Harar Poly Technic Collage
Harar Poly Technic Collage
Harar Poly Technic Collage
Ethiopian TVET-System
Learning Guide #3
This learning guide is developed to provide you the necessary information regarding the
Following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Learning Activities
Hardware
Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices
include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice,
printers, and scanners etc.
The internal hardware parts of a computer are often referred to as components, while external hardware devices
are usually called peripherals. Together, they all fall under the category of computer hardware. Software, on the
other hand, consists of the programs and applications that run on computers. Because software runs on
computer hardware, software programs often have system requirements that list the minimum hardware
required for the software to run.
Note: Peripheral devices are the devices that are attached to the computer’s system unit
Introduction
Computer Hardware is the physical part of a computer, as distinguished from the computer software that executes
or runs on the hardware. The hardware of a computer is infrequently changed, while software and data are
modified frequently. The term soft refers to readily created, modified, or erased. These are unlike the physical
components within the computer which are hard.
When you think of the term computer hardware you probably think of the guts inside your personal computer at
home or the one in your classroom. However, computer hardware does not specifically refer to personal
computers. Instead, it is all types of computer systems. Computer hardware is in embedded systems in
automobiles, microwave ovens, CD players, DVD players, and many more devices. In 2003, only 0.2% of all
microprocessors sold were for personal computers. How many other things in your house or your classroom use
computer hardware?
Inside Computer
The motherboard is the body or mainframe of the computer, through
which all other components interface. It is the central circuit board
making up a complex electronic system. A motherboard provides the
electrical connections by which the other components of the system
communicate. The mother board includes many components such as:
central processing unit (CPU), random access memory (RAM),
firmware, and internal and external buses.
The central processing unit (CPU) performs most of the calculations which enable a computer to
function, and is sometimes referred to as the "brain" of the computer. It is usually cooled by a heat sink
and fan. Newer CPUs include an on-die Graphics Processing Unit (GPU).
The chip set mediates communication between the CPU and the other components of the system,
including main memory.
RAM (random-access memory) stores resident part of the current running OS (OS core and so on) and
all running processes (application parts, using CPU or input/output (I/O) channels or waiting for CPU or
I/O channels).
The BIOS includes boot firmware and power management. The Basic Input Output System tasks are
handled by operating system drivers. Newer motherboards use Unified Extensible Firmware Interface
instead of BIOS.
Internal buses connect the CPU to various internal components and to expansion cards for graphics and
sound.
The Central Processing Unit (CPU; sometimes just called processor) is a machine that can execute computer
programs. It is sometimes referred to as the brain of the computer.
There are four steps that nearly all CPUs use in their operation: fetch, decode, execute, and writeback. The first
step, fetch, involves retrieving an instruction from program memory. In the decode step, the instruction is broken
up into parts that have significance to other portions of the CPU. During the execute step various portions of the
CPU, such as the arithmetic logic unit (ALU) and the floating point unit (FPU) are connected so they can perform
the desired operation. The final step, writeback, simply writes back the results of the execute step to some form of
memory.
Power supply
Inside a custom-built computer: the power supply at the bottom has its own cooling fan.
A power supply unit (PSU) converts alternating current (AC) electric power to low-voltage DC power for the
internal components of the computer. Some power supplies have a switch to change between 230 V and 115 V.
Other models have automatic sensors that switch input voltage automatically, or are able to accept any voltage
between those limits. Power supply units used in computers are nearly always switch mode power supplies
(SMPS). The SMPS provides regulated direct current power at the several voltages required by the motherboard
and accessories such as disk drives and cooling fans.
The most common type of removable media, suitable for music and data.
a high-density optical disc format for data and high-definition video. Can
store 70 times as much information as a CD.
Is a discontinued high-density optical disc format for storing data and high-
definition video. Supported principally by Toshiba, HD DVD was envisioned
to be the successor to the standard DVD format. However, in February 2008,
after a protracted high definition optical disc format war with rival Blu-ray
Disc, Toshiba abandoned the format, announcing it would no longer develop
or manufacture HD DVD players or drives. However, the HD DVD physical
disk specifications (but not the codecs) are still in use as the basis for the
CBHD (China Blue High-Definition Disc) formerly called CH-DVD. The HD
DVD Promotion Group was dissolved on March 28, 2008.
Floppy disk
Secondary storage
Hardware that keeps data inside the computer for later use and remains persistent even when the computer has
no power.
Sound card
Monitor
A monitor, also known as a visual display unit (VDU) or screen, is like a
television screen. It is measured diagonally in inches — the distance from one
corner of the screen area to the opposite corner. The quality of a monitor is
determined by its resolution. Resolution is calculated based on the number of
pixels, which are individual dots that create the images you see on your
monitor. Flat panel monitors are now becoming a popular choice due to their
portability and compactness.
Keyboard
A combination of a typewriter keyboard and numeric keypad, a
keyboard enables you to enter data into a computer. Computer
keyboards are similar to electric typewriter keyboards but include
additional keys.
Mouse
A mouse is a device that controls the movement of the cursor on a screen. A
mouse is a small object you can roll along a flat surface, to help you navigate
your computer. Mice also have a variety of buttons, which can have different
purposes depending on what program is running. There is usually a left mouse
button (which is used to select an object and perform an action), right mouse
button (which typically displays a shortcut menu of options) and a scroll wheel
(to help a user scroll through documents).
