Competency Based Learning Materials
Competency Based Learning Materials
Competency Based Learning Materials
Sector: Electronics
If you have questions, don’t hesitate to ask your Trainer for assistance.
If you have already some knowledge and skills covered in this module
because you have been working for some time; or already completed training
in this area; or if you can demonstrate competence to your Trainer in a
particular skill, talk to your Trainer so you don’t have to undergo the same
training again. If you have a qualification or Certificate of Competency from
previous trainings show it to him/her. If the skills you acquired are
consistent with and relevant to this module, they become part of the
evidence. You can present these for RPL. If you are not sure about your
competence skills, discuss this with your Trainer.
In this module, you will find the activities for you to complete and
relevant information sheets for each learning outcome. Each learning
outcome may have more than one learning activity.
List of Competencies
Installing and
Install and Configure ELC724331
1. Configuring Computer
Computer Systems
Systems
LEARNING OUTCOMES:
Upon completion of this module the students/trainees must be able
to:
LO1. Plan and prepare for maintenance and repair
LO2. Maintain computer systems and networks
LO3. Diagnose faults of computer systems and networks
LO4. Rectify/correct defects in computer systems and networks
LO5. Inspect and test the computer systems and networks
Conditions
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
INTRODUCTION:
Maintenance refers to the actions carried out to retain an item in or
restore it to an acceptable condition either Planned which is divided into
Preventive and Corrective Maintenance or Unplanned.
It is easy to think computers are so advanced that they don’t have the
same problems as other machines. The truth is that your computer network
is a collection of complex machines and software, communicating
simultaneously, performing of trillions of calculations, using hundreds of
parts and wires, and under constant assault by viruses and spyware and
their own users.
Here are ten reasons every small business needs regular and proactive
server and workstation maintenance:
Place your computer in a well ventilated area.
Schedule use of computers for its longer life.
Move computers only when it is turned off and unplugged.
Treat your computer properly.
Maintain your hard disk
2. Design a systematic maintenance plan for your software.
Backup your files
Install or secure passwords
Delete temporary files
Update antivirus and spy ware
Sharon llagas
---MAINTAINANCE PROGRAM---
Maintenance Program- is a comprehensive list of maintenance and its
incidents. This would include all maintenance activities to be undertaken,
manpower needed, maintenance methods to be used, all the materials and
supplies needed for the maintenance and cost involved in the maintenance.
Every
Daily
15th
Day
Day
ly
y
1. Clean PC Trainer/ X
utility/
trainees
2. Check Hard disk
Trainer/ x
The proper use of the training tools and equipment is the first and
foremost task in the maintenance. The proper use of tools and
equipment is a very important task of the worker in any trade. They
must be able to use them in accordance to the manufacturer’s
manuals as this would evidently extend the life of the equipment and
tools.
USER’S MANUAL:
1.) For the Safe and Proper Operation of an Equipment or Tools.
When using equipment and simple tools, it is best to read the
manufacturer’s and/or user’s manuals. This would indicate the part
of the equipment, the functions of each part and the way to maintain
it. We must always refer to it for reference. The user’s manuals must
be kept handy and within the Quality Control Area where the
equipment is kept for immediate reference.
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
LEARNING OBJECTIVE:
Proper set-up and maintenance ensures that system users can put it
to good use.
pollution.
Do not place your system in front of a window.
The system should not be exposed to direct sunlight or temperature
variations.
The environmental condition should be as constant as possible.
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
Power should be provided through properly grounded outlets and
should be stable and free from electrical noise and interference.
Keep your system away from radio transmitters or other sources of
radio frequency energy.
The circuit should be checked for a good, low resistance-ground, proper line
voltage, freedom from interference and freedom from brownouts (Voltage
dips)
Introduction
To help you determine how often you need to clean your computer, use
the chart below. Check each of the boxes below that apply to your
computers environment to determine how often it should be cleaned.
Where is computer located?
In a home environment
In school environment
Computer environment
Computer is on floor
Case cleaning
Make sure all vents and air holes are hair and lint free by rubbing a
cloth over the holes and vents. It is also helpful to take a vacuum
around each of the hole, vents, and crevices on the computer. It is safe
to use a standard vacuum when cleaning the outside vents of a
computer; however, if you need to clean the inside of the computer, use
a portable battery powered vacuum to prevent static electricity.
Why? A dirty CD-ROM drive or other disc drives can cause read errors
when reading discs. These read errors could cause software installation
issues or issues while running the program.
Why? Dirty CDs can cause read errors or cause CDs to not work at all.
Procedure: Cleaning CDs and DVDs should be done with a cleaning kit
but can also be done with a normal clean cotton cloth or shirt. When
doing this with a clean cotton cloth or shirt, wipe against the tracks,
starting from the middle of the CD or DVD and wiping towards the
outer side as shown in the below picture. Never wipe with the tracks;
doing so may put more scratches on the disc.
