Tools for Testing Computer System
Tools and equipment play vital roles in troubleshooting. They help the user
determine the errors found in their computer hardware and network.

Tools used to test hardware problems:

1. Screw drivers - are used for installing and removing screws in the computer unit.

Figure 1 6. Screw Drivers

2. Pliers and tweezers - are used for picking small parts in the computer unit.

Figure17. Pliers and Tweezers

3. Soldering iron- is primarily used for connecting terminals in the power supply and
circuit board with the use of a soldering lead.

29
Figure1 8. Soldering iron

4. Anti-static wrist strap, mat and spray- are used for eliminating electrostatic discharge
in the work area.

Figure19. Anti- static wrist strap, mat and spray

5. Lens cleaner – a device used for cleaning optical media, such as DVD-ROMS and
CD-writers.

Figure 20. Lens Cleaner

6. Thermal paste-is a paste used for heat dissipation of the processor.

Figure21. Thermal Paste


Network Troubleshooting Tools

30
1. LAN Tester – is a device used for testing the network connection.

Figure22. LAN Tester

2. Crimping tool- is a device used to crimp the RJ45 connector to the UTP cable.

Figure23. Crimping Tool

Direction: Answer the following question . Write your answers on your notebook.

Enumerate the six tools used for 2 . Enumerate the two network
troubleshooting. troubleshooting tools.

1. . a.
2.
b.
3.
4.
5.
6.

31
Troubleshooting computer system network

Causes of Network Trouble

If a computer is unable to connect to a network or see other computers on a


network, it may be necessary to troubleshoot the network. A network may not work
because of any of the reasons below.

1. Network card not properly connected.


2. Bad network card drivers or software settings.
3. Firewall preventing computers from seeing each other.
4. Connection related issues.
5. Bad network hardware.

Solution

Because of the large variety of network configurations, operating systems,


setup, etc... Not all of the below information may apply to your network or operating
system. If your computer is connected to a company or large network, or you are not
the administrator of the network, it is recommended that if you are unable to resolve
your issues after following the below recommendations that you contact the network
administrator or company representative.

Verify connections / LEDs

Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable, ensure
that the LEDs on the network are properly illuminated. For example, a network card
with a solid green LED or light usually indicates that the card is either connected or
receiving a signal.

If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or that the
card is not receiving a signal from the network.

If you are on a small or local network and have the capability of checking a
hub or switch, verify that the cables are properly connected and that the hub or
switch has power.

Adapter resources

32
Ensure that if this is a new network card being installed into the computer that
the card's resources are properly set and not conflicting with any hardware in the
computer.

Adapter functionality

Verify that the network card is capable of detecting or seeing itself by using the
ping command. Windows / MS-DOS users ping the computer from a MS-DOS
prompt. Unix / Linux variant users ping the computer from the shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping local host
This should show a listing of replies from the network card. If you receive an
error or if the transmission failed, it is likely that either the network card is not
physically installed into the computer correctly, or that the card is bad.

Protocol

Verify that the correct protocols are installed on the computer. Most networks today
will utilize TCP/IP, but may also utilize or require IPX/SPX and NetBEUI.
When the TCP/IP protocol is installed, unless a DNS server or other computer
assigns the IPX address, the user must specify an IP address as well as a Subnet
Mask. To do this, follow the instructions below.
1. Click Start / Settings / Control Panel
2. Double-click the Network icon
3. Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not
click on the PPP or Dial-Up adapter, click on the network card adapter.
4. In the TCP/IP properties click the IP address tab
5. Select the option to specify an IP address
6. Enter the IP address and Subnet Mask address, an example of such an
address could
be:
IP Address: 102.55.92.1
Subnet Mask: 255.255.255.192
7. When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of
102.55.92.2 on another computer and then specify the same Subnet Mask.

Firewall

If your computer network utilizes a firewall, ensure that all ports required are
open. If possible, close the firewall software program or disconnect the computer
from the firewall to ensure it is not causing the problem.
Additional time

In some cases it may take a computer some additional time to detect or see
the network. If after booting the computer you are unable to see the network, give the
computer 2-3 minutes to detect the network. Windows users may also want to try

33
pressing the F5 (refresh) key when in Network Neighborhood to refresh the network
connections and possibly detect the network

Additional troubleshooting

If after following or verifying the above recommendations you are still unable to
connect or see the network, attempt one or more of the below recommendations.
If you have installed or are using TCP/IP as your protocol you can ping another
computer's IP address to verify if the computer is able to send and receive data. To
do this, Windows or MS-DOS users must be at a prompt and Linux / Unix variant
users must open or be at a shell.
Once at the prompt assuming, that the address of the computer you wish to
ping is 102.55.92.2, you would type: ping 102.55.92.2
If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the network. If
you are still unable to connect or see the network, it is possible that other issues may
be present.
Another method of determining network issues is to use the tracert command
if you are a MS-DOS or Windows user or the trace route command if you are a
Linux / Unix variant user. To use this command you must be at the command prompt
or shell. Or trace route 102.55.92.2
This should begin listing the hops between the computer and network devices.
When the connection fails, determine what device is causing the issue by reviewing
the trace route listing.

Networking with DHCP

Task: Setting up a local area network with a Dynamic Host Control Protocol
(DHCP) server is easy! The DHCP server provides all the information your computer
needs to get up and running on the network. Once connected, you will check
network connectivity with the router and at least one other peer on the network.

Procedure

Getting connected

1. Before connecting your PC to the network, be sure the Windows XP operating system
is running on your computer. You will use Windows XP sp2 throughout this activity.

2. Next, open a terminal window on your computer by clicking on


Applications>Accessories->Terminal.

3. In the terminal window, type ipconfig and press Enter.

34
a. How many network devices are listed in the output? Record their names in your
worksheet.

b. Is there an IPv4 address listed for any of the network devices? If so, record your

IP address (es) in your worksheet.

4. Connect your computer to a network switch using a patch cable. Did you get a light on
the switch? Record the port number you connected to in your worksheet.

5. Draw a diagram of the entire local area network in the space below, including the

router, any switches or hubs, and all connected PCs.

6. Run ifconfig again. Do you see an IP address? If so, record it in your worksheet.

7. In the terminal window, type dhclient eth1 and press Enter. Describe what happens.

Checking your connection

1. Check connectivity with the router with the ping command. Type ping -c4 10.0.1.1
and press Enter. Record the times listed in the last column of the output. What was
the average round trip time (rtt) from your computer to the router and back?

2. Ask another group for their IP address. Check connectivity with that group's
computer with ping. Run ping as shown above, substituting the new IP address for
the one listed in the previous item. Record the times listed in the last column below.
What was the average round trip time (rtt)?

3. When you have completed the activity, shut down your computer and return to
your seat.

Title: Networking with Static IPs

Purpose: While setting up a network with a Dynamic Host Control Protocol


(DHCP) server is very convenient, it is sometimes preferable to use static IP
addresses. In this activity, you will join the network using an IP address and netmask
provided by your instructor. Once connected, you will check network connectivity with
at least one other peer on the network.

Procedure

Getting connected

1. Before connecting your PC to the network, be sure the windows Operating system
is running on your computer.

35
2. When the boot process is completed, connect your computer to the network switch
using a patch cable. Did you get a light? What port number did you connect to on
the switch?

3. Draw a diagram of the entire network in the space below.


4. To configure your network settings, click System->Administration->Network.
5. In the Network settings window, make sure the Connections tab is selected.
6. Click on Wired connection, and then click the Properties button.
7. In the Interface properties window, change the Configuration setting to Static IP
address.
8. Enter the IP address provided by your instructor in the IP address field.
9. Enter 10.0.1.0 in the Gateway address field.
10. Finally, enter 255.255.255.0 in the Subnet mask field. Click OK to close the
Interface properties window.
11. Click OK to close the Network settings window.

Checking your connection

1. Open a terminal window on your computer, if one is not already open, by clicking
Applications->Accessories->Terminal.

2. Type ipconfig and press Enter. Are your network setting correct? If not, repeat the
steps 4–11 in the previous section
3. Ask another group for their IP address. Check connectivity with that group's
computer with ping. For example, ping -c4 10.0.1.200. Record the times listed in the
last column below. What was the average round trip time?

4. Ask a second group for their IP address. Check connectivity to that group's
computer with ping. Record the times listed in the last column below. What was the
average round trip time?

CRITERIA Evaluation:

Passed Failed

1. Sequence of steps in diagnosing is followed.

2. Safety precaution are observed.

3. Appropriate tools are used in diagnosing.

4. Diagnostic plan for troubleshooting is created.

Remarks

36
Computer System and Network Configurations

Computer Networks

Networks are collections of computers, software, and hardware that are all
connected to help their users work together. A network connects computers by
means of cabling systems, specialized software, and devices that manage data
traffic. A network enables users to share files and resources, such as printers, as well
as send messages electronically (e-mail) to each other.