Printers
A printer is a device that allows you to obtain hard copies of the data you have created on your computer
system. Printers are classified by:
1 their quality
2 the speed of printing — pages per minute
3 the print/image resolution — measured in dots per inch (dpi).
In the case of speed, the faster the better, and in the case of dpi, the higher the better. There are different types
of printers due to the different methods of transferring ink to paper. Two common types for the home and office
are inkjet and laser.
Inkjet printer — sprays ink onto a sheet of paper, and can produce high-
quality text and photo images.
Laser printer — produces very high quality text and graphics, using a
process similar to a photocopier to produce print. It creates dot-like
images on a drum, using a laser beam light source.
Scanner
A scanner is a device that captures text or illustrations on paper and converts the
information into a form the computer can use. One of the most common kinds of
scanners is called a flatbed scanner. It has a glass surface on which you lay paper,
magazines, or other documents that you want to scan. Sometimes scanners can be
manufactured so that they are combined with a printer thus can also be used as a
photocopier and fax machine.
Web cam
Web cams are small cameras that plug into your computer which allow the user to
share a moving image of themselves with others on other computers through the
Internet.
Digital camera
Digital cameras store images digitally onto a storage device, either a memory card or a floppy disk, rather than
recording them on film. Once a picture has been taken, it can be downloaded to a computer system, and then
manipulated or printed.
Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties, service and support,
prospective suppliers will provide.
Warranties
A warranty is an agreed upon term which covers a computer or computer component. Generally, most
computers have a 1 or 3 year warranty. This warranty may or may not cover the service, repair and replacement
of computer parts.
An extended warranty is an available option provided by manufacturers or third-party companies that provides
additional support and/or repair of a computer or other hardware devices beyond its standard warranty.
It is important to know what kind of support services are offered by the prospective supplier. There are many
questions to consider such as:
If a device requires repairs does it have to be sent back to the supplier (called ‘Return to base’) or will
they provide on-site visits?
What is the average response time if service is required?
What kinds of maintenance and repair costs could be incurred during the duration of use of the device?
Will the device require regular servicing? If so, how many services will be necessary over a one-year
period?
System specifications
It is important to find out the specifications of the computer system you are planning to connect the peripheral
device to. Many newer types of peripheral devices require a specific amount of memory, CPU speed, hard disk
space, and may only be compatible with certain operating systems.
You also need to be aware of the peripheral’s system requirements. The manual for the peripheral device as
well as the manufacturer’s website will help you determine the minimum system specifications.
Compatibility
Compatibility is the ability of a system or a product to work with other systems or products without special
effort on the part of the customer. One way products achieve interoperability is to comply with industry
interface standards. For example, a memory module is compatible with a motherboard because the manufacturer
of the memory module and the motherboard both work to the same industry standard.
Technical specifications
Once the business requirements have been considered, the technical specifications of the hardware device need
to be evaluated. Areas for evaluation include the following:
The technical specifications to be considered will depend on the computer hardware device to be purchased. For
example, technical specifications to be considered for a printer include:
Warranty
When computer hardware devices are purchased, the supplier provides a guarantee that if a fault develops in the
equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business needs will be
met. Common warranty conditions include:
Many computer hardware suppliers offer extended warranties at additional cost. For example, the extended
warranty may extend the period of cover from one year to three years. The level of service purchased by an
organisation will depend on how critical the device is to the IT system.
A Service Level Agreement (SLA) is an agreement which sets out the level of service and maintenance to be
provided.
Organizational policies
Some organizations have a policy of using preferred suppliers for computer hardware purchases. This ensures
the quality and consistency of computer hardware devices is maintained throughout an organization.
A standard operating environment is a specification for computer hardware and software which organizations
develop to maintain consistency and reduce support costs. Many organizations such as universities, publish
their standard operating environment policies on the internet. For an example, visit the Edith Cowan University
Standard Operating Environment website
Self Check 1 Written Test
Name:____________________ Date:_________________
Instruction: Answer all the questions listed below, if you have some clarifications- feel free to ask your teacher.
Column A Column B
1. Mouse A. Internal hardware peripherals
2. Speakers B. External hardware peripherals
3. Keyboard
4. Web cam
5. Monitor
6. Power supply
7. Digital Camera
8. Data projectors
9. External modems
10. Printers
11. Microphones
12. Mother board
13. CPU
14. Power supply
15. Storage Device Drives
16. Removable Medias
If the manufacturer produces substances that may be deemed hazardous, then additional obligations apply.
There are documents known as Material Safety Data Sheets or MSDS. A MSDS should be prepared by the
manufacturer and include information on the recommended use of a substance, its physical and chemical
properties, relevant health hazard information and information concerning the precautions to be followed in
relation to the safe use and handling of the substance.
In a more general context, with virtually all equipment produced, the manufacturer is required to provide
relevant safety information. This information is often provided as part of the user instruction/manual for safe
operation. The following is a typical set of Safety Instructions for a combined Printer/Scanner/Copier.
Read all of the instructions on this section when setting up and using the product.
Avoid places subject to rapid changes in temperature and humidity. Also, keep the product away from direct
sunlight strong light and heat sources.
Avoid places subject to dust, shocks and vibrations
Leave enough room around the product to allow for sufficient ventilation.
Place the product near a wall outlet where the plug can be easily unplugged.