Headphones cleaning
Headphones that have cushions also have the availability of having the
cushions replaced. Replacing these cushions can also help keep the
headphones clean.
Keyboard cleaning
The computer keyboard is often the most germ infected items in your
home or office, often it will contain more bacteria than your toilet seat.
Cleaning it can help remove any dangerous bacteria. Dirt, dust and
hair can also build up causing the keyboard to not function properly.
After the dust, dirt, and hair has been removed. Spray a
to remove the keys from the keyboard
LCD cleaning
Why? Dirt, dust, and finger prints can cause the computer screen to
be difficult to read.
Tip: When cleaning the inside of the case also look at any fans or heat
sinks. Dust, dirt, and hair collect around these components the most.
Mouse cleaning
Why? To help keep a mouse clean and germ free it can be helpful to
clean the mouse.
Printer cleaning
Why? Cleaning the outside of a printer can help keep the printer's
appearance looking good; and in the case of a printer that is used by
many different people, keep the printer clean of germs.
Procedure: First, make sure to turn off the printer before cleaning it.
Dampen a cloth with water or rubbing alcohol and wipe the case and
each of the buttons or knobs on the printer. As mentioned earlier,
never spray any liquid directly onto the printer.
Why? With some printers it may be necessary to clean the inside of the
printer to help keep the printer running smoothly.
Scanner cleaning
To clean the outside of the scanner, the same towel or cotton cloth can
be used.
DIAGNOSTIC PROGRAMS
There are three categories of diagnostic disks.
I. REGULAR MAINTENANCE
As time passes while you use your PC, everything stored in your
computer data may become scattered. Bad sectors can be found; some
files or folders may be missing. There are 3 steps you have to take in
order to fix these problems.
A. DEFRAGMENT DISK
After the Analyze button has been clicked and the process
has been completed, the Session Status will show ―Analyzed‖
and the Estimated Disk Usage before Defragmentation will show
a graphical represent the drive fragmentation.
B. SCANDISK
C. DISK CLEAN UP
The Disk Cleanup tool helps you free up space on your hard disk to
improve the performance of your computer. The tool identifies files
that you can safely delete, and then enables you to choose whether
you want to delete some or all of the identified files.
Computer Virus
TERMINOLOGY
Virus
Worm
Spyware
Malware
It corrupts files
It slows down the speed of the computer system
It causes the system to hang frequently
It deletes various files
Boot viruses: These viruses infect floppy disk boot records or master boot
records in hard disks. They replace the boot record program (which is
responsible for loading the operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot viruses load into memory if the
computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus
Program viruses: These infect executable program files, such as those with
extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device
driver). These programs are loaded in memory during execution, taking the
Date Developed: Document No.
CBLM on Computer April 17, 2015 Issued by:
System Servicing Date Revised:
NCII
Developed by:
Page __ of __
Maintain and Repair Revision #
Computer Systems ICGI Trainer
iConnect Global and Networks
Institute, Inc.
virus with them. The virus becomes active in memory, making copies of
itself and infecting files on disk.
Polymorphic viruses: A virus that can encrypt its code in different ways so
that it appears differently in each infection. These viruses are more difficult
to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101
Macro Viruses: A macro virus is a new type of computer virus that infects
the macros within a document or template. When you open a word
processing or spreadsheet document, the macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear, Word Concept.
Antivirus Software
Removing the virus – When the virus can be easily identified and can
be removed without affecting other files, then the antivirus removes it
from the host place.
As our world becomes more digitized, the files we store on our computers
are becoming increasingly more important. Instead of keeping handwritten
letters in a shoebox, we correspond with family members using e-mail. If we
use digital cameras, we often keep our photo albums on our computers.
Unfortunately, computers (and particularly the hard disk drives that hold
your files) can fail. Your computer might run for a decade with no problems,
or it could fail tomorrow—there's no way to tell. To make sure you don't lose
important files if your computer stops working, you should back up your
computer on a regular basis. The backup process copies your files to a safe
place so that even if your computer fails, you won't lose them.
If you decide to get an external hard disk drive, choose one that is at least as
large as the hard disk drive inside your computer. For example, if your
computer has a 100-gigabyte (GB) hard disk drive, choose a 100-GB or
larger external hard disk drive. Then connect the external hard disk drive to
your computer. Make a note of the drive letter (such as E:, F:, or G:)
assigned to your new hard disk drive.
1. Click Start, point to Accessories, point to System Tools, and then click
Backup. If the Backup option does not appear on the System Tools
menu, you can install it.