The most common networks are Local Area Networks or LANs for short. A
LAN connects computers within a single geographical location, such as one office
building, office suite, or home. By contrast, Wide Area Networks (WANs) span
different cities or even countries, using phone lines or satellite links.

Network System Configuration

All networks go through roughly the same steps in terms of design, rollout,
configuration, and management.

Designing Your Network

Plan on the design phase to take anywhere from one to three working days,
depending on how much help you have ad how big your network is.

Here are the key tasks:

• Settle on a peer-to-peer network or a client/server network.


• Pick you network system software.
• Pick a network language.
• Figure out what hardware you need.
• Decide on what degree of information security you need.
• Choose software and hardware solutions to handle day-to-day management chores.

Rolling Out Your Network

Rolling out your network requires the following steps:

• Run and test network cables.

37
• Install the server or servers if you’re setting up a client/server network. (If you are
setting up a peer-to-peer network, you typically don’t have to worry about any
dedicated servers.)
• Set up the workstation hardware.
• Plug in and cable the Network Interface Cards (NICs – these connect the network to
the LAN).
• Install the hub or hubs (if you are using twisted-pair cable).
• Install printers.
• Load up the server software (the NOS, or Network Operating System) if your network
is a client/server type.
• Install the workstation software.
• Install modem hardware for remote dial-up (if you want the users to be able to dial into
the network).
• Install the programs you want to run (application software).

Configuring Your Network

Network configuration means customizing the network for your own use.

• Creating network accounts for your users (names, passwords, and groups).
• Creating areas on shared disk drives for users to share data files.
• Creating areas on shared disk drives for users to share programs (unless everyone
runs programs from their own computer).
• Setting up print queues (the software that lets users share networked printers).
• Installing network support on user workstations, so they can "talk" to your network.

Managing Your Network

The work you do right after your LAN is up and running and configured can save you
huge amounts of time in the coming months.  Mapping your network for easier
management and troubleshooting.
• Setting up appropriate security measures to protect against accidental and intentional
harm.
• Tuning up your LAN so that you get the best possible speed from it.  Creating
company standards for adding hardware and software, so you don’t have nagging
compatibility problems later.
• Putting backup systems in place so that you have copies of data and programs if your
hardware fails.
• Installing some monitoring and diagnostic software so that you can check on your
network’s health and get an early warning of impleading problems.
• Figuring out how you plan to handle troubleshooting – educating your LAN
administrator, setting up a support contract with a software vendor, and so on.
Smooth Setup

38
One key advantage of a peer-to-peer network is that it’s easy to setup. With the
simplest sort of peer-to-peer network, you just use the built-in networking that comes
with your operating system (Windows 98, Windows XP, Windows 7,
Windows 8 and so on) and you have very little software to set up – even less if you
have computers that have the operating system preinstalled, as most computers do
these days.

For Windows XP and Windows 7, the basic steps to setting up a peer-to-peer


network are as follows:

(Review for Cabling) UTP Cable

A UTP cable (category 5) is one of the most popular LAN cables. This cable consists
of 4 twisted pairs of metal wires (that means there are 8 wires in the cable). Adding
RJ45 connectors at both ends of the UTP cable it becomes a LAN cable they usually
use.

Preparation

You need a UTP Cable, Crimping Tool, RJ45, and Cutter

Figure 24 . Materials for Cabling

Making Cable
Follow the steps below.
1. Remove the outmost vinyl shield for 12mm at one end of the cable (we call this side A-
side).
2. Arrange the metal wires in parallel (refer the each section's wire arrangement table).
Don't remove the shield of each metal line.
3. Insert the metal wires into RJ45 connector on keeping the metal wire arrangement.

39
4. Set the RJ45 connector (with the cable) on the pliers, and squeeze it tightly.
5. Make the other side of the cable (we call this side B-side) in the same way.
6. After you made it, you don't need to take care of the direction of the cable. (Any cable
in this page is directionless --- that means you can set either end of the cable to either
device.)

How to see the wire arrangement

Take the UTP cable with your left hand and a RJ45 connector with your right hand.
Hold the RJ45 connector in the way you can see the contact metal face of the RJ45
connector.

The tables below are for the case where the UTP cable consists of
green/green-white, orange/orange-white, blue/blue-white, brown/brown-white twisted
pairs.

10 Base T / 100 Base T Straight

10BaseT and 100BaseT are most common mode of LAN. You can use UTP
category-5 cable for both modes. (You can use UTP category-3 cable for 10BaseT,
in which there are only 3 wires inside the cable.)

A straight cable is used to connect a computer to a hub. You can use it to connect 2
hubs in the case one of the hubs has an uplink port (and you use normal port on the
other hub).

Pin ID side A side B

1 orangewhite orangewhite

2 orange orange

3 green-white green-white

4 blue blue

40
5 blue-white blue-white

6 green green

7 brown-white brown-white

8 brown brown

10 Base T / 100 Base T Cross


A cross cable for 10BaseT and 100BaseT is used to connect 2 computers directly
(with ONLY the UTP cable). It is also used when you connect 2 hubs with a normal
port on both hubs. (In other words, the cross cable is used relatively in a rare case.)

Pin side A side B


ID
1 orangewhite green-white
2 orange green
3 green-white orangewhite
4 blue blue
5 blue-white blue-white
6 green orange
7 brown-white brown-white
8 brown brown

To create a peer network, you must have the following components:


• A network interface or Local Area Network (LAN) adapter for each computer. The same
manufacturer and model of network card is preferred.

• Cabling that is supported by the network cards.

• Windows XP or 7 drivers for the network cards.

• A common network protocol.

• A unique computer name for each computer.

41
Task. Creating Peer to Peer Network

To create a peer network, follow these steps for each computer connected to the network:

1. Shut down the computer and install the network card and appropriate cabling for
each computer.

NOTE: For information about how to configure your network adapters and physically
connect your computers, consult the documentation included with your network adapters
or contact the manufacturer(s) of your network adapters.

2. Start Windows and install the network drivers. Windows may detect your network
card and install the drivers when you start the computer. If the network card drivers are
not included with Windows, follow the manufacturer's instructions about how to install
the network drivers.

3. Choose a client and a common protocol for each computer. To do this, follow these
steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. Click Add, click Client, and then click Add.

c. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
client in the Network Clients box, and then click OK.

d. Click Add, click Protocol, and then click Add.


e. In the Manufacturers box, click the appropriate manufacturer, click the appropriate
protocol in the Network Protocol box, and then click OK.

4. Configure a peer server. Each computer that is configured for File and Printer
Sharing can act as a server. To configure a computer for File and Printer Sharing,
use the following steps:

a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. Click File and Print Sharing, click one or both options to share files and printers, click
OK, and then click OK again.

c. Click Yes when you are prompted to restart your computer.

1. Give each computer a unique computer name. To do this, use the following steps:
a. Click Start, point to Settings, click Control Panel, and then double-click Network.

b. On the Identification tab, type a unique name in the Computer name box.

42
c. Click OK, and then click Yes when you are prompted to restart your computer.

: NOTE: The computer name must be unique for each computer on the network and
should be no more than 15 characters in length. In small networks, the workgroup
name should be the same for each computer so that all computers are visible in the
same workgroup when browsing. You should not use spaces or the following
characters in computer and workgroup names

Task. Setting Windows Network Connection

Equipment, Tools and Materials Required:

- UTP cables
- 4 Computer units
- 1 hub

Given the following materials, set-up a network connection on four computers.

CRITERIA 1 2 3 4 5
 Safety Precautions are observed.
 All the UTP are properly connected to the computer and
hub.
 Computers are properly connected and seen in the
network.
 Proper boot-up and shutdown of the computer is observed.

Total:

Task 2. Using the Internet for Research

In this project, you will learn how useful the Internet can be for a PC support technician.

43
1. Using your own or a lab computer pretend that the motherboard manual is not
available and you need to replace a faulty processor. Identify the manufacturer and
model of the mother board by looking for the manufacturer name and model number
stamped on the board. Research the Web site for that manufacturer. Print the list of
processors the board can support.

2 .Research the Web site for your motherboard and print the instructions for flashing
BIOS.

3.Research the Abit Web site (www.abit.com.tw) and print a photograph of a


motherboard that has a riser slot. Also print the photograph of the riser card that fits
this slot. What is the function of the riser card?