Place the product on a flat, stable surface that extends beyond this product base in all directions. If you place the
product near the wall, leave more than 10cm between the back of the product and the wall. The product will not
operate properly if it is tilted at an angle.
When storing or transporting the product, do not tilt it, stand it on its side, or turn it upside down; otherwise, ink
my leak from the cartridge.
Leave more than 22cm between the base of the product and the edge of the surface on which it is placed;
otherwise, the product may fall if tipped forward possibly causing injury.
Use only the type of power source indicated on the label on the back of the product.
Be sure your AC power cord meets the relevant local safety standards.
Do not use a damaged or frayed power cord.
If you use an extension cord with the product, make sure that the total ampere rating of the devices plugged into
the extension cord does not exceed the cord’s ampere rating. Also, make sure that the total ampere rating of all
devices plugged into the wall outlet does not exceed the wall outlet’s ampere rating.
When handling ink cartridges
Do not open the ink cartridge packages until just before you install them.
Do not shake used ink cartridges; this can cause leakage.
Keep ink cartridges out of the reach of children. Do not allow children to drink from or otherwise handle the
cartridges.
Be careful when you handle used ink cartridges as there may be some ink remaining around the ink supply port.
If ink gets on your skin, wash the area thoroughly with soap and water. If ink gets into your eyes, flush them
immediately with water. If discomfort or vision problems remain after a thorough flushing, see a doctor
immediately.
Do not touch the circuitry that is located on the back of the cartridge.
Do not remove or tear the label on the cartridge; this can cause leakage.
Store each ink cartridge so that the bottom of its packaging faces down.
Do not put your hand inside the product or touch the ink cartridges during printing.
Do not block or cover the openings on the product.
Do not attempt to service the product yourself.
Unplug the product and refer servicing to qualified service personnel under the following conditions:
The power cord or plug is damaged.
Liquid has entered the product.
The product has been dropped or the cover damaged.
The product does not operate normally or exhibits a distinct change in performance.
Do not insert objects into the slots on the product.
Take care not to spill liquid on the product.
Leave the ink cartridges installed. Removing the cartridges can dehydrated the print head and may prevent the
product from printing.
Use only a dry, soft cloth to clean the display. Do not use liquid or chemical cleansers.
If the display on the product is damaged, contact your dealer.
If the liquid crystal solution contained in the LCD panel leaks out and gets on your hands, wash them
thoroughly with soap and water, if the liquid crystal solution gets into you eyes, flush them immediately with
water, if discomfort or vision problems remain after a though flushing, see a doctor immediately.
Before installing software we often need to know if a computer meets that software's minimum hardware
requirements, like the type of processor, the amount of physical memory, the screen resolution or (not really a
hardware issue pur sang) available harddisk space.
I. Processor
The processor number is one of several factors, along with processor brand, specific system configurations and
system-level benchmarks, to be considered when choosing the right processor for your computing needs.
A higher number within a processor class or family generally indicates more features, but it may be more of one
and less of another. Once you decide on a specific processor brand and type, compare processor numbers to
verify the processor includes the features you are looking for.
Intel’s processor number system is used with the following brands:
For Example
Requirement Requirement
Type
CPU For one index server per TREX instance:
At least 2 CPUs
Recommended: 4 CPUs
With two index servers per TREX instance: At least 4 CPUs.
The supported processors are listed in the TREX installation
guide.
Memory is the main component of a computer system. It stores instructions and data in binary form that is used
by the central processing unit.
For Example
Requirement Type Requirement
RAM At least 2 GB per CPU
Hard-disk requirements vary, depending on the size of software installation, temporary files created and
maintained while installing or running the software, and possible use of swap space (if RAM is insufficient).
A minimum base installation requires at least 15MB of disk space but you should assume that your actual disk
space needs will be much larger.
For example, if you install many contributed modules and contributed themes, the actual disk space for your
installation could easily be (and likely will be) larger than 60 MB (exclusive of database content, media,
backups and other files which should be considered too when planning for your site).
Network Connections provides connectivity between your computer and the Internet, a network, or another
computer. With Network Connections, you can configure settings to reach local or remote network resources or
functions.
Instruction LO2- Establish location requirements for hardware and peripherals
This learning guide is developed to provide you the necessary information regarding the
Following content coverage and topics –
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Computer platforms
A platform consists of an operating system, the computer system's coordinating program, which in
turn is built on the instruction set for a processor or microprocessor, the hardware that performs logic
operations and manages data movement in the computer. The operating system must be designed to
work with the particular processor's set of instructions. As an example, Microsoft's Windows 2000 is
built to work with a series of microprocessors from the Intel Corporation that share the same or similar
sets of instructions. There are usually other implied parts in any computer platform such as a
motherboard and a data bus, but these parts have increasingly become modularized and
standardized.
Local Area Network (LAN) is a computer network limited to a small geographic area such as a
school or office building. Usually the network equipment and cabling is owned by the
organization.
Wide Area Network (WAN) is a computer network that covers a wide geographic area. Some
WANs are privately owned but many will use leased communication lines and equipment.
Server – a computer which is usually dedicated to managing user access to shared network
resources. A server provides services such as file and print sharing, e-mail and web serving.
The term “server” can describe the software application that provides the service, the computer
that runs the software application or the combination of the two.
Switch – a hardware device used to connect segments of a computer network.
Workstation – a computer designed to be used by one person to perform work-related tasks.
Workstations are commonly connected to a computer network. The term “workstation” is also
used to describe the workspace of a person, including the desk, chair and other equipment
used to perform tasks.