If your computer stops responding, you will be able to restore your files to
the state they were in when you completed the backup. However, any new
files you have created and any changes you have made to existing files since
the backup occurred will not be saved unless you back up your files again.
For best results, back up your files every week or immediately after creating
important files, such as after you copy pictures from your digital camera.
Schedule backups
If you're busy, you might not have time to manually back up your files every
week. Fortunately, you can schedule backups to occur automatically. This
takes a few minutes to set up, but once you've done so, you'll be protected
indefinitely.
10. On the When to Back Up page, click Later. In the Job name box, type
Backup. Then click Set Schedule.
12. In the Start time box, specify a time of day when your computer will
not be used for several hours, such as 3:00 AM. In the Schedule Task
Weekly area, select the day of the week you want to back up your files.
If you are backing up files overnight, remember to leave your computer
running the night before.
15. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.
17. In the Set Account Information dialog box, type your password in
both the Password and Confirm password fields. Then click OK.
19. On the Completing the Backup or Restore Wizard page, click Finish.
You can use this feature to change the installation of Windows Installer-
based programs such as Microsoft Office XP. Windows Installer-based
programs include a Maintenance Mode option. With this option, you can add
or remove features, change the installation state of the program or of
individual components, or repair and restore the installation.
Troubleshooting
Make sure that the program that you click in the Add or Remove
Programs tool is the program that you want to remove from your
computer. Some programs may not prompt you to confirm the removal
before the program is removed from the computer.
1. Diagnostic procedures
2. Identifying and isolating faults/problems
- Diagnostic software utilities
- Gathering of information
3. Accomplished forms
- Diagnostic reports
- Proposal reports
Conditions
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
LEARNING OBJECTIVE:
After reading this INFORMATION SHEET, YOU MUST be able to Maintain
Network System
Computer maintenance is an important part of keeping any business
running smoothly. An ounce of prevention is worth a pound of cure. Below
is a basic recommended schedule for preventing costly computer problems
on workstations.
(If your not sure what you are deleting select the category and then Click
―View Files‖)
--------------------------------------------------------------------------------
5. Select the ―Screen Saver‖ Tab>>Change the Screen Saver Drop Menu to
your preferred screen saver
6. Click OK
Daily (or weekly) : Double click ―Cleanup.exe‖ icon on desktop then click
the cleanup tab – this clears out all temporary
internet files % cookies (when finished – no need to
Log Off)
Daily (or weekly) : Double click ATF Cleaner – Click Run select all and then
Empty Selected
Weekly : Start / Run command (type in) %temp% delete all files found
Ensure your Antivirus is updated (if AVG i.e. In Colour) daily or at least once a
week (If necessary – normally automatic) (AVG and AVS/Superantispyware
should both update themselves automatically every day)
Contents:
1.
Defects in computer systems and networks
2.
Troubleshooting and repair techniques
3.
Problem solving in emergency situation
4.
Corrective action
- Hardware Configuration
- Software configuration
Conditions
Assessment Method:
1. Hands-on
2. Direct observation
3. Practical demonstration
4. Oral and written exam
Contents:
Conditions
Assessment Method:
7. Hands-on
8. Direct observation
9. Practical demonstration
10. Oral and written exam
DNS Servers – IP address of one or more Domain
Name Server computers.
Burn In - To run a system or device for a period of time to ensure that
all components are working properly.
- The intention is to detect those particular components that
would fail as a result of the initial, high-failure rate portion
of the bathtub curve of component reliability. If the burn-in
period is made sufficiently long (and, perhaps, artificially
stressful), the system can then be trusted to be mostly free
of further early failures once the burn-in process is
complete.
Bathtub Curve - An equipment failure-rate curve with an initial
sharply declining failure rate, followed by a prolonged
constant-average failure rate, after which the failure rate
again increases sharply.
REPORT - Is a piece of information describing, or an account of
certain events given or presented to someone.
Importance of Making a Report - It enables you to practice your
skills of presentation, argument, evaluation, and
calculation, and provides a permanent record of your
work.
INSPECTION CHECKLIST
Equipment Type : Desktop Computer
Property Code : P.C. #1
Number : P.C.#1
Location : Practical Work Area
YES NO N/A INSPECTION ITEMS
1. Is the machine operate normally?
2. Are accessories checks for damage?
3. Are all device driver installed and
configured properly?
4. Are the display properties configured
correctly?
5. Is the sound functioning?
6. Is the pc connected to the server?
7. Is the printer installed shared?
8. Is IP address configured correctly?
9. Is their internet connection?
10. Is desired workgroup followed
11. Is internal parts cleaned?
12. Is external parts cleaned?
13. Is check disk performed
14. Is unwanted programs removed
15. Is necessary files back-upped
16. Is anti-virus program updated and run
17. Is disk defragment performed