More Security for Remote Desktop

Task. Analyze the situations below and answer the questions that follows.
When Jacob travels on company business, he finds it’s a great help to be able to
access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible. One way you can help Jacob add more security is to
change the port that Remote Desktop uses. Knowledgeable hackers know that
Remote Desktop uses port 3389, but if you change this port to a secret port, hackers
are less likely to find the open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.
Practice implementing this change by doing the following:

1. Set up Remote Desktop on a computer to be the host computer. Use another


computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.
2. Next, change the port that Remote Desktop uses on the host computer to a secret
port. Print a screen shot showing how you made the change. Use the client
computer to create a Remote Desktop session to the host computer using the
secret port. Print a screen shot showing how you made the connection using the
secret port. Verify the session works by transferring files in both directions.
3. What secret port did you use?

44
9
COMPUTER SYSTEM
SERVICING
9
QUARTER 4 - MODULE 3

DIAGNOSE AND
TROUBLESHOOT COMPUTER
SYSTEMS (DT)

45
Module 3:INSPECT AND TEST THE CONFIGURED COMPUTER SYSTEMS AND
NETWORKS

General Safety Tips and Reminders

 Observe good housekeeping in the area of the machines during and after
maintenance.
 Place removed covers and other parts in a safe place, away from all personnel, while
you are servicing the machine.

Dress for the Job

 Keep your tool case away from walk areas so that other people will not trip over
it.
 Do not wear loose clothing that can be trapped in the moving parts of a
machine. Ensure that your sleeves are fastened or rolled up above your elbows.
If your hair is long, use hair net or hair cap.

46
 Insert the ends of your necktie or scarf inside clothing or fasten it with a
nonconductive clip, approximately three (3) inches from the end.
 Do not wear jewelry, chains, metal-frame eyeglasses, or metal fasteners.

 After service, reinstall all safety shields, guards, labels, and ground wires.
Replace any safety device that is worn out or defective.
 Finally, reinstall all covers correctly before returning the unit to the customers.

Electrical safety

Electric current from power, telephone, and communication cables can be


hazardous. To avoid personal injury or equipment damage, disconnect the attached
power cords, telecommunications systems, networks and modems before you open
the server/workstation covers, unless instructed otherwise in the installation and
configuration procedure.

Precautions

 Disconnect all power before:


 Performing a mechanical inspection
 Working near power supplies
 Removing or installing main units
 Before starting work on the machine, unplug the power cord.

 Never assume that power has been disconnected from a circuit. First, check
that it has been powered-off.
 Always look carefully for possible hazards in your work
 Moist floors
 Non-grounded power extension cables
 Power surges.
 If an electrical accident occurs:

 Switch off power


 Send another person to get medical aid
Safety Inspection Guide

1. These steps will help you identify potentially unsafe conditions on electrical products:
 Check exterior covers for damage (loose, broken, or sharp edges)  Power-off
computer. Disconnect the power cord.
 The power cord should be the appropriate type.
 Insulation on the power cord must not be frayed or worn out.
 Remove the cover.

47
 Check for any obvious alteration. Use good judgment as to the safety of any
alterations.
 Check for worn out, frayed or pinched cables.
 Check that the power-supply cover fasteners (screws or rivets) have not been
removed or tampered with.

Accident Reporting Policy and Procedure

There must be a process put in place to report accidents, incidents or near misses
for immediate action and to help track causes. The organization needs to identify what
needs to be reported, to whom it is to be reported, and how to report it, then put this
process into a written procedure.

For example:
Any accident, incident, or "near miss," no matter how slight the injury or damage, must be
reported to the department supervisor immediately for appropriate action.
The supervisor is responsible for taking appropriate follow-up action, including getting
medical attention for the injured, completing an investigation report and recommending or
implementing appropriate corrective actions.

The primary purpose of the accident investigation is to identify the cause(s) of the
accident, incident or "near miss" and take action to prevent a similar occurrence in the
future. In some instances, an employee's or volunteer's failure to follow recognized safety
procedures requires disciplinary action to protect co-workers.

Remember: One person's actions can jeopardize the safety of others in the workplace.

Accident Reporting Policy

Sample

Approved by
Chairman: Date:

1. Purpose [complies with legislation, ensure the necessary action to prevent any
recurrence and to enable the organization to maintain proper records.
2. Scope [accident, incident, near-miss; employee, volunteer, anyone on site or
involved in organization-sponsored activities]
3. Definitions [of terms]
4. Accident Reporting [timeline, to whom, how (phone, e-mail, fax) • \ OSHA,
NIOSH?]
5. Absence resulting from an accident [who to report to, Return-to work]
6. Accident Investigation [who investigates, what to do with resulting
recommendations]
7. Forms [Names, where to find them]
8. Reportable Diseases [communicable diseases listed where?]
Accident Investigation Procedures

48
The senior staff member available at the accident scene or the first member notified
should complete the appropriate investigation reporting form (accident, incident, near
miss). The completed form should be given to the organization's safety committee,
which will forward a copy of the report to the safety coordinator for review.

When an employee or volunteer is injured:

1. Get the person professional medical attention.


2. Protect others.
3. Minimize property damage.
4. Stabilize the situation.
5. Conduct an investigation.

General guidelines for investigating accidents:

• Go to the scene of the accident while the facts are fresh.


• Inspect and record any changed physical characteristics or conditions of the accident
site
• Preserve any physical evidence, such as potentially defective equipment.
• Take photos to help preserve the scene (i.e., puddles on the floor, overturned storage
shelves and spilled contents).
• Talk to the injured person, if possible.
• Talk to any eyewitnesses.
• Ask simple open-ended questions, one question at a time, and attempt to have events
related chronologically to ensure thorough coverage.
• Distinguish a person's actual knowledge from hearsay.
• Ask when, where, who, how, and what was said or done.
• Avoid opinions, judgments or conclusions and be as objective as possible. Avoid
commenting on the information gathered except to confirm your understanding or to
clarify.
• Stress getting the facts.
• Do not comment on liability or fault during the investigation. Listen for clues in the
conversation around you.
• Unsolicited comments often have merit.
• Review and finalize any notes immediately upon completion of your inspection and
any interview or other communication with those involved.
• Fill out the appropriate accident, incident or near-miss form, giving an accurate
account of the facts.
• Send the form to the safety coordinator and safety committee for their review.

Accident reports

Forms are used to give specific details with regards to the accidents happened in
the laboratory during experiments.

Accident reports contain the following details:

 Name of the person injured

49
 Date and time of the accident
 Type of injury
 First aid given
 Action taken to prevent further accidents

Task. Accomplish the sample Accident report sample form

Date:

Form Accident
No: Report
Form Rm. No:

Name: Yr/Sec:

Type of Injury Caus Remedy


e of
Injury

Replacing different Components


Computer Parts Replacement

When replacing computer parts and peripherals, you need to consider the following
factors:

50
1. Compatibility of the component or part
2. Consider the component specification
3. Components form factor

Compatibility of the Component

When replacing computer parts you should check if it is compatible with your unit.
Double check on your computer manual if the component you are replacing is
compatible or not with the unit because this may lead to system crash.

Component Specification

This focuses on the specification of the component. Check if the voltage rating,
current rating, memory size and frequency matches your computer unit.

Form factor

The components’ manufacturer should be considered. Check if the unit you


are trying to repair or upgrade is generic or branded units. Branded units have their
own set of components compatible only to their units, while genetic types can be
used only to generic type of units.

List of Components Commonly Replaced in a Computer System

Note: Please refer to the Video for Proper Replacement of the components or parts
of the computer.

Memory-is technically any form of electronic


storage; it is used most often to identify fast,
temporary forms of storage. It is commonly
called RAM (Random Access Memory).

Figure 25. Memory


Video Cards-also referred to as a graphics
accelerator, is an item of personal computer
hardware whose function is to generate and
output images to a display.

Figure 26. Video Card

Network Interface Card – is also known as LAN card. A PC interface to network


cabling. It is a piece of computer hardware designed to allow computers to
communicate over a computer network

51
Figure 27. LAN Card

Hard disk drive – is a fixed computer storage medium

Figure 27. LAN Card

Motherboard – is also known as the mainboard. It


contains circuits that perform various functions.

Figure28. Motherboard

Processor – is also known as CPU or the Central


Processing unit

Figure28. CPU

CMOS Battery-Refers to a small memory on PC motherboards that is used to store


BIOS settings.

52
Figure29. CMOS Battery

CD/DVD Drive- A DVD is an optical disc storage media


format, invented and developed by Philips, Sony, Toshiba
and Panasonic in 1995

Figure30. CD/DVD

Sound card - is an internal computer expansion card that facilitates


the input and output of audio signals

Figure 31. Sound Card

Directions: Write your answer on your notebook

1. Give the functions of each component.

1. Memory
2. Video card
3. NIC
4. Motherboard
5. HDD

2. Factors to consider when replacing a component.


1._____________________
2._____________________
3._____________________

Upgrading Your Computer Components

To upgrade means to change some parts with faster and better performing ones. These
parts may even cost less and more powerful.