Modem – a hardware device that enables a computer to transmit data over telephone or cable
lines. For high speed internet connections, DSL (Digital Subscriber Line) or cable modem
services are used.
Router – a hardware device that connects two or more computer networks and selectively
forwards data from one network to another.
Peripheral devices are hardware devices which are added to a host computer in order to expand its
abilities. They may be internal or external to the computer. Commonly they are classified by their
purpose:
To determine the appropriate methods of working with these devices, knowledge of the following is
required:
Manufacturer’s requirements
Occupational Health and Safety (OH & S) requirements and safe work practices
Manufacturer’s requirements
Computer hardware will usually come with a user manual or guide, either in a hard copy or soft copy
format. Another source for this information is the manufacturer’s website. Information in the user
guide may include:
Installation instructions including required environmental conditions
Handling precautions
Software installation guide
Instructions on how to use the hardware
Maintenance instructions
Fault finding guide
The manufacturer’s recommendations for operating a specific computer hardware device will be
found in the user manual or specifications.
Temperature
The ambient temperature of the environment is the temperature at which computer hardware should
be maintained and should fall within the recommended range. If the temperature exceeds the upper
limit of this range, the life of the electronic components will be shortened, and the reliability of the
device decreased. The optimum temperature range for computer hardware is usually from 15 to 24
deg C.
To maintain the ambient temperature within an acceptable range, the room containing the computer
hardware is often air conditioned. Air conditioning will also maintain the relative humidity levels in the
room, and also improve the air quality by filtering out dust particles.
If the relative humidity where computer hardware devices are operated is too high, problems can
occur through water condensation. If the relative humidity is too low, the devices are much more
susceptible to electrostatic discharge.
Computer hardware devices should be located away from sources of moisture such as open
windows. Eating and drinking should not be allowed anywhere near a computer hardware device.
Dust
As discussed above, it is important hardware devices operate within a set temperature range. Over
time fans and ventilation vents become clogged with dust reducing their cooling efficiency. If the
hardware device is to be operated in a dusty area such as an industrial environment, the device will
need to be cleaned more frequently than a device in an office environment. Shields and housings are
available to reduce the intake of dust in a dusty environment.
Physical security
Physical security refers to making sure only authorized people have physical access to computer
hardware. Examples of physical security include:
Servers located in a server room secured with locks, key cards or keypad access.
Workstations protected by a key lock on the system case and/or a cable lock between the
system case and the desk.
Electrical problems
Blackout – total loss of electrical power. Hardware devices will not operate.
Brownout – the electrical power is delivered below the set conditions for the computer hardware.
Computer hardware may turn off without notice or may not operate.
Surges and spikes – the electrical power is delivered above the set conditions, commonly only for a
short period of time. Surges and spikes commonly occur when there is lightning. Computer hardware
(and other electronic equipment) may be damaged.
Electrical noise – the electrical power is delivered with additional electrical signals which may affect
the correct operation of computer hardware. One source of electrical noise is electrical machinery
such as welders.
Protection devices
To provide protection for computer hardware devices from electrical problems, the following devices
can be installed.
Surge protectors – a device designed to protect against electrical surges and spikes. It provides no
protection against blackouts or brownouts.
Uninterruptible Power Supply (UPS) – a device designed to protect against blackouts. A UPS
provides power automatically during a blackout and is designed to provide battery power for a
relatively short period of time – around ten to twenty minutes. This provides time to save all data and
shut down the computer correctly.
Most UPS devices also provide protection against brownouts, surges and spikes depending on their
design.
Generators – where an organization requires the computer hardware to be powered for an extended
length of time, a generator may be installed in addition to a UPS. This is a relatively costly option and
would be considered where the operation of the computer hardware is considered critical to the
organization.
These devices should be regularly tested and maintained to ensure they will function correctly in the
event of an electrical problem. Refer to the user manual for the device.
System protection
Once the hardware device is installed, the device (and data stored on it) can be further protected by
the following system protection measures.
User accounts
Users should be given individual user accounts with enough rights and permissions to be able to
perform their work duties and no more.
For example, users in a Microsoft Windows environment may be a standard user or an administrator.
Administrators can change security settings, install software and hardware, and access all files on the
computer. Administrators can also make changes to other user accounts. Standard users have
limited access.
An Access Control List (ACL) is a list of permissions for objects such as files or folders. This list tells
the computer operating system which access rights each user has to the file or folder. Depending on
the operating system, these access rights include:
Read – users can open a folder, list the files in the folder, open a file and view the contents
Write – as for Read and in addition users can create new files and modify existing files
Full – users have all rights
Execute – users can execute (run) files if they are scripts or program files
Users should only be given enough rights to files and folders that are necessary for them to be able to
perform their work duties and no more.
Antivirus software
Antivirus software should be installed and the software and virus definitions should be regularly
updated. Computers with an internet connection can be set up to download these updates
automatically.
Firewalls
A firewall is a hardware or software device designed to block unauthorised access to or from a private
computer network.
Data backup
To protect against data loss, it is important that a data backup and recovery plan is developed and
implemented. The backup plan can protect against accidental loss of user data, database corruption,
hardware failures and natural disasters. Typically two copies of the backup are made. One copy is
stored on-site and the other copy is stored off-site to protect against a disaster such as a fire
happening at the site.