53
Commonly Upgraded Computer Parts

1. Monitors- replace old CRT monitors to new LCD or LED monitors.

2. Optical drives- old CD-ROMs drives are commonly replaced with DVD-ROM and DVD
writers.

Hard Drives- small capacity hard drives are replaced with faster and high capacity hard
drives.

54
Keyboards and mouse- keyboards and mouse are commonly replaced with optical
mouse and wireless keyboards.

RAM (Random Access Memory)- upgrading the computer’s memory or RAM speeds
up the performance of the computer

Video cards- upgrade computer’s graphics card to improve the computer


performance in terms of graphics and games.

55
Processors- replacing the processors increase the data processing speed.

Modem- installing a modem enables your computer to connect to the internet.

How to Speed up the Computer

1. Defragmenter utility: Automatically analyzes the empty disk space on the hard
disk and defrag all scattered files.

56
Figure 31 . Defragmenter Utility

2. Shutdown Unnecessary programs: Close all unwanted programs at the Windows


start up and this will automatically increase the windows loading time and speed of
the computer will also be increased.

3. Increased memory: Increasing the memory in the system will result to exceptional
speed of your computer.

Figure32. Increasing the memory

4. Disk Cleanup: You can delete unwanted programs and files from your computer
and this will be helpful in increasing the speed.

57
Figure33. Disk Cleanup

5. Empty Recycle Bin: Delete all the files and folders from the recycle bin and you
will get the space of C drive for reusability.

Figure34. Emptying the recycle bin

Memory Upgrade

To make your computer faster, you can upgrade its memory. Here are the steps in
upgrading your computer’s memory

1. Remove the memory modules from the slot.

Figure34. Removing memory


module from the slot
2. In Fig 35 the notches we have marked as A
are used for the ejector clip on the DIMM slot.

The notches we have marked as B are used to align the memory module with the
DIMM slot key C as Figure 35. Notch A shown in Figure 36.

58
In Figure 36 you can see the ejector clips (D),
using your finger, push these into the down
position as shown in Figure 36 this allows the
memory to be inserted.

Figure 36. DIMM Slot

3. Now you are ready to install the module,


ensuring the notches line up with the keys
gently but firmly push the memory into the slot
until it is seated fully(see Fig 37 the ejector
clips should rise to the vertical position as
shown in Fig 38).
Figure 37. Ejector clips

4. Now your memory is installed. Be sure you


have
not loosened any cables while working and also

ensure that the memory module is


fully seated and the ejector clips are in the vertical position.

Figure 38. Ejector clips in vertical position

Video card Upgrade

Installing the video card

Next, take the video card (hold it by the edges) and line it up with the slot
paying careful attention to the alignment notch. When it is aligned correctly, press
gently but firmly until the card is seated fully and evenly into the slot (see fig 39).

Figure39. Video card seated fully and evenly on a slot

59
When you are happy that the card is firmly in place, insert the fixing screw (fig
40) and check to make sure you have not loosened anything during installation.
Replace the case cover and reconnect the mains power.

Figure40. Inserting fixing screw

When you reboot your machine Windows (or other OS) should find the card
automatically, it may then ask you to insert the disk/CD that came with your video
card, insert the CD and follow the on-screen instructions to install the video card
driver.

Hard Drive Upgrade

The first thing to do (after removing the case covers) is to locate the drive bay
where the hard drive will go (see fig 41 below).

Figure41. Locate the drive bay


The next step is to attach the IDE and power cables.

In figure 42 below you can see a standard IDE Cable, note there are three (3)
connections (notice the difference in distance between the connectors). Connection A
plugs into the motherboard and then the slave and master connections are used for
IDE devices such as hard drives, if you are only installing one drive or the new drive
is to be the master then use the master connector, if the drive is to be the slave then
use the slave connector.

60
The IDE cable will be marked down one side with a red or black strip, this denotes
Pin 1, match this with the Pin 1 indicator on the back of the hard drive.

The power cable you will find in your case is attached to your power supply; you
can see an example below in figure 43.

Figure42. Standard IDE Cable Figure43. Power Cable

Basic Network Errors

If your network connection is not configured properly or suffers a technical


failure, you will often see some error message generated and displayed on your
screen. These messages give helpful clues to the nature of the issue. Use this list of
the common network-related error messages to help troubleshoot and fix networking
problems.

Network Problem error Messages

Network problem error message 1

Read the message in the box.


Box running software 14.8 and Box running software 14.7 and below: above:
A network adapter was not
No network adapter. (N01) detected. (N01)

Please make sure that your network Please make sure that your network adapter is
securely plugged into a USB adapter is securely plugged into a USB port on the
back of the box. port on the back of the box.

61
Possible solution for error message 1

Quic 1. If you have a TiVo Wireless G or N Adapter:


k Remove the adapter from the TiVo box for 15 – 60
Steps seconds and reconnect. Then force a connection to the
TiVo service.
2. Try another USB port (when applicable).

3. If these steps have not resolved your issue, see


Detailed Steps below for additional assistance.

Network problem error message 2


Read the message in the box.
Box running software 14.8 and above: Box running software 14.7 and below:

Problem with router. (N03) The DHCP server was unable to


supply an IP address.(N03)
It might be temporarily out of IP
addresses. Wait a few minutes, and then It might be temporarily out of IP
try connecting again. If the DHCP server addresses. Wait a few minutes, and then
is part of your home network, try try connecting again. If the DHCP server
increasing the number of IP addresses it is part of your home network, try
can assign. increasing the number of IP addresses it
can assign.

Possible solution for error message 2

1. Power cycle your network, then force a connection to the TiVo


service.
2. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if you are
unsure how to do this.

3. If these steps have not resolved your issue, see Detailed Steps below
for additional assistance.

Network problem error message 3


Read the message in the box:

62
Box running software 14.8 and above: Box running software 14.7 and below:

Problem with network settings. (N05) The specified IP address (<IP Address>) is
already in use by another device on the
Change your network settings to use a
network. (N05)
different (and unused) IP address.
Change your network settings to use a
different (and unused) IP address.

Possible solution for error message 3

1. If the box is using a static IP address, then it will need


to be changed. See How to configure network settings on
your TiVo box for instructions.
Quick Steps

2. Power cycle your network devices, then force a


connection to the TiVo service.
3. Renew the DHCP lease on your router.
NOTE: Please contact your router manufacturer if you are
unsure how to do this.

Network problem error message 4

Read the message in the box:


Box running software 14.8 and above: Box running software 14.7 and below:

Wireless Network Not Found. (N06) Could not connect to the wireless network
(<Network Name>). (N06)

Possible solution for error message 4

1. Verify your TiVo box has the latest software version to support the
encryption used by your router.
2. Make sure your wireless network is operational and you have
sufficient signal strength where the box is located. See How to
configure network settings on your TiVo box for instructions.
3. Verify you entered the correct the correct name of your network
Quick Steps

and/or the correct encryption key or password.


4. Check for possible interference sources nearby, such as microwave
ovens, cordless phones, etc.

5. Power cycle your network devices, then force a connection to the


TiVo service.
6. Move your wireless adapter to improve signal strength.
7. Contact your router manufacturer to determine whether you need to
update your router firmware.

63
8. If these steps have not resolved your issue, see Detailed Steps below
for additional assistance.

Network problem error message 8


Read the message in the box:
Box running software 14.8 and above: Box running software 14.7 and below:

Adapter not set up. (N08) Your network adapter has not been set up
for use with the box. (N08)
Select Change network settings to begin
setting up your network adapter. Select Change network settings to begin
setting up your network adapter.

Possible solution for error message 8

1. TiVo Wireless N adapter: Verify that your adapter has been set up
properly. Please see TiVo Wireless N Adapter Setup for instructions.
2. Verify you entered the correct name of your network and/or the
correct encryption key or password.
Quick Steps

3. Verify your wireless adapter is compatible with your


TiVo box.
4. Try another USB port (when applicable).
5. If these steps have not resolved your issue, see
Detailed Steps below for additional assistance.
Common Network Errors and Solutions

Network Errors Possible Solutions


Network problem is 1. Make sure no any firewall running.
not accessible 2. Make sure you have created the same
workgroup, and the same username for logging
Message: "....is not on a remote computer.
accessible. You may 3. Check user's rights.
not have permission to 4. You may want to enable guest account on
use this network windows.
resource. Contact the 5. if you are using simple file sharing, you may try
administrator of this to disable it and re-share the drive manually. If
server to find out if you 6. it is mixed OS network, enable NetBIOS over
have access TCP/IP.
permissions. The 7. Make sure the Computer Browser service is
semaphore timeout started if all computers are w2k/xp.
8. Stop Computer Browser service on wwin9x, ME
period has expired."
and NT if this is a mixed OS network.
9. Cache credential by using net
use \\computername\share /user:username
command (it is better to have the username
logon shared computer).

64
10. If you have tried enabling netbios over tcp/ip
but doesn't work, you may try to load netbeui
(loading netbeui may slow your network).
11. Make sure the server service is running.
12. Still need help, contact
consultant at http://hidev.com/contactus.asp for
the tech support.

Network problem not 1. Type command "net share" on the shared computer.
available. The server is If there is not a share named "IPC$" in the share
not configured for list, use the command "net share ipc$" to create it.
transactions"

An extended error has 1. This issue may occur if the workstation doesn't
occurred" or "Access synchronize the time with the server. After verifying
Denied" Symptoms: that basic network connectivity exists, you can force
When mapping a time synchronization on the client computer
network drive using net manually. To do this, run net time /domain /set
use or using the net view command.
command to view a 2.
different computer in the Make sure you have granted enough licenses for
domain, you may clients accessing.
receive: "An extended
error has occurred" or
"Access Denied" error
messages.

“Computer name is not 1. Are you sure the logon user has permission to the
accessible. No shared folder?
permission to access the 2. Have you tried to logon using the same user name
resources" and password of the accessed computer?
3. The last and risky one, if you enable guest account
in computer, can you access now?

"Multiple connections to 1. Try using net use /d from a command to clear all
the server or shared your mapped connections before joining the
resource are not domain. You can also disconnect the mapped drive
allowed" in Windows Explorer by right-click the mapped drive
and select disconnection.
Symptom: when
attempting to join a
domain, you may
receive "Multiple
connections to the
server or shared
resource are not
allowed. Please
disconnect all previous

65
connections to the
server or shared
resource and try again."

"Network path not found" 1. This issue may occur if the TCP/IP NetBIOS Helper
in a domain network 1 Service is not running on the client computer. To
start the TCP/IP NetBIOS Helper Service, go to
SYMPTOMS: MMS>Services, double-click TCP/IP NetBIOS
When trying to join a Helper Service.
domain by using he
NetBIOS domain name,
you are successful but
not the FQDN and you
may receive one of the
following error
messages:

1) The following error


occurred attempting to
join domain
"example.com": The
network location
cannot be reached.
For information about
network
troubleshooting, see
Windows Help. 2)
Network path not found.

"Network path not 1. You can find some computer browser errors on the
found" in a domain DNS server. Disable one of two NICs will work.
network 2 More resolutions can be found in browser Issue
page.
"Network path not found" 1. Make sure that File and Printer Sharing is
in a workgroup network - enabled on the shared computer.
error 53 Make sure that shared machine has something
shared.
2. Make sure that you have created the same
workgroup and logon the same username Make
sure that you have enabled NetBIOS over
TCP/IP if this is a mixed OS network.
"Not accessible. You 1. Enable NetBIOS over TCP/IP on one or more
may not have permission computers in the workgroup. To do that, go to
to use this network properties of Local Area Connection>properties of
resource" Internet Protocol
(TCP/IP)>General> Advanced>WINS, check Ena
Symptom: Your peerto- ble NetBIOS over TCP/IP (If you have a

66
peer network, may DHCPassigned IP address, select Use NetBIOS
receive the following setting from the DHCP server ).
error when you double- 2. Make sure the Computer Browser service is started.
click My Network
Places/Computers Near
Me: <Workgroup
Name> is not
accessible. You may not
have permission to use
this network resource.

"Not enough server 1. The registry value IRPstackSize may be not


storage is available to explicitly present. To increase the value of the
process this command." parameter, go to the key
error. HKEY_LOCAL_MACHINE\SYSTEM\CurrentContro
lSet\Services\ LanmanServer\Parameters. If the key
SYMPTOMS: When is not present, choose Add Value in the Registry
accessing shares on a Editor. The Value Name should be
server from a client, you IRPStackSize and the Data Type is
may receive "Not REG_DWORD.
enough server storage is 2. Remove any unnecessary entries from this value in
available to process this the registry,
command." error. You HKEY_LOCAL_MACHINE\System\CurrentControlS
may receive this et\Services\LanmanServer\Parameters\NullSession
message and Event ID: Pipes.
2011 after you install 3. Disable Norton antivirus to see if that will fix the
Norton Antivirus for problem.
Windows.

"No logon server This sounds like cache credential issue.


available"
1. Make sure the computers in the same network, the
Symptoms: you can same workgroup/domain and have created the
ping the server by ip same username.
and name but can't 2. Use net use \\servername\sharename password
map the shared drive /user: username to cache the credential.
by using net use \\ip
or \\servern ame. If
you try, you may
receive the "No
logon server
available".

Still need help, contact 1. Disable ICF if you don't need it.
consultant at http://hide 2. Open port # (UDP and TCP) from 135 through 139
v.com/contactus.asp for and/or 445. to do this, go to the properties of the
the tech support. connection>Advanced>ICF>Settings>Services. For

67
Microsoft file sharing SMB: add (UDP and TCP)
"System error 6118 ports from 135 through 139. For direct-hosted SMB
has occurred. The list traffic without network basic input/output system
of servers for this (NetBIOS) uses port (TCP and UDP) 445. Note: the
workgroup is not external and internal port numbers should be
currently available." identical.
Symptoms: When
using the net view
\\computername comm
and, you receive the
following error message:
System error 6118 has
occurred. The list of
servers for this
workgroup is not
currently available.

"The password is 1. You need to setup every user that needs access to
incorrect. Try again" the shared folder on every computer they have to
connect to. Then give the proper user proper
permission to the shared folder.
2. Logon the same user and password.
3. As always, you can try to enable a guest account on
the accessed machine.

"There are no entries on 1. If there are no file or print shares on the computer,
the list" the net view command displays a "There are no
entries in the list" message. So, make sure there
Symptom: when using are file or print shares on the computer. Or to use
net net share command to check sharing status.
view \\remotecomputer 2. Make sure no firewall running because the firewall
command, you may may block sharing.
receive "There are no
entries on the list". And
you may have a problem
to access the remote
computer.

"Unable to access 1. NetBIOS over TCP/IP. To do that, go to the


Computers near Me" or properties of TCP/IP>Advanced>WINS. If you are
"Workgroup is not using a static Internet Protocol (IP) address, click
accessible" errors 2. Enable NetBIOS over TCP/IP. If you have a
DHCPassigned IP address, click Use NetBIOS
setting from the DHCP server.
No Master Browser or too many browsers may
cause this issue. Check Browser issue.

68
"Unable to Browse 1. Have you loaded the NIC or is it working?
Network" 2. Have you loaded common protocol, TCP/IP?
3. Does the Computer browser work?
Symptom: When you 4. Have you enable file and printer sharing in the
attempt to browse your accessed computer?
network by opening 5. Is the workstation service running?
Entire Network in My
Network
Places/Network
Neighborhood, you may
receive the following
error message: Unable
to Browse Network.

Award BIOS / CMOS Setup

This is the BIOS setup for Award BIOS v6.00PG. If you have a different
version of the Award BIOS there would be a lot of similarities. If your BIOS are AMI or
Phoenix then the common BIOS features would have some similarities. Whatever
BIOS you have, this setup guide should give you an idea about how to setup BIOS.

Please note that setting up BIOS incorrectly could cause system malfunction,
therefore it is recommended that you also follow the BIOS guide provided on your
motherboard manual. If you decide to make changes to certain options it is safer to
make a note of what you have changed. Then restart the system to see how it
performs. If the system behaves abnormally or becomes unstable you can revert
back to your previous settings.

Soft menu III

Soft menu III is where you can setup up the CPU without setting jumpers on
the motherboard. You can setup the CPU simply by selecting the speed i.e. Pentium
III 750 from the list. This ensures that the CPU bus, multiplier, voltage etc, is correctly

69
set for that particular CPU. However you can manually setup each feature if required.
Once you have finished with the setup press ESC to return the previous menu.

Figure44. BIOS CMOS Setup Utility

Standard CMOS Features

Here you can setup the basic BIOS features such as date, time, type of floppy
etc. Use the arrow keys to move around and press enter to select the required option.
You can specify what IDE devices you have such as Hard drive, CD-ROM, ZIP drive
etc. The easiest way to setup the IDE devices is by leaving it set to auto. This allows
the BIOS to detect the devices automatically so you don't have to do it manually. At
the bottom, it also displays the total memory in your system.

Figure4 5. Standard CMOS Feature

70
Advanced BIOS Features

As you can see from figure 3, there are numerous advance settings which you
can select if required. For most cases leaving the default setting should be adequate.
As you can see the first boot device is set to floppy. This ensures that the floppy disk is
read first when the system boots, and therefore can boot from windows boot disk. The
second boot device is the Hard disk and third is set to LS120. If you want to boot from
a bootable CD then you can set the third boot device to CD/DVD-ROM.