Software updates
Updates for operating systems and application software are regularly released by the manufacturers
to update features or fix problems with the software. The most recent versions of operating systems
have built-in facilities which automate the process of checking for updates.
Redundancy
Redundancy helps protect an information system against the failure of a hardware device. A
secondary hardware device is installed and this secondary hardware device will take over the function
of the primary device if it fails.
An example of redundancy is the use of Redundant Array of Independent (or Inexpensive) Disks,
commonly known as RAID.
Preventive maintenance is maintenance which is carried out, usually at regular intervals, to prevent
equipment failures or the slowing of a service.
Corrective maintenance is maintenance which is carried out to correct a failure which has occurred.
Preventive maintenance
Cleaning materials
One of the main preventive maintenance tasks for computer hardware devices is cleaning to remove
dust and debris build up.
Computer cleaning supplies in a cleaning kit should include:
a lint-free cloth
Ammonia-free glass cleaner. (Products with ammonia are suitable for CRT monitors which
have a glass screen but are not suitable for LCD monitors).
a small brush for cleaning dust
a can of compressed air for blowing away dust
antistatic wrist strap for use when working inside a computer case
mild detergent
There are also specialised computer cleaning kits available. For information about the different types
of kits available use the internet to search for “computer cleaning kit”.
Cleaning
keyboard
mouse
monitor
optical drives
printers
Computer hard drives are sealed devices and the hard drive assembly is designed to exclude dust
particles. They do not require any cleaning.
For all devices refer to the user manual for any specific manufacturer’s cleaning instructions.
Read the instructions on any specialized computer cleaning kits before use.
Remove unused files - For a Windows computer use Disk Cleanup. This utility searches for
unnecessary files such as Temporary Internet files and the Recycle bin and then deletes them.
Check for disk errors - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Check Now
button in the Error-checking frame.
Defrag the hard drive - For a Windows computer, open Windows Explorer and right click the drive
you want to check. Select Properties from the drop down menu and then select the Defrayment Now
button in the Defragmentation frame.
One of the most cost effective upgrades which can be made to a computer is to install additional
memory (RAM). Consult your computer user manual to determine the correct RAM type for your
computer.
1. The computer should be on a flat location, clear of clutter.
2. Turn off the computer.
3. At the power point, turn off the switch and unplug the power cord.
4. Disconnect and remove peripheral devices.
5. Remove the computer cover.
6. Put the antistatic wrist strap on your wrist and connect the alligator clip to a metallic surface on
the computer case.
7. Hold the RAM module by the edges at each end, being careful not to touch the gold electrical
contacts on the bottom edge.
8. Align the notches in the memory module with the memory slot, and press down firmly at both
ends of the modules until the module is locked in.
9. Replace the computer cover.
10. Connect peripheral devices.
11. Turn power on at the power point.
12. Boot the computer.
13. Use an operating system utility to check that the new memory has been recognised. For a
windows computer use System Information.
Corrective maintenance
Corrective maintenance is performed when a component or system is not working as expected.
Possible causes include:
hardware faults
software faults and issues
user error
Before proceeding with any maintenance, it is important you are aware of the conditions of any
warranty or service level agreements. With hardware devices you may void the warranty if you
attempt to replace internal hardware components.
Troubleshooting
Basic checks
some basic checks to perform first include:
Is the device powered on – check power point is on and power leads are securely seated. If
the device has a power indicator, check it is on.
Check that signal cables are securely seated.
If the device is networked, check that the network cable is securely seated.
Hardware faults
If you suspect the problem is with a faulty hardware component, the most common method of testing
is to replace the component with a known good component.
Diagnostic tools
There is a range of diagnostic tools which can aid in troubleshooting. One of the best “tools” is a good
understanding of the processes which occur within a computer system, particularly the boot process
from turning the power switch on, to loading the operating system and software applications.
Business requirements
When selecting computer hardware it is important to firstly identify the tasks the computer hardware is
required to perform. For example, a workstation required for video editing will have different
requirements to a workstation required for standard office applications, such as word processing.
Another example is a server - the processing power and storage capacity of the server will be
determined by the number of users it is required to service.
Warranty
When computer hardware devices are purchased, the supplier provides a guarantee that if a fault
develops in the equipment within a certain time, they will repair or replace it free of charge.
Organizations need to consider the warranty conditions before purchasing to ensure their business
needs will be met. Common warranty conditions include:
Many computer hardware suppliers offer extended warranties at additional cost. For example, the
extended warranty may extend the period of cover from one year to three years. The level of service
purchased by an organisation will depend on how critical the device is to the IT system.
A Service Level Agreement (SLA) is an agreement which sets out the level of service and
maintenance to be provided.
Organizational policies
Some organizations have a policy of using preferred suppliers for computer hardware purchases.
This ensures the quality and consistency of computer hardware devices is maintained throughout an
organization.
A standard operating environment is a specification for computer hardware and software which
organizations develop to maintain consistency and reduce support costs. Many organizations such
as universities, publish their standard operating environment policies on the internet. For an example,
visit the Edith Cowan University Standard Operating Environment website
Support
Technical support is provided by manufacturers for users after the purchase of a computer hardware
device. Access to this support is commonly limited to users who have registered the purchase of the
product. Forms of technical support include:
telephone support
email support (usually with a guaranteed response time)
access to support on internet such as:
o frequently asked questions (FAQs)
o troubleshooting guide
o downloads of latest drivers and software updates
Compatibility
Compatibility is the ability of a system or a product to work with other systems or products without
special effort on the part of the customer. One way products achieve interoperability is to comply with
industry interface standards. For example, a memory module is compatible with a motherboard
because the manufacturer of the memory module and the motherboard both work to the same
industry standard.