Figure4 6. Advance Bios Feature

Advanced Chipset Features

Here you can setup the contents of the chipset buffers. It is closely related to
the hardware and is therefore recommended that you leave the default setting unless
you know what you are doing. Having an incorrect setting can make your system
unstable. If you know that your SDRAM can handle CAS 2, then making changes can
speed up the memory timing. If you have 128MB SDRAM then the maximum amount
of memory the AGP card can use is 128MB.

71
Figure4 7. Advance Bios Chipset

Integrated Peripherals

This menu allows you to change the various I/O devices such as IDE controllers,
serial ports, parallel port, keyboard etc. You can make changes as necessary.

Figure48. Integrated Peripherals

Power Management Setup

The power management allows you to setup various power saving features, when
the PC is in standby or suspend mode.

72
Figure49. Power Management setup

PnP/PCI Configurations

This menu allows you to configure your PCI slots. You can assign IRQ's for
various PCI slots. It is recommended that you leave the default settings as it can get a
bit complicated messing around with IRQ's

Figure50. Pnp /PCI Configurations

PC Health Status

This menu displays the current CPU temperature, the fan speeds, voltages
etc. You can set the warning temperature which will trigger an alarm if the CPU
exceeds the specified temperature.

73
Figure51. PC Health Status
Load Fail-Safe Defaults

If you made changes to the BIOS and your system becomes unstable as a
result, you can change it back to default. However if you made many changes and
don't know which one is causing the problem, your best bet is to choose the option
"Load Fail Safe Mode Defaults" from the BIOS menu. This uses a minimal
performance setting, but the system would run in a stable way. From the dialog box
Choose "Y" followed by enter to load Fail-Safe Defaults.

Figure 52 . Load fail -safe defaults

Load Optimized Defaults

Like the Fail-Safe mode above, this option loads the BIOS default settings, but
runs the system at optimal performance. From the dialog box Choose "Y" followed by
enter to load Optimized Defaults.

74
Figure 53. Load optimized
Set Password

To password protect your BIOS you can specify a password. Make sure you
don't forget the password or you cannot access the BIOS. The only way you can
access the BIOS is by resetting it using the reset jumper on the motherboard.

Figure54. Load optimized


Save and Exit Setup

To save any changes you made to the BIOS you must choose this option.
From the dialog box choose "Y".

Figure55. Save to CMOS and EXIT

Exit without Saving

If you don't want to save changes made to the BIOS, choose "N" from the
dialog box.

Figure56. Quit Without Saving

75
Task 1. The BIOS settings in the CMOS memory have become corrupted or
damaged

Task: Check the CMOS battery and replace if needed.

Procedure:

1. Power on your desktop pc and wait for the POST


2. Read the Power on self-test report and do the necessary procedure to solve the
problem.
3. Boot up your pc into BIOS setup.
4. Look for incorrect or changing time settings. A noticeable symptom is an invalid time
showing within the operating system. This symptom is confirmed if time sets after the
computer system is restarted. Under these circumstances, the CMOS battery should
be replaced.

Procedure: On how to replace the CMOS Battery.

1. Locate your CMOS battery


2. Obtain battery information
3. Removing the battery
4. Insert the new battery
5. Enter CMOS values
You will be assessed using the following criteria

CRITERIA Evaluation

Passed Failed

1. Sequence of steps in CMOS diagnosing procedure is


followed.

2. Sequence of steps for replacing CMOS battery is


followed carefully.

3. Safety precaution is observed.

Remarks

76
Practicing TCP/IP Networking Skills

While connected to the Internet or another TCP/IP network, answer these


questions:

1. What is your current IP address?

2. Release and renew your IP address. Now what is your IP address?

3. Are you using dynamic or static IP addressing? How do you know?

4. What is your adapter address for this connection?

5. What is your default gateway IP address?

6. What response do you get when you ping the default gateway?

Task 2. Investigating Verizon FiOS

Verizon (www.verizon.com) is currently offering an alternative to DSL and


cable modem for broadband Internet access. FiOS is a fiber-optic Internet service
that uses fiber-optic cable all the way to your house for both your residential
telephone service and Internet access. Search the Web for answers to these
questions about FiOS:

1. Give a brief description of FiOS and how it is used for Internet access.

2. What downstream and upstream speeds can FiOS support?

3. When using FiOS, does your telephone voice communication share the fiber-optic
cable with Internet data?

4. What does Verizon say about FiOS cabling used for television?

5.Is FiOS available in your area?

Hardware Upgrade

Tool, Materials, and Equipment

77
Tools

Philip Screw Deriver

Anti-static wrist strap

Anti-static mat

Equipment

Network Card

Network Card Upgrade

Given the tools and materials, upgrade your computer by installing a network card.

You will be assessed using the following criteria

CRITERIA Evaluation

Passed Failed

1. Safety precautions are observed.

2. Appropriate tools are used in upgrading

3. Necessary improvement and adjustment are done in


terms up upgrading.

Remarks

LESSON 4: TEST SYSTEMS AND NETWORKS

Testing Computer System

78
Is your PC healthy? Don't be too sure. Think back to when you heard a
kerklunk sound coming from the hard drive. Or maybe you remember the last time
your Internet connection was down.

The best way to find out what's wrong is to take a proactive approach: Check
under your PC's hood with the following mostly free diagnostic tools, and see if
anything is amiss--before disaster strikes.

Three Major Components of Computer System:

• Hardware
• Software
• Firmware

Test Your Hardware

Checking your computer hardware and its peripherals

1. Computer Monitor and its peripherals


 Monitor and interface cables Interface cables
 Video card
 Monitor power cable

Video cards

Monitor power
cable

79
2. Keyboard and Mouse

• Keyboard connector
• Mouse Connector

Keyboard connecter

Mouse connector

3. I/O port and devices

• Connection between the I/O port and the peripheral device


• A faulty cable between the I/O port and the peripheral device
• A faulty peripheral device
• Incorrect settings in the System Setup program
• Incorrect settings in the system's configuration files
• Faulty I/O port logic on the system board

80
I/O circuit board

Parallell ports

4. Power supply

• Power cord
• Fuse

Power supply

Fuse Power plug

Testing Your Software

Check the different software installed in the computer.

81
1. Operating system

• Run live updates for your operating systems to get the latest patches and
protection for your OS.
• Run registry scanners to check the OS registry configuration

2. Application Software

• Check for live updates

3. Anti-virus software

• Run anti-virus program


• Check for virus signature updates
• Check for spyware updates

82
Test Your Firmware

Firmware- is a combination of hardware and software integrated on a chip.

To test the firmware

Check for the correct configuration can accomplish this by configuring the BIOS in the
computer

Sample Accomplishment Report Form

83
Task to be accomplished Status

Hardware component testing Working Not


properly working
properly

Software testing S tatus

Working Not
properly working
properly

Error Beep codes

84
When a PC is first switched on or reset it performs a special diagnostic test
called a POST (Power-On Self Test), to check all components in the PC, the POST
program sends out a signal to each device initializing each device's built-in self test
procedure.

The POST test is a two stage process:

1. First, it will check all the basic components including among other things the
system clock, the processor, RAM, the keyboard
controller and the Video

2. After the video has been tested the BIOS will then
indicate any errors encountered by displaying either a
numeric code or a text message on the screen.

When a device fails the first part of the POST, the BIOS will send a series of
beeps from the PC's speaker (internal) to inform the PC user that there is a problem
these beeps are coded allowing the user to diagnose the troublesome component.
When the POST has been completed successfully, the PC will make a short beep to
let the user know everything is as it should be.

Three (3) major brands of BIOS chip

1. AWARD BIOS
2. Phoenix BIOS
3. AMI BIOS

Each type of BIOS chip has it own error code

AMI BIOS ERROR BEEP CODES

Indicator Error message Solution

85
Memory refresh failure Check memory

1 Beep Memory parity error

Check memory
Memory read/write error
2 Beeps

Check memory
Motherboard timer not
3 Beeps functioning

Processor error Replace motherboard

4Beeps Gate A20/keyboard Replace processor


controller failure

5Beeps Replace motherboard


Processor exception
interrupt
Replace processor
6 Beeps
Display memory
read/write failure
Replace video card
7 Beeps
ROM checksum error

Replace BIOS
8 Beeps chip/Motherboard
CMOS shutdown
read/write error
Replace BIOS
9 Beeps Bad cache memory chip/Motherboard

10 Beeps Replace cache memory

Phoenix BIOS ERROR BEEP CODES

Phoenix BIOS beep codes are a series of beeps separated by a pause, for
example: beep --- beep beep --- beep --- beep beep would be 1-2-1-2

Indicator Error message Solution

86
1-1-4-1 Cache error Check cache memory

Check BIOS ROM

1-2-2-3 BIOS ROM Checksum

Check DRAM
DRAM test rate
1-3-1-1

Check keyboard
Keyboard controller controller
1-3-1-3 test
Check memory
RAM failure

Check memory Check


1-3-4-1
RAM failure data bits memory
of low memory bus

1-3-4-3
RAM failure data bits Check ROM
of high memory bus

1-4-1-1

ROM copyright notice


2-1-2-3

Test for unexpected


interrupt

AWARD BIOS ERROR BEEP CODES

Indicator Error message Solution

One long beep and Video error Replace video card


two short beeps

Two short beeps Non-fatal error Reset RAM, Check


other components.

87
Directions: Answer the following questions and place your answers on your answer
sheet.

1. What does the acronym POST stand for?


2. What are the Three Major Brand of BIOS chips
3. Identify the following error codes:

• 1-2-2-3
• 1-3-4-1
• 2-1-2-3
• 1-1-4-1
• 1-3-1-1

Directions:

Test I. Identify the tools presented below and write your answer in separate
paper.

1.

88
2.

3.

4.

5.

Directions:

Test II. List down at list Five (5) common problem and solution. Use a separate
sheet of paper if needed.

Task 1.Understanding Hardware Documentation

Obtain the manual for the motherboard for your PC. (If you cannot find the manual,
trydownloading it from the motherboard manufacturer’s Web site.) Answer these
questions:

89
1.What processors does the board support?

2.What type of RAM does the board support?

3.What is the maximum RAM the board can hold?

4.If the board has a PCIe slot, what version of PCIe does the board use?

5.What chipset does the board use?

Task 2. Teaching Yourself About Windows Meeting Space

Using the Windows Help and Support window, Search for information on
Windows Meeting Space. Describe the tool. When would you want to use it? What
can you do with Windows Meeting Space? Set up and test the tool with a friend on a
network connection.

Task 1. Testing a Computer Unit

Equipment, Tools, and Materials:

Tools

Multi-tester

Screw driver

Equipment

Computer unit

Monitor

Keyboard and mouse

Power cables

Materials

Bond paper

Ruler and Pencil

Hardware Testing and Documentation

90
Directions: Test the following computer peripherals and equipment with the use of
the tools provider. Document your testing with the use of an accomplishment form.

Assigned Task Condition

Hardware component testing Working Not working


properly properly

Computer monitor

Power supply

Keyboard

Mouse

You will be assessed using the following criteria

CRITERIA Rating

1. Sequence of steps in testing is followed. 20%

2. Safety precautions are observed. 20%

3. Appropriate tools are used in testing. 30%

4. An accomplishment report is created. 30%

Total

100%

Task 2.Identify Error codes

91
Equipment, Tools, and Materials:

Tools

Screw drivers

Anti-static wrist strap

Equipment

Computer unit

Memory Error Codes


Given the tools and equipment, identify the memory error code by removing the
module in the computer unit

You will be assessed using the following criteria

Evaluation:
CRITERIA Rating

1. Observance of safety precautions. 30%

2. Appropriate tools are used in testing. 30%

3. Identifying the error code. 40%

Total 100%

POST ASSESSMENT

Do the Activity on More Security for Remote Desktop

When Enzo travels on company business, he finds it’s a great help to be able
to access his office computer from anywhere on the road using Remote Desktop.
However, he wants to make sure his office computer as well as the entire corporate
network is as safe as possible.

92
One way you can help Enzo add more security is to change the port that
Remote Desktop uses. Knowledgeable hackers know that Remote Desktop uses port
3389, but if you change this port to a secret port, hackers are less likely to find the
open port. Search the Microsoft Knowledge Base articles
(support.microsoft.com) for a way to change the port that Remote Desktop uses.

Practice implementing this change by doing the following:

1. Set up Remote Desktop on a computer to be the host computer. Use another


computer (the client computer) to create a Remote Desktop session to the host
computer. Verify the session works by transferring files in both directions.

2. Next, change the port that Remote Desktop uses on the host computer to a secret
port. Print a screen shot showing how you made the change. Use the client
computer to create a Remote Desktop session to the host computer using the
secret port. Print a screen shot showing how you made the connection using the
secret port. Verify the session works by transferring files in both directions.

3. What secret port did you use?

Instruction:
 Read each of the questions in the left-hand column of the chart. 
Place a check on the column that indicate your answers

I Can YES NO
Plan and prepare work to ensure occupational health and
safety
(OHS) policies and procedures are followed
Obtain materials, tools, equipment and testing devices
needed to on form with job requirements
Interpret work instructions according to job requirements
Obtain computer components/devices/systems and
determines its location prior to installation
Install equipment/devices/systems in accordance with job
requirements
Check/Test devices/systems and/or installations to
determine the conformity to job requirements.
Check computer systems and networks for configuration in
accordance with specifications and requirements
Diagnose fault or problem in the computer systems and
networks in line with standard operating procedures (SOP)

Configure the identified systems and networks based on


specifications and job requirements
Inspect and test configured computer systems and networks
in conformity with manufacturer's instructions/manual

93
Correct/Adjust components or parts of computer systems
and networks in accordance with job requirements
Test computer systems and networks to ensure safe
operation
Perform scheduled/periodic maintenance in accordance
with manufacturer's requirements
Make needed repairs/replacements in accordance with
established procedures, when necessary
Document tasks undertaken in accordance with SOP
Clean and clear worksite of all surplus/excess materials in
accordance with company SOP

Summative Test

I. Identify what computer error is illustrated on the following situations.

__________1. The LED indicator of your monitor is in steady orange color.

_________ 2. When you open your PC, nothing shows up in your monitor and the LED
indicator of your monitor is flashing in yellow color.

__________3. When you open your PC it will show the processor brand and/or the
motherboard brand but doesn't continue. Usually this error will result to system
restart over and over again.

__________4.This also happens even if you try disconnecting your computer set
from the internet. This is what we called aftershock virus which will continue to run
even if internet is disconnected.

__________5. The computer opens up then boots but when the operating system loads it
doesn't continue and it will take a lifetime if you're going to wait for it to load.

__________6. This happens even if you try installing the hardware. When you restart
your set it will happen again.

__________7. When you try going to safe mode all you will see is a list of files in
Command prompt style.

__________8. Upon loading he operating system, you will hear a loading sound and then
the sound stops, when you try running an audio file, no sound will be heard

__________9.This will happen only in standby mode, when you move your mouse or
type something, your system will automatically restart and the worst part is it will
delete a file at random.

94
__________10. Just like the mouse problem, when you open a program that will take
the whole screen like for example a game and/or a program applications, when you
close it, it will cause your system to restart.

II. Choose the letter of the best answer:

1) These are moderately dangerous types of errors among those that can pop up
on your PC. System errors are caused by malfunctioning hardware
components, corrupted operating system modules, etc.
a. System error C. Stop errors
b. Runtime errors D. Device managers errors

2) These are caused by corrupted or malfunctioning system files or software


executables. Most runtime errors cause the application that caused it to shut
down. However, more serious runtime errors may cause the system to
become unstable or unresponsive, leaving you with no choice but to reach for
the Reset button.
a. System error C. Stop errors
b. Runtime errors D. Device managers errors

3) These are caused by corrupted hardware, especially malfunctioning RAM


modules and bad sectors on hard disks. Stop errors can be difficult to resolve
at times.
a. System error C. Stop errors
b. A Runtime errors D. Device managers errors

4) These are usually caused by corrupted driver files or malfunctioning hardware


components. In case of the former cause, the problem is usually solved simply
by reinstalling or updating the drivers. However, the latter cause can often be
solved only by replacing hardware components.
a. System error C. Stop errors
b. B. Runtime errors D. Device managers errors

5) These are caused by malfunctioning hardware components, and are


characterized by short beep sounds from the tiny internal speaker of your
motherboard. POST code errors occur when you press the power button to
turn on your PC..
a. System error C. Application errors
b. B. Runtime errors D. Post Code errors

6) These can be caused at any point of time. As the name suggests, these are
caused by applications while those are running. These are usually caused by
glitches in the program code itself. These are usually resolved by updating the
program to its latest version.