Technical specifications
Once the business requirements have been considered, the technical specifications of the hardware
device need to be evaluated. Areas for evaluation include the following:
The technical specifications to be considered will depend on the computer hardware device to be
purchased. For example, technical specifications to be considered for a printer include:
Employers have a responsibility to provide a safe and healthy workplace for all employees. It also
requires all workers to be aware that they have a duty to follow safe work practices to prevent injuries
to themselves or other workers.
Organizations will develop procedures for safe working practices as a tool for implementing their
OH&S policies and training staff.
For further information click on the following link: Apply occupational health and safety procedures
Manual handling
Computer hardware devices and consumables such as printer paper boxes can be very heavy and
care should be taken when manually handling these objects.
Manual handling is one of the most common causes of accidents in the workplace. Workcover NSW
<<link to http://www.smartmove.nsw.gov.au >>
“any activity that involves lifting, lowering, carrying, pushing, pulling, holding or restraining. It may also
include stretching, bending, sustained and awkward postures, and repetitive movements.”
Recommendations on practices to reduce the risk of manual handling injury at work include:
To find the weight of a device refer to the device specifications in the user manual. Always check the
manufacturer’s recommendations before handling.
Cables should be kept away from the floor, and a person’s workspace. Cables on the floor are easily
damaged by trolleys and chair castors.
Use switched power boards and not double adapters or piggy backed plugs.
Routinely inspect cables for any damage. Damaged cables should be disconnected and removed.
Testing and tagging refers to the practice of testing electrical equipment (which is designed for
connection by a flexible cord), by an appropriate person. If the equipment is compliant a tag is
attached which is marked with the name of the person or company who performed the test, and the
test date or retest date.
Any component such as a computer power supply which has a mains (240 volt) power connection
can only be opened and repaired by a qualified technician. CRT monitors can have very high
electrical potential levels even after they have been switched off and must only be opened by a
qualified technician.
Electrical circuits for fixed wiring are protected from overload by a circuit breaker. The circuit breaker
will trip if the circuit is overloaded. If this happens, it is an indication that the number of electrical
appliances on that circuit should be reduced.
Instruction LO3- Identifying security threats
There are different ways to monitor threats to the network. Some of them are: -
1. By using software Utilities
Computer and network security help to keep data and equipment functioning and
provide access only to appropriate people. Everyone in an organization should give high
priority to security because everyone can be affected by a lapse in security.
Theft, loss, network intrusion, and physical damage are some of the ways a network or
computer can be harmed. Damage or loss of equipment can mean a loss of productivity.
Repairing and replacing equipment can cost the company time and money. Unauthorized
use of a network can expose confidential information and reduce network resources.
Physical loss or damage to equipment can be expensive, and data loss can be
detrimental to your business and reputation. Threats against data are
constantly changing as attackers find new ways to gain entry and commit
their crimes.
Viruses
A software virus is a parasitic program written intentionally to alter the way your
computer operates without your permission or knowledge.
A virus attaches copies of itself to other files such as program files or documents and is
inactive until you run an infected program or open an infected document. When
activated, a virus may damage or delete files, cause erratic system behaviour, display
messages or even erase your hard disk.
A virus may spread through email and instant messenger attachments, through infected
files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows.
Worm
Trojan horse
The Trojan does not need to be attached to other software. Instead, a Trojan threat is
hidden in software that appears to do one thing, and yet behind the scenes it does
another. Trojans are often disguised as useful software. The Trojan program can
reproduce like a virus and spread to other computers.
A Trojan horse is not a virus because it does not replicate and spread like a virus.
Tools that are used to make web pages more powerful and versatile are: -
ActiveX – Technology created by Microsoft to control interactivity on web pages. If
ActiveX is on a page, an applet or small program has to be downloaded to gain
access to the full functionality.
Java – Programming language that allows applets to run within a web browser.
Examples of applets include a calculator or a counter.
JavaScript – Programming language developed to interact with HTML source code
to allow interactive websites. Examples include a rotating banner or a popup
window.
Attackers may use any of these tools to install a program on a computer. To prevent
against these attacks, most browsers have settings that force the computer user to
authorize the downloading or use of ActiveX, Java, or JavaScript.
Grayware or malware is a file or program other then a virus that is potentially harmful.
Many grayware attacks are phishing attacks that try to persuade the reader to
unknowingly provide attackers with access to personal information. As you fill out an
online form, the data is sent to the attacker. Grayware can be removed using spyware
and adware removal tools.
Denial of service (DoS) is a form of attack that prevents users from accessing normal
services, such as e-mail and a web server, because the system is busy responding to
abnormally large amounts of requests. DoS works by sending enough requests for a
system resource that the requested service is overloaded and ceases to operate.
Ping of death – A series of repeated, larger than normal pings that crash the
receiving computer
E-mail bomb – A large quantity of bulk e-mail that overwhelms the e-mail server
preventing users from accessing it
Distributed DoS (DDoS) is another form of attack that uses many infected computers,
called zombies, to launch an attack. With DDoS, the intent is to obstruct or overwhelm
access to the targeted server. Zombie computers located at different geographical
locations make it difficult to trace the origin of the attack.