95
a. System error C. Application errors
b. Browser status errors D. Post Code errors

7) These are caused by problems faced by browsers when trying to access a


website. These can be caused by misplaced web pages in the server of the
website itself, or due to connection problems. For instance, a 404 error would
indicate that the browser is trying to access a webpage that does not exist in
the specified location.
a. System error C. Application errors
b. Browser status errors D. Post Code errors

8) is define as the flow of electron or electric current. It is an invisible form of


energy that can be transform into other form of energy like heat light and
mechanical.

a. electricity C. Proton
b. atom D. Post Code errors
9) the amount of pulling force that makes the electron flow. Also known as
potential difference or EMF(electromotive force).
a. electricity C. Current
b. resistance D. Voltage
10)a type of circuit that has an open path for current to flow. It means that current
cannot flow in open circuit.
a. Open circuit C. Current circuit
b. resistance D. close circuit

III. Match Column A with Column B

Column A Column B
1. Used for installing and removing A. Screw drivers
screws in the computer unit.
2. Used for picking small parts in the B. Pliers and tweezers
computer unit.
3. Used for eliminating electrostatic C. Soldering iron
discharge in the work area.
4. Primarily used for connecting D. Lens cleaner
terminals in the power supply and
circuit board with the use of a
soldering lead.
5. It is a paste used for heat E. Anti-static wrist strap, mat and
dissipation of the processor. spray
6. A device used for cleaning optical F. Thermal paste
media, such as DVD-ROMS and
CD-writers.
7. A device used to crimp the RJ45 G. LAN Tester
connector to the UTP cable
8. A device used for testing the H. Crimping tool

96
network connection
I. Systems Tool Box

IV. Arrange the following steps in verifying the correct protocols are installed on
the computer.

_____Within the configuration tab double-click the TCP/IP protocol icon. Note: Do not
click on the PPP or Dial-Up adapter, click on the network card adapter.

_____Select the option to specify an IP address

_____Click Start / Settings / Control Panel

_____Double-click the Network icon

_____In the TCP/IP properties click the IP address tab

_____When specifying these values, the computers on the network must all have the
same Subnet Mask and have a different IP Address. For example, when using the
above values on one computer you would want to use an IP address of 102.55.92.2
on another computer and then specify the same Subnet Mask.
_____Enter the IP address and Subnet Mask address, an example of such an address
could be: IP Address: 102.55.92.1, Subnet Mask: 255.255.255.192

V. List down at list Five (5) common computer problems and solutions.

Common Computer Problems Solutions


1.
2.
3.
4.
5.

KEY TO CORRECTIONS

Test I

1. No Video Output
2. No Video Output
3. Doesn't Boot
4. Lots of pop up windows showing on standby mode
5. Never Ending Loading of Operating system
6. Lots of hardware installation windows appear
7. Safe mode doesn't work
8. Sound on/off error
9. Keyboard and mouse system restart

97
10. Application causes system to restart

Test II

1. A
2. B
3. C 4. D 5. D
6. C
7. B
8. A
9. C
10. A

Test III

1. A 2.
B
3. E
4. C
5. F
6. D
7. H
8. G

Test IV

3, 5, 1, 2, 4, 7, 6

Test V

Answers may vary

GLOSSARY OF TERMS
Computer System - The complete computer made up of the CPU, memory and
related electronics (main cabinet), all the peripheral devices connected to it and its
operating system. Computer systems fall into two broad divisions: clients and
servers. Client machines fall into three categories from low to high end: laptop,
desktop and workstation. Servers range from small to large: low-end servers,
midrange servers and mainframes.

Configuration - The makeup of a system. To "configure" is to choose options in


order to create a custom system. "Configurability" is a system's ability to be changed
or customized.

Connector - Any plug and socket that links two devices together. Although taken for
granted and rarely in the limelight, connectors are a huge industry, and the quality of
these components is more critical than most people would imagine. When not
designed or constructed properly, they often become the weakest element in an
electronic system.

98
Display Adapter - A plug-in card in a desktop computer that converts the images
created in the computer to the electronic signals required by the monitor. It
determines the maximum resolution, refresh rate and number of colors that can be
displayed, which the monitor must also be able to support. On many PC
motherboards, the display adapter circuits are built into the chipset, and an AGP or
PCI card is not required.

ESD (Electro Static Discharge)- A small amount of static electricity that can destroy
small parts of your computer.

Expansion Board - A printed circuit board that plugs into an expansion slot and
extends the computer's capability to control a peripheral device. All the boards
(cards) that plug into a computer's bus are expansion boards, such as display
adapters, disk controllers, network adapters and sound cards.

Expansion Bus - An input/output bus typically comprised of a series of slots on the


motherboard. Expansion boards (cards) are plugged into the bus. ISA and PCI are
the common expansion buses in a PC.

Graphical User Interface - A graphics-based user interface that incorporates


movable windows, icons and a mouse. The ability to resize application windows and
change style and size of fonts are the significant advantages of a GUI vs. a
character-based interface. GUIs have become the standard way users interact with a
computer, and the major GUIs are the Windows and Mac interfaces along with Motif
for Unix and the GNOME and KDE interfaces for Linux.

Motherboard - Also called the "system board," it is the main printed circuit board in
an electronic device, which contains sockets that accept additional boards. In a
desktop computer, the motherboard contains the CPU, chipset, PCI bus slots, AGP
slot, memory sockets and controller circuits for the keyboard, mouse, disks and
printer. It may also have built-in controllers for modem, sound, display and network,
obviating the need to plug in a card. A laptop motherboard typically has all peripheral
controllers built in.

Operating System - The master control program that runs the computer. The first
program loaded when the computer is turned on, its main part, the "kernel," resides
in memory at all times. The operating system sets the standards for all application
programs that run in the computer. The applications "talk to" the operating system for
all user interface and file management operations. Also called an "executive" or
"supervisor," an operating system performs the following functions.

Peripheral -Any hardware device connected to a computer, such as a monitor, keyboard,


printer, disk, tape, graphics tablet, scanner, joy stick, paddle or mouse

Server - A computer system in a network that is shared by multiple users. Servers


come in all sizes from x86-based PCs to IBM mainframes. A server may have a
keyboard, monitor and mouse directly attached, or one keyboard, monitor and mouse
may connect to any number of servers via a KVM switch. Servers may be also be
accessed only through a network connection as well.

99
Sound Card - Also called a "sound board" or "audio adapter," it is a computer
expansion board that records and plays back sound, providing inputs from a
microphone or other sound source and outputs to speakers or an external amplifier.
The de facto standard for sound card compatibility in PCs is Creative Labs' Sound
Blaster.

User Interface - All graphics based today, the user interface includes the windows,
menus and method of interaction between you and the computer. Prior to the Mac,
Windows and Motif (Unix) interfaces, all interaction was based on commands entered
by the user. Operating systems may support optional interfaces and allow a new
shell, or skin, to be used instead.

Virus - Software used to infect a computer. After the virus code is written, it is buried
within an existing program. Once that program is executed, the virus code is
activated and attaches copies of itself to other programs in the system. Infected
programs copy the virus to other programs.

REFERENCES

Books and Articles and Printed Materials:

Barry Press, Marcia Press, PC Upgrade and Repair Bible,


Desktop Edition., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256

Ron Gilster, PC Repair Bench Book., Wiley Publishing Inc., 10475 Crosspoint
Boulevard, Indianapolis, IN 46256
Barry Press, Marcia Press, PC Upgrade and Repair Bible, Desktop
Edition., Wiley Publishing Inc., 10475 Crosspoint Boulevard, Indianapolis,
IN 46256

Ronaldo V. Ramilo and Deover M. Pasco , K to 12 Basic Education


Curriculum- Technology and Livelihood Education Learning Module –
Computer Hardware Servicing

100
Jethro Campos , et.al , Competency – Based Learning Materials for
Strengthening Technical Vocational Education Program

Electronic Resources:

http://www.buzzle.com/articles/computer-memory-types.html Computer
Memory Types
http://www.athropolis.com/popup/c-comp2.htm
Measurements for Memory & Storage
http://www.ustudy.in/ce/hard/u1 Fundamentals
of PC repair

http://danreb.com/sites/default/files/CHS-NC2%20Reviewer
%20%20With%20Oral%20Questioning_0.pdf Occupational
Health and Safety Precautions
http://puzzlemaker.discoveryeducation.com/CrissCrossSetupForm.asp Puzzles
for Activities
http://info.psu.edu.sa/psu/cis/kalmustafa/CISCO/Lecture%20Slides/ITE_PC_v
40_Chapter2.pdf
Occupational Safety Precautions

http://www.youtube.com/watch?v=tfKe8PPI2zs&feature=related Conversion
of Decimal N umber to Binary

http://www.youtube.com/watch?v=s7M6_VeDhJE&feature=related

http://www.youtube.com/watch?v=6N7bqBsFL0w-

Computer Hardware Basics

http://www.wikihow.com/Install-Computer-Hardware- How
to install Computer Hardware
http://www.directron.com/howtoupsys.html- How
to install Computer components
en.wikipedia.org

http://www.bechtel.com/assets/files/Environmental/ToolboxSafetyTopics/20
10/ProperToolSelection.pdf Tool Selection
http://www.iml.uts.edu.au/assessment-futures/designing/assembling.html

http://www.instructables.com/id/Disassemble-a-Computer/- Computer Basics

101
102

You might also like