Here are some basic precautions to help protect against social engineering:
Do not let anyone follow you through a door that requires an access card
TCP/IP is the protocol suite that is used to control all of the communications on the
Internet. Unfortunately, TCP/IP can also make a network vulnerable to attackers.
A security plan should be used to determine what will be done in a critical situation.
Security plan policies should be constantly updated to reflect the latest threats to a
network. A security plan with clear security procedures is the basis for a technician to
follow. Security plans should be reviewed on a yearly basis.
Privacy
Authentication
There are multiple layers of security in a network, including physical, wireless, and data.
Each layer is subject to security attacks. The technician needs to understand how to
implement security procedures to protect equipment and data.
Though local security policies may vary between organizations, there are questions all
organizations should ask:
The value of physical equipment is often far less than the value of the data it contains.
The loss of sensitive data to a company's competitors or to criminals may be costly. Such
losses may result in a lack of confidence in the company and the dismissal of computer
technicians in charge of computer security. To protect data, there are several methods
of security protection that can be implemented.
Password Protection
Password protection can prevent unauthorized access to content, as shown in Figure 1.
Attackers are able to gain access to unprotected computer data. All computers should be
password protected. Two levels of password protection are recommended:
BIOS – Prevents BIOS settings from being changed without the appropriate
password
Login – Prevents unauthorized access to the network
Network logins provide a means of logging activity on the network and either preventing
or allowing access to resources. This makes it possible to determine what resources are
being accessed. Usually, the system administrator defines a naming convention for the
usernames when creating network logins. A common example of a username is the first
initial of the person's first name and then the entire last name. You should keep the
username naming convention simple so that people do not have a hard time
remembering it.
When assigning passwords, the level of password control should match the level of
protection required. A good security policy should be strictly enforced and include, but
not be limited to, the following rules:
Data Encryption
Encrypting data uses codes and ciphers. Traffic between resources and computers on
the network can be protected from attackers monitoring or recording transactions by
implementing encryption. It may not be possible to decipher captured data in time to
make any use of it.
Virtual Private Network (VPN) uses encryption to protect data. A VPN connection allows a
remote user to safely access resources as if their computer is physically attached to the
local network.
Port Protection
Every communication using TCP/IP is associated with a port number. HTTPS, for instance,
uses port 443 by default. A firewall is a way of protecting a computer from intrusion
through the ports. The user can control the type of data sent to a computer by selecting
which ports will be open and which will be secured. Data being transported on a network
is called traffic.
Data Backups
Data backup procedures should be included in a security plan. Data can be lost or
damaged in circumstances such as theft, equipment failure, or a disaster such as a fire
or flood. Backing up data is one of the most effective ways of protecting against data
loss. Here are some considerations for data backups:
Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and
procedures needed to create, manage, distribute, use, store, and revoke digital
certificates.[1] In cryptography, a PKI is an arrangement that binds public keys with
respective user identities by means of a certificate authority (CA). The user identity must
be unique within each CA domain. The binding is established through the registration
and issuance process, which, depending on the level of assurance the binding has, may
be carried out by software at a CA, or under human supervision. The PKI role that
assures this binding is called the Registration Authority (RA). The RA ensures that the
public key is bound to the individual to which it is assigned in a way that ensures non-
repudiation.
Pretty Good Privacy (PGP) is a popular program used to encrypt and decrypt e-mail
over the Internet. It can also be used to send an encrypted digital signature that lets the
receiver verify the sender's identity and know that the message was not changed en
route. Available both as freeware and in a low-cost commercial version, PGP is the most
widely used privacy-ensuring program by individuals and is also used by many
corporations.
Symmetric and Asymmetric ciphers
In a symmetric cipher, both parties must use the same key for encryption and
decryption. This means that the encryption key must be shared between the two parties
before any messages can be decrypted. Symmetric systems are also known as shared
secret systems or private key systems.
Symmetric ciphers are significantly faster than asymmetric ciphers, but the
requirements for key exchange make them difficult to use.
In an asymmetric cipher, the encryption key and the decryption keys are separate. In an
asymmetric system, each person has two keys. One key, the public key, is shared
publicly. The second key, the private key, should never be shared with anyone.
When you send a message using asymmetric cryptography, you encrypt the message
using the recipients’ public key. The recipient then decrypts the message using his
private key. That is why the system is called asymmetric.
Symmetric ciphers are the oldest and most used cryptographic ciphers. In a symmetric
cipher, the key that deciphers the cipher text is the same as (or can be easily derived
from) the key enciphers the clear text. This key is often referred to as the secret key.
The most widely used symmetric ciphers are DES and AES.
Unlike a symmetric cipher, an asymmetric cipher uses two keys: one key that is kept
secret and known to only one person (the private key) and another key that is public and
available to everyone (the public key). The two keys are mathematically interrelated, but
it's impossible to derive one key from the other. Well-known asymmetric ciphers are the
Diffie-Hellman algorithm, RSA, and DSA.
What are the advantages and disadvantages of using an asymmetric cipher instead of a
symmetric cipher?
Because of these characteristics, asymmetric ciphers are typically used for data
authentication (through digital signatures), for the distribution of a symmetric bulk
encryption key (aka a digital envelope), for non-repudiation services, and for key
agreement. Symmetric ciphers are used for bulk encryption.
PKZIP is an archiving tool originally written by Phil Katz and marketed by his company
PKWARE, Inc. The common "PK" prefix used in both PKZIP and PKWARE stands for "Phil
Katz".
Secure Sockets Layer (SSL) a protocol for encrypting information over the Internet
A digital signature or digital signature scheme is a mathematical scheme for
demonstrating the authenticity of a digital message or document. A valid digital
signature gives a recipient reason to believe that the message was created by a known
sender, and that it was not altered in transit. Digital signatures are commonly used for
software distribution, financial transactions, and in other cases where it is important to
detect forgery or tampering.
LO 4: - Establish maintenance practices
4.1 Determining maintenance requirements of equipment specification
Maintenance requirement is the materials or tools that are important to maintain specific
equipment. Maintenance requirement may include but not limited to: -
Caution
Attention
Attention is more than just noticing incoming stimuli. It involves a number of processes
including filtering out perceptions, balancing multiple perceptions and attaching
emotional significance to these perceptions.
There are two major forms of attention: passive and active. Passive attention refers to
the involuntary process directed by external events that stand out from their
environment, such as a bright flash, a strong odor, or a sudden loud noise. We might say
that because passive attention is involuntary, it is easy. Active attention is voluntary and
is guided by alertness, concentration, interest and needs such as curiosity and hunger.
Onsite response is one of maintenance schedule that display the plan or procedures
from the internet.
Remote diagnostics refers to the ability to evaluate the current status of electronic
equipment from a remote location. The process involves the establishment of some type
of wired or wireless communication between the two points in order for the remote
analysis to take place.
Remote diagnostics is the act of diagnosing a given symptom, issue or problem from a
distance.
Upgrade components
Computer hardware or components that can be upgrade are: -
Central processing Unit (CPU)
RAM
Avoid creating static electricity charges while you're installing the new
motherboard by wearing a static-free wristband or grounding yourself often
by touching the metal case.
If you are planning on installing replacement CPU that is different than the
original CPU, make sure your motherboard can use it first.
The interior of a computer is susceptible to electric shock. Guard against
carrying a dangerous charge. Touch the metal case of the computer at least
every couple of minutes to make sure you don't shock the computer's
components
Instructions
1. Research the computer that is to receive the new processor. There are many
different processors on the market, and they are not all compatible with a
particular machine. Visit the website of the computer manufacturer. If the
computer was assembled from after-market components, check the website of the
company that manufactured the motherboard, or main circuit board, of the
computer. Find out the processor brand, the processor family, the processor and
bus speeds that the machine supports, the type of processor socket on the board
and the processor cores or revisions that are compatible with the machine.
2. Shop for a compatible processor from either a local retailer or an online store. The
processor must meet all the requirements that your research uncovered, otherwise
it will likely be incompatible with the machine. As soon as the processor is
received, check it against your original order.
3. Install the processor. Disconnect the computer cables and unplug the machine.
Move it to a good work area. Open the side of the machine to obtain access to the
interior. Before going any further, discharge any static electricity from your body
by using a grounding wrist strap or by touching the bare metal of the computer
case.
4. Find the processor. It will be one of the largest objects on the motherboard, near
the center, and it will be covered by a large heat sink and fan. On each side of the
heat sink, there should be a clip or some other fastener securing it to the processor
socket. Gently unhook the clips, taking extreme care not to damage the processor
socket, and then disconnect the power lead that runs from the fan to the
motherboard. The heat sink then can be pulled away from the processor. It may
take some force to separate the heat sink from the processor, depending on the
type of thermal transfer compound used.
5. Examine the processor. On one side of the processor socket, there will be a metal
or plastic arm that is used to secure the processor in the socket. Slide the end of
this arm out from the retaining clip, and lift the arm until it is perpendicular to the
motherboard. The old processor can then be gently pulled out.
6. Look at the processor socket. There should be one corner that has a small, 45-
degree notch, or another distinguishing mark, cut into it. The processor should
have a similar mark. Rotate the processor until the mark is in the same corner as
the mark on the socket. Once the processor is orientated correctly, line up the pins
and slide the processor into the socket. This should require no force at all. If force
is used, the processor pins may be bent and the processor permanently damaged.
With the processor seated in the socket, the retaining arm may be lowered and
clipped into position.
7. Install the heat sink and fan assembly with a thin layer of thermal compound or a
thermal pad between it and the processor. This step transfers heat away from the
processor to the heat sink, preventing the processor from overheating. With the
heat sink in place, plug the power lead from the fan back into the motherboard.
8. Close the computer. Reconnect the components and test the new upgrade. When
everything is done, the computer should be noticeably faster, and it will be able to
handle more robust applications and games than it could previously.
Instruction
1. To get started first click start and open the control panels network connection icon.
Click network and Internet Connections. Click the windows firewall icon which
should be clearly visible.
2. This brings up the windows firewall dialog box. Click the "On" button. This button
will stop all intruders from gaining access to your computer. Now click the
exceptions tab on top. Put a check mark
next to anything there that you wish to use. For example checking file and print
share will allow other computers to gain access to your computer and share files
and the printer.
3. Once you've checked off what you wish to allow click OK and the firewall is set!
4. Windows firewall inadequate? Some computer users like a second line of defense
while on the Internet. Click on over to Cnets downloads.com to check out their top
free personal computer firewalls. Popular firewalls include Zone Alarm and PC Tools
Firewalls. Both are free to download.